Follow
SUDHA L
SUDHA L
Assistant Professor of Computer Science,Anna University
Verified email at saec.ac.in
Title
Cited by
Cited by
Year
Cloud Based Vehicle Parking System for Anonymous Place Using Internet of Things
R Murugan, RVV Sundar, BR Choudry, ML Sudha, MKB Aruna
International Journal of Advanced Engineering Research and Science 4 (2), 237039, 2017
52017
Nature inspired meta-heuristic optimization algorithms capitalized
V Sureka, L Sudha, G Kavya, KB Aruna
2020 6th International conference on advanced computing and communication …, 2020
32020
An incremental snapshot system using smart backup for persistent disks in cloud
S Veena, DJ Aravindhar, L Sudha, KB Aruna
12021
Leer detection with webcam in a desktop environment
PR Sudha, L Sudha, KB Aruna, V Sureka, K Jayanthi
2017 International Conference on Information Communication and Embedded …, 2017
2017
Query Specific Fusion for Image Retrieval System using Ontology
K.B.Aruna, P.Ruba Sudha, L.Sudha,S.Gunanandhini
International Journal of Computer and Organization Trends 30 (1), 10, 2016
2016
MONITORING GREENHOUSE USING IOT
S L
National conference on Innovative Trends in Engineering and Technology, 2016
2016
PROFIT DRIVEN HYBRID CLOUD MANAGEMENT FOR MULTIMEDIA CLOUD COMPUTING
LS K.Eesha,C.Divya,R.Deepika
International Journal of Advanced Research Trends in Engineering and …, 2016
2016
DETECTING SELFISH AND MISBEHAVING NODES IN DISRUPTION TOLERANT NETWORKS
S L
International conference on Emerging trends and challenges in Science …, 2013
2013
AN ADAPTIVE SECURITY SCHEME TO MITIGATE JAMMING AND DOS ATTACKS IN WIRELESS NETWORKS
S L
National conference on Advances in computer science and applications, 2013
2013
AN ADAPTIVE RPH APPROACH TO MITIGATE DDOS ATTACKS IN ALLIED APPLICATION
S L
International conference on Smart Structures and Systems, 2013
2013
A REALISTIC APPROACH FOR THWARTING DISTRIBUTED DOS ATTACKS IN MULTIPARTY APPLICATIONS WITH CLOCK DRIFTS
S L
International conference on Sensing, Signal Processing and Security, 2013
2013
ACTIVE DEFENSE STRATEGY:TO THWART DDOS ATTACKS IN MULTIPARTY APPLICATION BY USING AN ADAPTIVE ALGORITHM
MS Sudha L
International conference on engineering and Technology, 2013
2013
DEFENDING DISRUPTION TOLERANT NETWORK FROM MISBEHAVING AND MALICIOUS NODES
sudha l
International Research Journal of Computer Science Engineering and …, 2013
2013
PREVENTION FROM ONLINE ATTACKS:CAPTCHA,A DEFENSE STRATEGY
sudha l
International Journal of Computer Science and Management Research 2 (3), 6, 2013
2013
DETECTION OF MISBEHAVING PACKET DROPPERS AND MODIFIERS IN WIRELESS NETWORKS USING AN ADAPTIVE PROTOCOL
MS Sudha.L
International Journal of Advanced Research in Computer and Communication …, 2013
2013
To Alleviate Distributed Dos Attacks in Allied Applications with Clock Drifts Usin g D P H
MS sudha L
International Journal of Engineering Associates 1 (3), 6, 2013
2013
TO ALLEVIATE DISTRIBUTED DOS ATTACKS IN ALLIED APPLICATIONS WITH CLOCK DRIFTS USIN DPH
S L
National conference on Recent Trends In Intelligent Computing & Image Processing, 2012
2012
COUNTERING DOS AND DDOS ATTACKS USING PBM MECHANISM IN MULTIPARTY APPLICATIONS
International Journal of Societal Applications of Computer Science 2 (3), 6, 0
The system can't perform the operation now. Try again later.
Articles 1–18