RQA based approach to detect and prevent DDoS attacks in VoIP networks N Jeyanthi, R Thandeeswaran, J Vinithra Cybernetics and Information Technologies 14 (1), 11-24, 2014 | 19 | 2014 |
Secured multi-cloud virtual infrastructure with improved performance R Thandeeswaran, S Subhashini, N Jeyanthi, MAS Durai Cybernetics and information technologies 12 (2), 11-22, 2012 | 19 | 2012 |
Security Breaches and Threat prevention in the Internet of things N Jeyanthi, R Thandeeswaran IGI Global, 2017 | 16 | 2017 |
SCT: secured cloud based telemedicine N Jeyanthi, R Thandeeswaran, H Mcheick The 2014 International Symposium on Networks, Computers and Communications, 1-4, 2014 | 10 | 2014 |
A recurrence quantification analytical approach to detect DDoS attacks N Jeyanthi, J Vinithra, R Thandeeswaran, NCSN Iyengar 2011 International Conference on Computational Intelligence and …, 2011 | 10 | 2011 |
DPCA: Dual Phase Cloud Infrastructure Authentication R Thandeeswaran, MAS Durai International Journal of Communication Networks and Information Security 8 …, 2016 | 8 | 2016 |
Office in cloud: approach to authentication and authorization M Gawannavar, P Mandulkar, R Thandeeswaran, N Jeyanthi Recent Advances in Communications and Networking Technology (Formerly Recent …, 2015 | 8 | 2015 |
RESCUE: three phase authentication to detect and prevent DDoS attacks in cloud computing environment N Jeyanthi, H Shabeeb, R Thandeeswaran, MAS Durai International Journal of Engineering, Transaction B: Applications 27 (8 …, 2014 | 7 | 2014 |
A complete survey on blood pressure monitoring devices and applications. TR Jeyanthi N, Gokulnath BV Biomedical Research 29 (21), 3751-3765, 2018 | 6* | 2018 |
Wide-ranging survey on authentication mechanisms R Thandeeswaran, MS Durai vol 11, 4114-4117, 2016 | 6 | 2016 |
AutiTRACK: monitoring autism patients with IoT M Gawannavar, N Jeyanthi, R Thandeeswaran International Journal of Telemedicine and Clinical Practices 1 (4), 314-322, 2016 | 4 | 2016 |
Cloud based VoIP Application in Aircraft Data Networks R Thandeeswaran, N Jeyanthi International Journal of Grid and Distributed Computing 7 (6), 11-18, 2014 | 4 | 2014 |
A general model for an instructional video-based personalized programming learning environment and its practical implications TSS Kumar, R Thandeeswaran 2023 12th international conference on advanced computing (icoac), 1-6, 2023 | 3 | 2023 |
RSJ approach for user authentication A Rawat, AK Singh, J Jithin, N Jeyanthi, R Thandeeswaran Proceedings of the International Conference on Advances in Information …, 2016 | 3 | 2016 |
SECURING SERVICE SET IDENTIFIER OF WIRELESS NETWORK NJ R. Thandeeswaran, Ankita Vinod Mandekar International Journal of Pharmacy & Technology 8 (3), 16605-16610, 2016 | 2* | 2016 |
Novel survey on detection of ddos attack using traceback technique in voip networks R Thandeeswaran, A Asha, N Jeyanthi Mathematical Archive 2, 2229-5046, 2011 | 2 | 2011 |
Novel Authentication Mechanism Using Blockchain N Jeyanthi, S Chatterjee, ED Srujana, R Thandeeswaran SPAST Abstracts 1 (01), 2021 | 1 | 2021 |
Managing security services in heterogenous networks: Confidentiality, integrity, availability, authentication, and access control R Thandeeswaran, T Perumal, K Ma, N Jeyanthi CRC Press, 2020 | 1 | 2020 |
Bi-level user authentication for enriching legitimates and eradicating duplicates in cloud infrastructure R Thandeeswaran, MAS Durai International Journal of Computer Aided Engineering and Technology 12 (1 …, 2020 | 1 | 2020 |
AN EFFICIENT AND SECURE BIOMETRIC AUTHENTICATION SCHEME FOR MCOMMERCE RS R. Thandeeswaran, Hamid Mcheick, N. Jeyanthi, Hemant A, Ajay T International Journal of Civil Engineering and Technology 8 (12), 429-437, 2017 | 1 | 2017 |