Items where Subject is "Cyber Security"
- VELS Subject Areas (31)
- Computer Science (31)
- Cyber Security (31)
- Computer Science (31)
A
A, Asha and S, Karthika and Saranya, P.C. and Arumugam, Deepak (2025) Securing Smart Grid IoT System using A Robust RNN based Cyberattack Detection Framework. In: 2025 International Conference on Electronics and Renewable Systems (ICEARS), Tuticorin, India.
B
Babu, D. Raghunath Kumar and Packialatha, A. (2024) Cyber-attack Detection and Mitigation Process under Big Data Consideration: Improved Recursive Feature Elimination-based Feature Selection. Journal of Information & Knowledge Management, 23 (06). ISSN 0219-6492
Babu, T.G. and Jayalakshmi, V. (2021) The Challenges for Context – Oriented Data Accumulation with Privacy Preserving in Wireless Sensor Networks. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC). pp. 866-871.
Bathushaw, M. Husain and Nagasundaram, S. (2025) A Methodical Approach to Healthcare Cybersecurity: Handling Current Risks and Advancements. In: 2025 6th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI), Goathgaun, Nepal.
Bathushaw, M. Husain and Nagasundaram, S. (2025) Securing Healthcare Systems: Modern Threats and Strategic Developments in Cybersecurity. In: Lecture Notes in Networks and Systems ((LNNS,volume 1241)). Springer Nature Link, pp. 303-315.
C
Clementeena, A. and Sripriya, P. (2016) Comparative Study of Algorithms used in CAPTCHA’s and New Finding Set as LCG Algorithm. Indian Journal of Science and Technology, 9 (42). ISSN 0974-6846
G
Gupta, Abhishek and Sahayadhas, Arun and Gupta, Vivek (2021) Proposed Techniques to Design Speed Efficient Data Warehouse Architecture for Fastening Knowledge Discovery Process. In: 2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), Laguna Hills, CA, USA.
J
Jayashree, G. and Priya, Dr. C. (2021) Data Integration with XML ETL Processing. 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA). pp. 1-8.
Jenifer J, Anciline and K., Piramu Preethika. S. (2025) Deep Learning-Driven SIoT Security: Detecting Anomalies and Community Attacks with SPY IoT Devices. In: 2025 International Conference on Inventive Computation Technologies (ICICT), Kirtipur, Nepal.
K
Kannan, M. and William Mary, L. and Priya, C. and Manikandan, R. (2020) Towards Smart City through Virtualized and Computerized Car parking System using Arduino in the Internet of Things. 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA). pp. 1-6.
Kumar, T. N. R. and Srivatsa, S. K. and Murali, S. (2013) Location and Detection of a Text in a Video. In: Proceedings of International Conference on Advances in Computing. Springer, pp. 9-17.
L
Lavanya, M. and Parameswari, R. (2020) A Multiple Linear Regressions Model for Crop Prediction with Adam Optimizer and Neural Network Mlraonn. International Journal of Advanced Computer Science and Applications, 11 (4). ISSN 2158107X
M
M, Gomathy and Vidhya, A. (2025) Unmasking Malware with MDCNN: A New Era of Image-Based Detection. In: 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI), Erode, India.
Mayilvahanan, P. and CHARLES, AROCKIARAJ (2015) A Secure & Hybrid Authentication Protocol of Intrusion Detection System for MANET. International Journal of Engineering and Technology.
Murugan, Suganiya and Selvaraj, Jerritta and Sahayadhas, Arun (2021) Detection and analysis: driver state with electrocardiogram (ECG). Physical and Engineering Sciences in Medicine, 43 (2). pp. 525-537. ISSN 2662-4729
N
Nair, Sreena G. and K, Rohini (2025) Smart Cybersecurity: Enhanced Steganography with Hyperactive Crypto-Feature Engineering. In: 2025 3rd International Conference on Data Science and Information System (ICDSIS), Hassan, India.
Nathiya, T. and Suseendran, G. (2019) An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology. In: Data Management, Analytics and Innovation. Springer Link, pp. 483-497.
Nisha, M. and Jebathangam, J. (2022) Deep KNN Based Text Classification for Cyberbullying Tweet Detection. In: 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India.
Nisha, M. and Jebathangam, J. (2022) A Framework to Detect Crime through Twitter Data in Cyberbullying with EFFDT Model. In: 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India.
P
Piramu Preethika, SK. and Sasi Kumar, A. (2016) EdTAM: Efficient Detection of Theft Android Mobile. Indian Journal of Science and Technology, 9 (44). ISSN 0974-6846
Poongothai, L. and Sharmila, K. (2021) Collating the Exactness of ROI Extraction for a Retinal Detached Eye. In: 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India.
R
Rathidevi, R. and Parameswari, R. (2021) Performance Analysis of Small Files in HDFS using Clustering Small Files based on Centroid Algorithm. 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). pp. 640-643.
S
Sheela, K. and Priya, C. (2023) Blockchain-based security & privacy for biomedical and healthcare information exchange systems. Materials Today: Proceedings, 81. pp. 641-645. ISSN 22147853
Silvia Priscila, S. and Piramu Preethika, S. K. and Radhakrishnan, Sangeetha and Bagavathi Lakshmi, R. and Sakthivanitha, M. and Mahaveerakannan, R. (2024) Chaotic Map Cryptographic Hash-Blockchain Technology with Supply Chain Management. In: Lecture Notes in Networks and Systems. Springer, pp. 599-612.
Singla, Manish Kumar and Gupta, Jyoti and Nijhawan, Parag and Ganguli, Souvik and Rajest, S. Suman (2021) Development of an Efficient, Cheap, and Flexible IoT-Based Wind Turbine Emulator. Development of an Efficient, Cheap, and Flexible IoT-Based Wind Turbine Emulator. pp. 225-231.
Sudha, C. and Akila, D. (2021) Credit Card Fraud Detection System based on Operational & Transaction features using SVM and Random Forest Classifiers. In: 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM), Dubai, United Arab Emirates.
Suseendran, G. and Chandrasekaran, E. and Nayyar, Anand (2019) Defending Jellyfish Attack in Mobile Ad hoc Networks via Novel Fuzzy System Rule. In: Data Management, Analytics and Innovation. Springer Link, pp. 437-455.
T
T, Nirmalraj and Jebathangam, J. (2022) Improved Honey Encryption to Protect the Internet users from Various Attacks. In: 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India.
V
Venkata Srinivas Akana, Chandra Mouli and Vinesh Kumar, G. and Hemamalini, U. and Arunarani, S. and Praveena, S. and Hemalatha, A. (2025) Enhancing the Security of Financial Transactions using Biometric Authentication and Multi-Task Deep Hybrid Networks. In: 2025 3rd International Conference on Data Science and Information System (ICDSIS), Hassan, India.
W
Wessly, J. and Durga, R. (2024) Blockchain Ethereum-Based Decentralized Secure Ride-Sharing Framework for Carpooling System. In: 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS), Gobichettipalayam, India.
Y
Yasir, A. and Kathirvelu, Kalaivani (2024) LDA-OOBO Based Dimensionality Reduction and Classification Using Hybrid BiGRU-MLP for Web Based Cyber-Attack Prediction in Industrial System. In: 2024 7th International Conference on Circuit Power and Computing Technologies (ICCPCT), Kollam, India.