关注
Santhosh Kumar B.J
Santhosh Kumar B.J
在 my.amrita.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Efficient realization of digital logic circuit using QCA multiplexer
M Goswami, B Kumar, H Tibrewal, S Mazumdar
2014 2nd International conference on business and information management …, 2014
522014
Comparative Study on AES and RSA Algorithm for Medical images
RRVK Santhosh Kumar B J, A Nair
International Conference on Communication and Signal Processing, 0502, 2017
40*2017
An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS) in MANET
AA Acharya, KM Arpitha, BJ Santhosh Kumar
International Journal of Engineering and Technology (IJET) 8 (2), 2016
292016
Vulnerability detection and prevention of SQL injection
BJS Kumar, PP Anaswara
International Journal of Engineering & Technology 7 (2.31), 16-18, 2018
202018
Hybridization of RSA and AES Algorithms for Authentication and Confidentiality of Medical Images
AN Santhosh Kumar B J, RR V K
International Conference on Communication and Signal Processing, 1057, 2017
18*2017
An Intrusion Detection and Prevention System against DOS Attacks for Internet-Integrated WSN
BJS Kumar, S Sinha
2022 7th International Conference on Communication and Electronics Systems …, 2022
112022
Detection and avoidance of web vulnerability using XSS
GK Nischitha, S Sahana, BJ Santhosh Kumar
Int J Recent Technol Eng 8 (2), 1737-1740, 2019
102019
Extraction of retinal blood vessel using artificial bee-colony optimization
K Kavya, MG Dechamma, BJS Kumar
Journal of Theoretical and Applied Information Technology 88 (3), 535-540, 2016
102016
Detection and Prevention of TCP SYN Flooding Attack in WSN Using Protocol Dependent Detection and Classification System
BJS Kumar, KRK Gowda
2022 IEEE International Conference on Data Science and Information System …, 2022
92022
Web application vulnerability detection using hybrid string matching algorithm
BJS Kumar, K Pujitha
International Journal of Engineering & Technology 7 (3.6), 106-109, 2018
82018
Detection and Prevention of UDP Protocol Exploiting and Smurf Attack in WSN Using Sequential Probability Ratio Test Algorithm
NK Singh, SK BJ
2023 International Conference on Data Science and Network Security (ICDSNS), 1-6, 2023
72023
Identifying Rank Attacks and Alert Application in WSN
DS Nair, S Kumar BJ
2021 6th International Conference on Communication and Electronics Systems …, 2020
72020
Integrity based Authentication and Secure Information Transfer Over Cloud for Hospital Management System
B Raj L., R Vandana, SK B.J.
2020 4th International Conference on Intelligent Computing and Control …, 2020
7*2020
Symmetric key based encryption and decryption using lissajous curve equations
BJ Santhosh Kumar, K Vijay
International Journal of Electrical and Computer Engineering (IJECE) 7 (1 …, 2017
72017
Fault Analysis Detection in Public Key Cryptosystems (RSA)
RK Mamathashree A M, SK B J
International Conference on Communication and Signal Processing, 0505, 2017
52017
Double Circle Localization for the Detection of Jamming Attack in Wireless Sensor Network
HJ Inchana, SK BJ
2022 IEEE North Karnataka Subsection Flagship International Conference …, 2022
42022
Jamming attack detection using ewma in clustered wireless sensor network
SK BJ, CS Shravya
2022 IEEE International Conference on Data Science and Information System …, 2022
42022
First Level Security System for Intrusion Detection and Prevention in LAN
R Abhijith, BJS Kumar
2021 2nd International Conference for Emerging Technology (INCET) 3 (10.1109 …, 2021
42021
A Method for Information Grabbing, Bypassing Security and Detecting Web Application Vulnerabilities
BRP B.J. Santhosh Kumar
International Journal of Engineering & Technology 7 (4), 762-765, 2018
42018
Detection and prevention of UDP reflection amplification attack in WSN using cumulative sum algorithm
BJS Kumar, VSS Gowda
2022 IEEE International Conference on Data Science and Information System …, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20