Search Results - "Divakarla, Usha"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Advancements in Automated Livestock Monitoring: A Concise Review of Deep Learning-Based Cattle Activity Recognition by D, Deepak, D'Mello, Demian Antony, Divakarla, Usha

    “…Cattle activity serves as a critical indicator of animal health and welfare, offering valuable insights into both physical and mental conditions. The livestock…”
    Get full text
    Conference Proceeding
  2. 2

    Predicting Phishing Emails and Websites to Fight Cybersecurity Threats Using Machine Learning Algorithms by Divakarla, Usha, Chandrasekaran, K

    “…Phishing attempts, which try to fool people into giving attackers valuable information like login credentials, credit card numbers, and personal data, have…”
    Get full text
    Conference Proceeding
  3. 3

    DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods by Chandrasekaran, K., Divakarla, Usha, Srinivasan, C. K.

    “…DNS cache poisoning is a type of cyber attack that aims to redirect traffic from legitimate websites to malicious ones. In this attack, the attacker modifies…”
    Get full text
    Conference Proceeding
  4. 4

    IOT Devices Using Supervised Machine Learning Models for Anomaly Based Intrusion Detection by Divakarla, Usha, K, Chandrasekaran

    “…Identifying dangers and irregularities in any infrastructure is a growing problem in the Internet of Things (IoT) industry. IoT infrastructure is utilised more…”
    Get full text
    Conference Proceeding
  5. 5

    A novel approach for evaluating trust of resources in cloud environment by Divakarla, Usha, Chandrasekaran, K.

    Published in 2016 IEEE Region 10 Conference (TENCON) (01-11-2016)
    “…Trust is a significant facet in decision making of any distributed network. Cloud computing is a new computing model that provides computing resources to…”
    Get full text
    Conference Proceeding
  6. 6

    Mulberry Leaves Diseases and Disease Identification Techniques by Sandeep Kumar, S, Divakarla, Usha

    “…In sericulture, the young caterpillars of the common silk moth, also known as "Bombyx Mori," are the most widely used species of silkworm. For the purpose of…”
    Get full text
    Conference Proceeding
  7. 7

    Novel approach of Using Periocular and Iris Biometric Recognition in the Authentication of ITS by Rao, Manjula Gururaj, H, Priyanka, Pawar, Sumathi, Reddy, K Hemant Kumar, Divakarla, Usha

    “…In a fast technology growing world with respect to the data, information security is the major criteria. To have the robust system the security is the foremost…”
    Get full text
    Conference Proceeding
  8. 8

    Trusted path between two entities in Cloud by Divakarla, Usha, Chandrasekaran, K.

    “…Trust plays an important role in the security of resources of the emerging technology called Cloud. To develop a strong trust there has to be a strong trust…”
    Get full text
    Conference Proceeding