Skip to main content

and
  1. No Access

    Article

    Detection of stealthy single-source SSH password guessing attacks

    Many of the network services (protocols like SSH, Telnet, HTTP, and FTP) implement password-based authentication for accessing system resources. Malicious entities carry out password guessing attacks to exploi...

    Gokul Kannan Sadasivam, Chittaranjan Hota, Anand Bhojan in Evolving Systems (2022)

  2. No Access

    Chapter and Conference Paper

    BlockForest: A Distributed Tree Structure

    Blockchain has broadened its boundaries from being a cryptocurrency application to a technology that comprises of varied domains and fields under its hood. However, applications are demanding quick services, f...

    Aditya Ranjan, Durvesh Deshmukh in Proceedings of the Future Technologies Con… (2022)

  3. No Access

    Book and Conference Proceedings

  4. No Access

    Article

    ARIVU: Making Networked Mobile Games Green

    With the improved processing power, graphic quality and high-speed wireless connection in recent generations of mobile phones, it looks more attractive than ever to introduce networked games on these devices. ...

    Anand Bhojan, Ananda L. Akhihebbal, Mun Choon Chan in Mobile Networks and Applications (2012)