A review on performance of voice feature extraction techniques
D Prabakaran, R Shyamala - 2019 3rd International …, 2019 - ieeexplore.ieee.org
In the digital era, the computing applications are to be secured from anonymous attacks by
strengthening the authentication credentials. Numerous methodologies and algorithms have …
strengthening the authentication credentials. Numerous methodologies and algorithms have …
[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment
D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
The rise of the digital economy and the comfort of accessing by way of user mobile devices
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
Design of optimized compressed sensing routing protocol for wireless multimedia sensor networks
S Ramesh, C Yaashuwanth… - International Journal of …, 2021 - Wiley Online Library
Wireless multimedia sensor networks (WMSNs), with its exceptional properties, have found
a sturdy and steady spot in automation and surveillance applications. The WMSN had made …
a sturdy and steady spot in automation and surveillance applications. The WMSN had made …
Secure channel for financial transactions in cloud environment using blockchain technology
D Prabakaran, S Ramachandran - 2022 - researchsquare.com
The progression of digital technology impacts the users to migrate from traditional financial
transactions to the online transaction system for performing their financial transactions. The …
transactions to the online transaction system for performing their financial transactions. The …
A strong authentication for fortifying wireless healthcare sensor network using elliptical curve cryptography
D Prabakaran, K Sheela - 2021 IEEE Mysore Sub Section …, 2021 - ieeexplore.ieee.org
The wireless sensor network is the emerging technology with spatially placed electronic
sensors to measure the vital parameters. The necessity of monitoring the patient” s critical …
sensors to measure the vital parameters. The necessity of monitoring the patient” s critical …
Privacy and security of smart systems
K Suresh Kumar, D Prabakaran… - … for sustainable smart …, 2022 - Wiley Online Library
A smart city is a digitized urban area with a collection of electronic sensor nodes for data
collection to maintain the resources and various features efficiently. The smart systems …
collection to maintain the resources and various features efficiently. The smart systems …
Cloud attacks and defence mechanism for SaaS: a survey
AH Shaikh, BB Meshram - … Computing and Networking: Proceedings of IC …, 2022 - Springer
Cloud computing systems are the de-facto deployments for any user data and processing
requirements. Due to a wide variety of cloud systems available today, increase in the …
requirements. Due to a wide variety of cloud systems available today, increase in the …
[PDF][PDF] Enhancing authenticity and trust in social media: an automated approach for detecting fake profiles
MV Unni, S Jeevananda… - Indonesian Journal of …, 2024 - researchgate.net
Fake profile detection on social media is a critical task intended for detecting and alleviating
the existence of deceptive or fraudulent user profiles. These fake profiles, frequently …
the existence of deceptive or fraudulent user profiles. These fake profiles, frequently …
MCHeRA: An Efficient Multi Cloud Heuristic Resource Allocation using Grey Wolf Optimization
P Gandhimathi, S Kiruthiga, KV BIndu… - … Conference on Data …, 2024 - ieeexplore.ieee.org
Cloud computing is a cutting-edge technology that has gained immense popularity in the
present era. The burgeoning demand for services has necessitated the development of a …
present era. The burgeoning demand for services has necessitated the development of a …
A Novel Deep Reinforcement Learning (DRL) Method for Detecting Evasion Attack in Iot Environment
S Ramachandran, D Prabakaran - … International Conference on …, 2024 - ieeexplore.ieee.org
The growing prevalence of Internet of Things (IoT) devices being connected to the internet
has resulted in an increase in security concerns, particularly concerning evasion attacks …
has resulted in an increase in security concerns, particularly concerning evasion attacks …