Search Results - "Kathrine, G Jaspher Willsie"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Improved optimizer with deep learning model for emotion detection and classification by Joseph, C Willson, Kathrine, G Jaspher Willsie, Vimal, Shanmuganathan, Sumathi, S, Pelusi, Danilo, Valencia, Xiomara Patricia Blanco, Verdú, Elena

    “…Facial emotion recognition (FER) is largely utilized to analyze human emotion in order to address the needs of many real-time applications such as…”
    Get full text
    Journal Article
  2. 2

    Software-defined network aided lightweight group key management for resource-constrained Internet of Things devices by Taurshia, Antony, Kathrine, G. Jaspher Willsie, Souri, Alireza, Vinodh, S.E., Vimal, S., Li, Kuan-Ching, Ilango, S. Sudhakar

    “…Software-Defined Network (SDN) and Network Function Virtualization (NFV) are key enablers for provisioning dynamic, virtual security services on demand. This…”
    Get full text
    Journal Article
  3. 3

    Intelligent System with the IoT: A survey on techniques of Artificial Intelligence over the field of Internet of Things by C, Willson Joseph, Willsie Kathrine, G. Jaspher

    “…Internet of Things (IoT) is a network of various devices connected via the Internet, and they are capable of collecting and trading information with one…”
    Get full text
    Conference Proceeding
  4. 4

    A secure framework for enhancing user authentication in cloud environment using biometrics by Kathrine, G. Jaspher Willsie

    “…Cloud is a ubiquitous computing technology dependent on geographically distributed computing entities like storage servers, dedicated systems and softwares. A…”
    Get full text
    Conference Proceeding
  5. 5

    Variants of phishing attacks and their detection techniques by Kathrine, G. Jaspher Willsie, Praise, Paradise Mercy, Rose, A. Amrutha, Kalaivani, Eligious C

    “…Phishing is a treacherous effort to steal private data from users like address, aadhar number, PAN card details, credit/debit card details, bank account…”
    Get full text
    Conference Proceeding
  6. 6

    AI for Detection of Missing Person by Vinavatani, B., Panna, Medha Rachel, Singha, Premila H, Kathrine, G. Jaspher Willsie

    “…Identifying missing people and bringing them back to their families has become a universal issue. Various research publications are examined in this paper…”
    Get full text
    Conference Proceeding
  7. 7

    Honeypot based Intrusion Detection System for Cyber Physical System by Edwin, G.Kingsle, Ewards, S.E. Vinodh, Willsie Kathrine, G. Jaspher, Palmer, G. Matthew, Bertia, A., Vijay, S.J.

    “…An intrusion detection system is a software programme or hardware that keeps an eye out for malicious activities or policy breaches on a network or in a…”
    Get full text
    Conference Proceeding
  8. 8

    Network Attacks and Prevention techniques - A Study by Kandan, A. Mani, JaspherWillsie Kathrine, G., Melvin, Alfred Raja

    “…There has been an increasing connectivity to the internet and with this increased connectivity, there is also a significant increase in security related…”
    Get full text
    Conference Proceeding
  9. 9

    A novel security framework for computational grid by Kathrine, G. J. W., Raj, B. E., Kirubakaran, E.

    “…The increase in the collaborative data sharing and usage has resulted in resource usage being more and more distributed. The need to access and use more and…”
    Get full text
    Conference Proceeding