G. Padmavathi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Panthera Leo Optimized Multilayer Feed Forward Learning-Based Intrusion Detection Model for Cloud.
SN Comput. Sci., November, 2023

Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment.
Comput. Electr. Eng., January, 2023

2022
Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography.
EAI Endorsed Trans. Pervasive Health Technol., 2022

2013
A Survey on Various Cyber Attacks and their Classification.
Int. J. Netw. Secur., 2013

2012
Exponential stability of hysteresis neural networks with varying inputs.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Next generation biometric security system: <i>an approach for mobile device security</i>.
Proceedings of the Second International Conference on Computational Science, 2012

2011
FAutoREDwithRED: an algorithm to reduce queue oscillation in internet routers.
Proceedings of the 4th Bangalore Annual Compute Conference, Compute 2011, 2011

2010
A Study on Vehicle Detection and Tracking Using Wireless Sensor Networks.
Wirel. Sens. Netw., 2010

Energy efficient CBMT for secure multicast key distribution in mobile ad hoc networks.
Proceedings of the International Conference and Exhibition on Biometrics Technology, 2010

Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications.
Proceedings of the International Conference and Exhibition on Biometrics Technology, 2010

SPIM Architecture for MVC based Web Applications
CoRR, 2010

Classification and Performance of AQM-Based Schemes for Congestion Avoidance
CoRR, 2010

Secure Multicast Key Distribution for Mobile Ad Hoc Networks
CoRR, 2010

Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault
CoRR, 2010

A Performance Study of GA and LSH in Multiprocessor Job Scheduling
CoRR, 2010

Multiprocessor Scheduling For Tasks With Priority Using GA
CoRR, 2010

Secure and Revocable Multibiometric Templates Using Fuzzy Vault for Fingerprint and Iris.
Proceedings of the Information and Communication Technologies - International Conference, 2010

A study on impulse noise removal for varied noise densities.
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, 2010

2009
A Survey of Design Pattern Based Web Applications.
J. Object Technol., 2009

Performance analysis of Non Linear Filtering Algorithms for underwater images
CoRR, 2009

A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges
CoRR, 2009

A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks
CoRR, 2009

Performance Efficient EOMCT Algorithm for Secure Multicast Key Distribution for Mobile Adhoc Networks.
Proceedings of the ARTCom 2009, 2009

Security Analysis of Hardened Retina Based Fuzzy Vault.
Proceedings of the ARTCom 2009, 2009

2005
Neural modelling of Mooney viscosity of polybutadiene rubber.
Comput. Chem. Eng., 2005


  Loading...