Dr. N. Jeyanthi
Dr. N. Jeyanthi
Verified email at vit.ac.in
Title
Cited by
Cited by
Year
Distributed Denial of service Attacks and its effects on Cloud Environment-a Survey
B Prabadevi, N Jeyanthi
The 2014 International Symposium on Networks, Computers and Communications, 1-5, 2014
392014
An enhanced entropy approach to detect and prevent DDoS in cloud environment
N Jeyanthi, NCSN Iyengar, PCM Kumar, A Kannammal
International Journal of Communication Networks and Information Security 5 …, 2013
362013
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
N Jeyanthi, NCSN Iyengar
IJ Network Security 14 (5), 257-269, 2012
272012
Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
N Jeyanthi, NCSN Iyengar
International Journal of Communication Networks and Information Security 4 …, 2012
252012
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
N Jeyanthi, U Barde, M Sravani, V Tiwari, NCSN Iyengar
International Journal of Communication Networks and Distributed Systems 11 …, 2013
222013
Secured multi-cloud virtual infrastructure with improved performance
R Thandeeswaran, S Subhashini, N Jeyanthi, MAS Durai
Cybernetics and Information Technologies 12 (2), 11-22, 2012
192012
RQA based approach to detect and prevent DDoS attacks in VoIP networks
N Jeyanthi, R Thandeeswaran, J Vinithra
Cybernetics and Information Technologies 14 (1), 11-24, 2014
182014
A virtual firewall mechanism using army nodes to protect cloud infrastructure from ddos attacks
N Jeyanthi, PC Mogankumar
Cybernetics and Information Technologies 14 (3), 71-85, 2014
162014
Escape-on-sight: an efficient and scalable mechanism for escaping ddos attacks in cloud computing environment
N Jeyanthi, NCSN Iyengar
Cybernetics and Information Technologies 13 (1), 46-60, 2013
152013
Internet of things (iot) as interconnection of threats (iot)
N Jeyanthi
Security and Privacy in Internet of Things (IoTs), 21-39, 2016
142016
ASCII based cryptography using unique id, matrix multiplication and palindrome number
J Gitanjali, N Jeyanthi, C Ranichandra, M Pounambal
The 2014 International Symposium on Networks, Computers and Communications, 1-3, 2014
142014
A survey of trust management in mobile ad hoc networks
R Vijayan, N Jeyanthi
International Journal of Applied Engineering Research 11 (4), 2833-2838, 2016
132016
Secured document sharing using visual cryptography in cloud data storage
K Brindha, N Jeyanthi
Cybernetics and Information Technologies 15 (4), 111-123, 2015
122015
Security Breaches and Threat Prevention in the Internet of Things
N Jeyanthi, R Thandeeswaran
IGI Global, 2017
102017
A study on security threats in cloud
H Shabeeb, N Jeyanthi, N Iyengar
International Journal of Cloud Computing and Services Science (IJ-CLOSER) 1 …, 2012
102012
Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage.
K Brindha, N Jeyanthi
IJ Network Security 19 (5), 684-693, 2017
92017
A framework to mitigate ARP sniffing attacks by cache poisoning
B Prabadevi, N Jeyanthi
International Journal of Advanced Intelligence Paradigms 10 (1-2), 146-159, 2018
82018
SCT: secured cloud based telemedicine
N Jeyanthi, R Thandeeswaran, H Mcheick
The 2014 International Symposium on Networks, Computers and Communications, 1-4, 2014
82014
Office in cloud: Approach to Authentication and Authorization
M Gawannavar, P Mandulkar, R Thandeeswaran, N Jeyanthi
Recent Advances in Communications and Networking Technology (Formerly Recent …, 2015
72015
Securing cloud data using visual cryptography
K Brindha, N Jeyanthi
International Confernce on Innovation Information in Computing Technologies, 1-5, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20