Search Results - "Divakarla, Usha"
-
1
Advancements in Automated Livestock Monitoring: A Concise Review of Deep Learning-Based Cattle Activity Recognition
Published in 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS) (14-03-2024)“…Cattle activity serves as a critical indicator of animal health and welfare, offering valuable insights into both physical and mental conditions. The livestock…”
Get full text
Conference Proceeding -
2
Predicting Phishing Emails and Websites to Fight Cybersecurity Threats Using Machine Learning Algorithms
Published in 2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON) (29-12-2023)“…Phishing attempts, which try to fool people into giving attackers valuable information like login credentials, credit card numbers, and personal data, have…”
Get full text
Conference Proceeding -
3
DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods
Published in 2023 Cyber Research Conference - Ireland (Cyber-RCI) (24-11-2023)“…DNS cache poisoning is a type of cyber attack that aims to redirect traffic from legitimate websites to malicious ones. In this attack, the attacker modifies…”
Get full text
Conference Proceeding -
4
IOT Devices Using Supervised Machine Learning Models for Anomaly Based Intrusion Detection
Published in 2023 International Conference on Emerging Smart Computing and Informatics (ESCI) (01-03-2023)“…Identifying dangers and irregularities in any infrastructure is a growing problem in the Internet of Things (IoT) industry. IoT infrastructure is utilised more…”
Get full text
Conference Proceeding -
5
A novel approach for evaluating trust of resources in cloud environment
Published in 2016 IEEE Region 10 Conference (TENCON) (01-11-2016)“…Trust is a significant facet in decision making of any distributed network. Cloud computing is a new computing model that provides computing resources to…”
Get full text
Conference Proceeding -
6
Mulberry Leaves Diseases and Disease Identification Techniques
Published in 2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS) (24-11-2023)“…In sericulture, the young caterpillars of the common silk moth, also known as "Bombyx Mori," are the most widely used species of silkworm. For the purpose of…”
Get full text
Conference Proceeding -
7
Novel approach of Using Periocular and Iris Biometric Recognition in the Authentication of ITS
Published in 2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP) (23-12-2022)“…In a fast technology growing world with respect to the data, information security is the major criteria. To have the robust system the security is the foremost…”
Get full text
Conference Proceeding -
8
Trusted path between two entities in Cloud
Published in 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) (01-01-2016)“…Trust plays an important role in the security of resources of the emerging technology called Cloud. To develop a strong trust there has to be a strong trust…”
Get full text
Conference Proceeding