Folgen
G.Jaspher Willsie Kathrine
G.Jaspher Willsie Kathrine
Karunya Institute of Technology and Sciences
Bestätigte E-Mail-Adresse bei karunya.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Cryptographic and Information Security Approaches for Images and Videos
S Ramakrishnan
CRC Press, 2018
562018
Variants of phishing attacks and their detection techniques
GJW Kathrine, PM Praise, AA Rose, EC Kalaivani
2019 3rd International Conference on Trends in Electronics and Informatics …, 2019
462019
Internet of Things based pest management using natural pesticides for small scale organic gardens
R Venkatesan, GJW Kathrine, K Ramalakshmi
Journal of Computational and Theoretical Nanoscience 15 (9-10), 2742-2747, 2018
432018
Smart card based time efficient authentication scheme for global grid computing
JWK Gnanaraj, K Ezra, EB Rajsingh
Human-centric Computing and Information Sciences 3, 1-14, 2013
372013
Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud
AAR Melvin, GJW Kathrine, SS Ilango, S Vimal, S Rho, NN Xiong, Y Nam
Transactions on Emerging Telecommunications Technologies 33 (4), e4287, 2022
262022
Smart card based remote user authentication schemes:A survey
PP G. Jaspher Willsie Kathrine, Dr. A. Kirubakaran
International Conference on modelling, Optimisation and Computing 38, 1318-1326, 2012
26*2012
Cloud security mechanisms for data protection : A survey
GJWK Allen oomen
International Journal of Multimedia and Ubiquitous Engineering 9 (9), 81-90, 2014
24*2014
A quest for best: A detailed comparison between drakvuf-vmi-based and cuckoo sandbox-based technique for dynamic malware analysis
AAR Melvin, GJW Kathrine
Intelligence in Big Data Technologies—Beyond the Hype: Proceedings of …, 2021
162021
IOT based smart irrigation system for home based organic garden
M Karunakanth, R Venkatesan, GJW Kathrine
International Journal of Pure and Applied Mathematics 119 (12), 16193-16199, 2018
152018
Job scheduling algorithms in grid computing–survey
GJW Kathrine, MU Ilaghi
International Journal of Engineering Research & Technology 1 (7), 1-5, 2012
122012
Biometric authentication and authorization system for grid security
GJW Kathrine, E Kirubakaran
Int. J. Hybrid Inf. Technol 4, 16, 2011
112011
A secure framework for enhancing user authentication in cloud environment using biometrics
GJW Kathrine
2017 International Conference on Signal Processing and Communication (ICSPC …, 2017
102017
Efficient Deep Learning-Based Cyber-Attack Detection for Internet of Medical Things Devices
A Judith, GJW Kathrine, S Silas
Engineering Proceedings 59 (1), 139, 2023
92023
A study about detecting ransomware by using different algorithms
A Bertia, SB Xavier, GJW Kathrine, GM Palmer
2022 International Conference on Applied Artificial Intelligence and …, 2022
92022
Comparative analysis of subdomain enumeration tools and static code analysis
GJ Kathrine, RT Baby, V Ebenzer
ISSN (Online), 2454-7190, 2020
92020
Support vector machine for classification of autism spectrum disorder based on abnormal structure of corpus callosum
S Jebapriya, D Shibin, JW Kathrine, N Sundar
International Journal of Advanced Computer Science and Applications 10 (9), 2019
92019
Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security
GJW Kathrine, E Kirubakaran
International Journal of Computer Applications 30 (5), 13-20, 2011
92011
Smart Grid Protection with AI and Cryptographic Security
DK Kumar, KK Reddy, GJW Kathrine
2024 3rd International Conference on Applied Artificial Intelligence and …, 2024
82024
Hybrid cryptographic algorithm to secure internet of things
GA Nikitha, GJW Kathrine, CR Duthie, V Ebenezer, S Silas
2023 7th International Conference on Intelligent Computing and Control …, 2023
72023
Intrusion Detection and Prevention System to Analyse and Prevent Malware using Machine Learning
V Ebenezer, R Devassy, GJW Kathrine
2023 7th International Conference on Trends in Electronics and Informatics …, 2023
72023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20