Follow
Dr. N. Jeyanthi
Dr. N. Jeyanthi
Professor, VIT University
Verified email at vit.ac.in
Title
Cited by
Cited by
Year
Distributed Denial of service Attacks and its effects on Cloud Environment-a Survey
B Prabadevi, N Jeyanthi
The 2014 International Symposium on Networks, Computers and Communications, 1-5, 2014
472014
Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy
J Jayabalan, N Jeyanthi
Journal of Parallel and Distributed Computing 164, 152-167, 2022
452022
An enhanced entropy approach to detect and prevent DDoS in cloud environment
N Jeyanthi, NCSN Iyengar, PCM Kumar, A Kannammal
International Journal of Communication Networks and Information Security 5 …, 2013
452013
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
N Jeyanthi, NCSN Iyengar
Int. J. Netw. Secur. 14 (5), 257-269, 2012
352012
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
N Jeyanthi, U Barde, M Sravani, V Tiwari, NCSN Iyengar
International Journal of Communication Networks and Distributed Systems 11 …, 2013
262013
Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
N Jeyanthi, NCSN Iyengar
International Journal of Communication Networks and Information Security 4 …, 2012
262012
Secured document sharing using visual cryptography in cloud data storage
K Brindha, N Jeyanthi
Cybernetics and Information Technologies 15 (4), 111-123, 2015
222015
A virtual firewall mechanism using army nodes to protect cloud infrastructure from ddos attacks
N Jeyanthi, P Mogankumar
Cybernetics and Information Technologies 14 (3), 71-85, 2014
212014
A survey of trust management in mobile ad hoc networks
R Vijayan, N Jeyanthi
International Journal of Applied Engineering Research 11 (4), 2833-2838, 2016
202016
Secured multi-cloud virtual infrastructure with improved performance
R Thandeeswaran, S Subhashini, N Jeyanthi, MAS Durai
Cybernetics and Information Technologies 12 (2), 11-22, 2012
202012
Internet of things (iot) as interconnection of threats (iot)
N Jeyanthi
Security and Privacy in Internet of Things (IoTs), 23-42, 2016
192016
ASCII based cryptography using unique id, matrix multiplication and palindrome number
J Gitanjali, N Jeyanthi, C Ranichandra, M Pounambal
The 2014 International Symposium on Networks, Computers and Communications, 1-3, 2014
192014
A study on distributed consensus protocols and algorithms: the backbone of blockchain networks
J Jayabalan, N Jeyanthi
2021 International Conference on Computer Communication and Informatics …, 2021
172021
RQA based approach to detect and prevent DDoS attacks in VoIP networks
N Jeyanthi, R Thandeeswaran, J Vinithra
Cybernetics and Information Technologies 14 (1), 11-24, 2014
172014
Escape-on-sight: an efficient and scalable mechanism for escaping ddos attacks in cloud computing environment
N Jeyanthi, N Iyengar
Cybernetics and Information Technologies 13 (1), 46-60, 2013
172013
Security in IoT Devices
N Jeyanthi, S Banthia, A Sharma
Research Anthology on Combating Denial-of-Service Attacks, 312-327, 2021
162021
Securing cloud data using visual cryptography
K Brindha, N Jeyanthi
International Confernce on Innovation Information in Computing Technologies, 1-5, 2015
142015
An analysis of security solutions for ARP poisoning attacks and its effects on medical computing
B Prabadevi, N Jeyanthi, A Abraham
International Journal of System Assurance Engineering and Management 11, 1-14, 2020
132020
A Review on Various Sniffing Attacks and its Mitigation Techniques
B Prabadevi, N Jeyanthi
Indonesian Journal of Electrical Engineering and Computer Science 12 (3 …, 2018
132018
A framework to mitigate ARP sniffing attacks by cache poisoning
B Prabadevi, N Jeyanthi
International Journal of Advanced Intelligence Paradigms 10 (1-2), 146-159, 2018
132018
The system can't perform the operation now. Try again later.
Articles 1–20