Skip to main content

and
  1. No Access

    Article

    Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy

    This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the isolation of end-user data and resources into tenants to en...

    Santosh Kumar Henge, R. Rajakumar, P. Prasanna in Multimedia Tools and Applications (2024)

  2. Article

    Open Access

    Intrusion detection systems for wireless sensor networks using computational intelligence techniques

    Network Intrusion Detection Systems (NIDS) are utilized to find hostile network connections. This can be accomplished by looking at traffic network activity, but it takes a lot of work. The NIDS heavily utiliz...

    Vaishnavi Sivagaminathan, Manmohan Sharma, Santosh Kumar Henge in Cybersecurity (2023)