Search Results - "Vinodh, S.E."

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    POLLING AND DUAL-LEVEL TRAFFIC ANALYSIS FOR IMPROVED DOS DETECTION IN IEEE 802.21 NETWORKS by Vadakkan, Nygil Alex, Ewards S.E., Vinodh

    Published in ICTACT journal on communication technology (01-06-2014)
    “…The IEEE 802.21 standard was developed for communication of devices in a heterogeneous environment which included greater support for handoffs. This paper…”
    Get full text
    Journal Article
  2. 2

    Software-defined network aided lightweight group key management for resource-constrained Internet of Things devices by Taurshia, Antony, Kathrine, G. Jaspher Willsie, Souri, Alireza, Vinodh, S.E., Vimal, S., Li, Kuan-Ching, Ilango, S. Sudhakar

    “…Software-Defined Network (SDN) and Network Function Virtualization (NFV) are key enablers for provisioning dynamic, virtual security services on demand. This…”
    Get full text
    Journal Article
  3. 3

    Firmware Vulnerability Detection in Embedded Systems and Internet of Things by Hemram, Saimon, Kathrine, G. Jaspher W, Palmer, G. Matthew, Ewards, S.E. Vinodh

    “…Since its introduction, the Internet of Things (IoT) and Embedded system has advanced significantly. To create a safe IoT solution, the standardization process…”
    Get full text
    Conference Proceeding
  4. 4

    Predictive Vehicle Maintenance using Deep Neural Networks by Johnson, Neil, Ewards, S.E. Vinodh, Silas, Salaja, Kathrine, G. Jaspher W

    “…The integration of smart sensors and Internet of Things (IoT) devices within vehicles is transforming the automotive industry, generating a wealth of data with…”
    Get full text
    Conference Proceeding
  5. 5

    Honeypot based Intrusion Detection System for Cyber Physical System by Edwin, G.Kingsle, Ewards, S.E. Vinodh, Willsie Kathrine, G. Jaspher, Palmer, G. Matthew, Bertia, A., Vijay, S.J.

    “…An intrusion detection system is a software programme or hardware that keeps an eye out for malicious activities or policy breaches on a network or in a…”
    Get full text
    Conference Proceeding
  6. 6

    Detection of Cyber-attacks in Food Industry using Multi-Layer Perceptron and Convolution Neural Network by Beulah Rani, I, Ewards, S.E Vinodh, Palmer, G. Matthew, Kathrine, G.Jaspher W.

    “…Food insecurity refers to the lack of access to sufficient food, and this is a critical problem that many countries are currently tackling. While there are…”
    Get full text
    Conference Proceeding
  7. 7

    Intrusion Detection System for Cyber Attacks in Food and Beverage Industry by I, Beulah Rani, Palmer, G. Matthew, Kathrine, G. Jaspher W., Ewards, S.E Vinodh

    “…Industrial control systems (ICS) are essential for interconnecting equipment and tracking its properties in Food and Beverage industry. The use of ICS is…”
    Get full text
    Conference Proceeding
  8. 8

    Detection and Classification of Diseases of Banana Plant Using Local Binary Pattern and Support Vector Machine by Aruraj, Akshaya, Alex, Ashish, Subathra, M.S.P, Sairamya, N.J, George, S. Thomas, Ewards, S.E. Vinodh

    “…Banana plantation is a commercial agricultural practice of huge significance especially in Asian and African countries. Banana production is affected by…”
    Get full text
    Conference Proceeding