SECURING IOT-DRIVEN HEALTHCARE SYSTEMS - A MACHINE AND DEEP LEARNING APPROACH TO THREAT DETECTIONMohammed Ismail1, A. Ramesh Babu2
|
AUTOREGRESSIVE MODEL BASED ON BAYESIAN APPROACH FOR TEXTURE REPRESENTATIONT. Karthikeyan1 and R. Krishnamoorthy2
|
NASH BARGAINING BASED BANDWIDTH ALLOCATION IN COGNITIVE RADIO FOR DELAY CRITICAL APPLICATIONSKalyani Kulkarni, Bharat S. Chaudhari
|
A NOVEL ALGORITHM FOR OPTIMAL WAVELENGTH AND BANDWIDTH ALLOTMENT IN ETHERNET PASSIVE OPTICAL NETWORKShyam Sunder Karma
|
DCR-BASED HYBRID BLACK-HOLE AND GRAY-HOLE ATTACK DETECTION IN MANETP Rathiga1, S Sathappan2
|
A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMST. Subbulakshmi1, P. Parameswaran2, C. Parthiban3, M. Mariselvi4, J. Adlene Anusha5, G. Mahalakshmi6
|