Browsing Supercomputer Education and Research Centre (SERC) by Advisor "Balakrishnan, N"
Now showing items 1-17 of 17
-
Applications Of Machine Learning To Anomaly Based Intrusion Detection
(2009-03-02)This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ... -
Applications Of Social Network Analysis To Community Dynamics
(2010-08-24)This thesis concerns Social Network Analysis as a mechanism for exploring Community Dynamics. To be able to use the Social Network methodologies, relationships existing between the modeling entities are required. In this ... -
Communication Structure and Mixing Patterns in Complex Networks
(2018-04-05)Real world systems like biological, social, technological, infrastructural and many others can be modeled as networks. The field of network science aims to study these complex networks and understand their structure and ... -
An Extension Of Multi Layer IPSec For Supporting Dynamic QoS And Security Requirements
(2013-08-30)Governments, military, corporations, financial institutions and others exchange a great deal of confidential information using Internet these days. Protecting such confidential information and ensuring their integrity and ... -
Fast Identification of Structured P2P Botnets Using Community Detection Algorithms
(2018-05-01)Botnets are a global problem, and effective botnet detection requires cooperation of large Internet Service Providers, allowing near global visibility of traffic that can be exploited to detect them. The global visibility ... -
Fast Solvers and Preconditioning Methods in Computational Electromagnetics
Method of Moments (MoM) is an integral equation based solver and is one of the most popular computational techniques to solve complex 3D Electromagnetic problems efficiently and accurately. Compared to the conventional ... -
Information Theoretic Approach To Extractive Text Summarization
(2009-04-13)Automatic text summarization techniques, which can reduce a source text to a summary text by content generalization or selection have assumed signifi- cance in recent times due to the ever expanding information explosion ... -
Intrusion Identification For Mobile Ad Hoc Networks
(2010-08-16)A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a multi hop packet radio network without the aid of any established infrastructure or centralized administration. Such ... -
Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
(2014-06-05)The rampant growth of the Internet has been coupled with an equivalent growth in cyber crime over the Internet. With our increased reliance on the Internet for commerce, social networking, information acquisition, and ... -
On Leveraging Dynamic Processes in Large Social Networks for Smart Cities
The concept of smart city which began as being synonymous with electronically networked community underwent significant changes with the growth in mobile devices and social networking. This expanded the outlook of smart ... -
Optimal Location of Distributed Generation to Reduce Loss in Radial Distribution Networks
(2018-06-26)Power losses are always a cause of worry for any power grid. In India, the situation is even worse. Though recent reports by Ministry of Power shows that Aggregate Technical and Commercial losses (AT &C losses) have come ... -
Performance Enhancement Of Intrusion Detection System Using Advances In Sensor Fusion
(2010-12-31)The technique of sensor fusion addresses the issues relating to the optimality of decision-making in the multiple-sensor framework. The advances in sensor fusion enable to perform intrusion detection for both rare and new ... -
QoS Over Multihop Wireless Networks
(2009-05-12)The aim of this work is to understand the requirements behind Quality of Service (QoS) for Multihop Wireless Networks and evaluate the performance of different such strategies. This work starts by establishing the basis ... -
Study and Design of Energy Efficient Block Cipher for Wireless Body Area Networks (WBANs)
With the advent of better health care and medical technology, as well as miniaturized devices with built-in radios, today we can see (WBANs) emerging as one of the main research topics. The sensor nodes worn by patients ... -
Study of RCS from Aerodynamic Flow using Parallel Volume-Surface Integral Equation
(2018-02-14)Estimation of the Radar Cross Section of large inhomogeneous scattering objects such as composite aircrafts, ships and biological bodies at high frequencies has posed large computational challenge. The detection of scattering ...