Biography

Prof. N. Jeyanthi

VIT University, India


Email: njeyanthi@vit.ac.in


Qualifications

2013  Ph.D., Velllore Institute of Technology, India

2006  M.Tech., Vellore Institute of Technology, India

1999  B.E., Madurai Kamaraj University, India


Publications (selected)

  1. Jeyanthi, N., & Iyengar, N. C. S. N. (2012). An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. Int. J. Netw. Secur., 14(5), 257-269.
  2. Jeyanthi, N., & Iyengar, N. C. S. (2012). Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment. International Journal of Communication Networks and Information Security, 4(3), 163.
  3. Thandeeswaran, R., Subhashini, S., Jeyanthi, N., & Durai, M. S. (2012). Secured multi-cloud virtual infrastructure with improved performance. Cybernetics and Information Technologies, 12(2), 11-22.
  4. Jeyanthi, N., Iyengar, N. C. S., Kumar, P. M., & Kannammal, A. (2013). An enhanced entropy approach to detect and prevent DDoS in cloud environment. International Journal of Communication Networks and Information Security, 5(2), 110.
  5. Jeyanthi, N., Barde, U., Sravani, M., Tiwari, V., & Iyengar, N. C. S. N. (2013). Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP. International Journal of Communication Networks and Distributed Systems, 11(3), 262-279.
  6. Jeyanthi, N., & Iyengar, N. C. S. N. (2013). Escape-on-sight: an efficient and scalable mechanism for escaping ddos attacks in cloud computing environment. Cybernetics and Information Technologies, 13(1), 46-60.
  7. Jeyanthi, N., & Mogankumar, P. (2014). A virtual firewall mechanism using army nodes to protect cloud infrastructure from ddos attacks. Cybernetics and Information Technologies, 14(3), 71-85.
  8. Gitanjali, J., Jeyanthi, N., Ranichandra, C., & Pounambal, M. (2014, June). ASCII based cryptography using unique id, matrix multiplication and palindrome number. In The 2014 International Symposium on Networks, Computers and Communications (pp. 1-3). IEEE.
  9. Jeyanthi, N., Thandeeswaran, R., & Mcheick, H. (2014, June). SCT: secured cloud based telemedicine. In The 2014 International Symposium on Networks, Computers and Communications (pp. 1-4). IEEE.
  10. Brindha, K., & Jeyanthi, N. (2015). Secured document sharing using visual cryptography in cloud data storage. Cybernetics and Information Technologies, 15(4), 111-123.
  11. Brindha, K., & Jeyanthi, N. (2015, February). Securing cloud data using visual cryptography. In International Confernce on Innovation Information in Computing Technologies (pp. 1-5). IEEE.
  12. Jeyanthi, N. (2016). Internet of things (iot) as interconnection of threats (iot). In Security and Privacy in Internet of Things (IoTs) (pp. 23-42). CRC Press.
  13. Vijayan, R., & Jeyanthi, N. (2016). A survey of trust management in mobile ad hoc networks. International Journal of Applied Engineering Research, 11(4), 2833-2838.
  14. Jeyanthi, N., & Thandeeswaran, R. (Eds.). (2017). Security Breaches and Threat Prevention in the Internet of Things. IGI Global.
  15. Brindha, K., & Jeyanthi, N. (2017). Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage. Int. J. Netw. Secur., 19(5), 684-693.
  16. Prabadevi, B., & Jeyanthi, N. (2018). A framework to mitigate ARP sniffing attacks by cache poisoning. International Journal of Advanced Intelligence Paradigms, 10(1-2), 146-159.
  17. Jeyanthi, N., Abraham, A., & Mcheick, H. (Eds.). (2019). Ubiquitous Computing and Computing Security of IoT. Springer International Publishing.
  18. Jeyanthi, N., Shastri, S. B., Baranwal, P., & Thandeeswaran, R. (2020, September). Implementation and Analysis of Various Visual Cryptographic Techniques for Sensitive Data Protection. In 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 375-379). IEEE.
  19. Jayabalan, J., & Jeyanthi, N. (2021, January). A study on distributed consensus protocols and algorithms: the backbone of blockchain networks. In 2021 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-10). IEEE.
  20. Jayabalan, J., & Jeyanthi, N. (2022). Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. Journal of Parallel and Distributed Computing, 164, 152-167.
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top