Distributed Denial of service Attacks and its effects on Cloud Environment-a Survey B Prabadevi, N Jeyanthi The 2014 International Symposium on Networks, Computers and Communications, 1-5, 2014 | 39 | 2014 |
An enhanced entropy approach to detect and prevent DDoS in cloud environment N Jeyanthi, NCSN Iyengar, PCM Kumar, A Kannammal International Journal of Communication Networks and Information Security 5 …, 2013 | 36 | 2013 |
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. N Jeyanthi, NCSN Iyengar IJ Network Security 14 (5), 257-269, 2012 | 27 | 2012 |
Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment N Jeyanthi, NCSN Iyengar International Journal of Communication Networks and Information Security 4 …, 2012 | 25 | 2012 |
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP N Jeyanthi, U Barde, M Sravani, V Tiwari, NCSN Iyengar International Journal of Communication Networks and Distributed Systems 11 …, 2013 | 22 | 2013 |
Secured multi-cloud virtual infrastructure with improved performance R Thandeeswaran, S Subhashini, N Jeyanthi, MAS Durai Cybernetics and Information Technologies 12 (2), 11-22, 2012 | 19 | 2012 |
RQA based approach to detect and prevent DDoS attacks in VoIP networks N Jeyanthi, R Thandeeswaran, J Vinithra Cybernetics and Information Technologies 14 (1), 11-24, 2014 | 18 | 2014 |
A virtual firewall mechanism using army nodes to protect cloud infrastructure from ddos attacks N Jeyanthi, PC Mogankumar Cybernetics and Information Technologies 14 (3), 71-85, 2014 | 16 | 2014 |
Escape-on-sight: an efficient and scalable mechanism for escaping ddos attacks in cloud computing environment N Jeyanthi, NCSN Iyengar Cybernetics and Information Technologies 13 (1), 46-60, 2013 | 15 | 2013 |
Internet of things (iot) as interconnection of threats (iot) N Jeyanthi Security and Privacy in Internet of Things (IoTs), 21-39, 2016 | 14 | 2016 |
ASCII based cryptography using unique id, matrix multiplication and palindrome number J Gitanjali, N Jeyanthi, C Ranichandra, M Pounambal The 2014 International Symposium on Networks, Computers and Communications, 1-3, 2014 | 14 | 2014 |
A survey of trust management in mobile ad hoc networks R Vijayan, N Jeyanthi International Journal of Applied Engineering Research 11 (4), 2833-2838, 2016 | 13 | 2016 |
Secured document sharing using visual cryptography in cloud data storage K Brindha, N Jeyanthi Cybernetics and Information Technologies 15 (4), 111-123, 2015 | 12 | 2015 |
Security Breaches and Threat Prevention in the Internet of Things N Jeyanthi, R Thandeeswaran IGI Global, 2017 | 10 | 2017 |
A study on security threats in cloud H Shabeeb, N Jeyanthi, N Iyengar International Journal of Cloud Computing and Services Science (IJ-CLOSER) 1 …, 2012 | 10 | 2012 |
Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage. K Brindha, N Jeyanthi IJ Network Security 19 (5), 684-693, 2017 | 9 | 2017 |
A framework to mitigate ARP sniffing attacks by cache poisoning B Prabadevi, N Jeyanthi International Journal of Advanced Intelligence Paradigms 10 (1-2), 146-159, 2018 | 8 | 2018 |
SCT: secured cloud based telemedicine N Jeyanthi, R Thandeeswaran, H Mcheick The 2014 International Symposium on Networks, Computers and Communications, 1-4, 2014 | 8 | 2014 |
Office in cloud: Approach to Authentication and Authorization M Gawannavar, P Mandulkar, R Thandeeswaran, N Jeyanthi Recent Advances in Communications and Networking Technology (Formerly Recent …, 2015 | 7 | 2015 |
Securing cloud data using visual cryptography K Brindha, N Jeyanthi International Confernce on Innovation Information in Computing Technologies, 1-5, 2015 | 7 | 2015 |