Browsing by Author Santhi Thilagam, P.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 45 to 63 of 63 < previous 
Issue DateTitleAuthor(s)Supervisor(s)
2012Optimal scheduling of computational task in cloud using Virtual Machine TreeAchar, R.; Santhi Thilagam, P.; Shwetha, D.; Pooja, H.; Roshni; Andrea-
2015Optimization of countour based template matching using GPGPU based hexagonal frameworkBhagya, M.; Tripathi, S.; Santhi Thilagam, P.-
2003Optimization of countour based template matching using GPGPU based hexagonal frameworkBhagya, M.; Tripathi, S.; Santhi Thilagam, P.-
2019Privacy-preserving searchable encryption scheme over encrypted data supporting dynamic updateRashmi, R.; Siva, Kumar, D.V.N.; Santhi Thilagam, P.-
2019A Probabilistic Model of Clock Offset Estimator (PMCOE) for Clock Synchronization in Wireless Sensor NetworkUpadhyay, D.; Dubey, A.K.; Santhi Thilagam, P.-
2008A QoS broker based architecture for dynamic web service selectionD'Mello, D.A.; Ananthanarayana, V.S.; Santhi Thilagam, P.-
2008An RDF approach for discovering the relevant semantic associations in a social networkA.k., T.; Santhi Thilagam, P.-
2014Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networksKarri, G.R.; Santhi Thilagam, P.-
2019Searchable encryption approaches: attacks and challengesSiva Kumar, D.V.N.; Santhi Thilagam, P.-
2016Securing native XML database-driven web applications from XQuery injection vulnerabilitiesPalsetia, N.; Deepa, G.; Ahmed, Khan, F.; Santhi Thilagam, P.; Pais, A.R.-
2016Securing web applications from injection and logic vulnerabilities: Approaches and challengesDeepa, G.; Santhi Thilagam, P.-
2007Semantic partition based association rule mining across multiple databases using abstractionSanthi Thilagam, P.; Ananthanarayana, V.S.-
2012SQL injection attack mechanisms and prevention techniquesChandrashekhar, R.; Mardithaya, M.; Santhi Thilagam, P.; Saha, D.-
2019A statistical tool for time synchronization problem in WSNUpadhyay, D.; Dubey, A.K.; Santhi Thilagam, P.-
2017Target specific influence maximization: An approach to maximize adoption in labeled social networksTejaswi, V.; Bindu, P.V.; Santhi Thilagam, P.-
2012Taxonomy of network layer attacks in wireless mesh networkReddy, K.G.; Santhi Thilagam, P.-
2015Time stamp based set covering greedy algorithmVasanthi, P.; Tejaswi, V.; Santhi Thilagam, P.-
2018Time synchronization problem of wireless sensor network using maximum probability theoryUpadhyay, D.; Dubey, A.K.; Santhi Thilagam, P.-
2011Towards evaluating resilience of SIP server under low rate DoS attackKumar, A.; Santhi Thilagam, P.; Pais, A.R.; Sharma, V.; Sadalkar, K.M.-