Abstract Proceedings of ICIRESM – 2020
Full conference PDF is available to the subscribed user. Use your subscription login to access,
CDSTORE: TOWARD RELIABLE, SECURE, AND COST-EFFICIENT CLOUD STORAGE VIA CONVERGENT DISPERSAL
Dr.V.Priya, M.Sneha
cloud storage, convergent dispersal, two-stage deduplication, reliability, security, cost-efficiency
Abstract Proceedings of ICIRESM – 2020
13/11/2020
171
20171
AN SCALABLE ESTIMATING STRENGTH OF JAMMING DISTRIBUTION CLUSTER FORMAT FOR WIRELESS SENSOR NETWORKS
Dr.C.Viji, C.Prabhadevi
wireless sensor networks, clustering, node categorization, bad nodes, packet dropping, modification, security, efficiency
Abstract Proceedings of ICIRESM – 2020
13/11/2020
172
20172
GEOGRAPHIC ROUTING AND RECOVERY ROUTING ALGORITHM FOR MOBILE TRACKING IN NLOS ENVIRONMENT
Dr.R.Sharmila, A.Manjurekha
NLOS mitigation, GBSBEM, geographic routing, recovery routing, mobile tracking
Abstract Proceedings of ICIRESM – 2020
13/11/2020
173
20173
PRODUCT FLOW PLANNING AND DECISION SUPPORT SYSTEM
S.Iswarya, Dr.P.Periyasamy
product flow planning, decision support system, demand uncertainty, PHP, Ajax, JQuery, MySQL
Abstract Proceedings of ICIRESM – 2020
13/11/2020
174
20174
DATA SPOOFING AND INTRUSION DETECTION SYSTEM AES ALGORITHM
T.Sathya Priya, J.Sowmya
data spoofing, intrusion detection system, AES algorithm, centralized storage, data stream analysis, file access monitoring, user behavior analysis
Abstract Proceedings of ICIRESM – 2020
13/11/2020
175
20175
ON QUALITY OF MONITORING FOR MULTI-CHANNEL WIRELESS INFRASTRUCTURE NETWORKS
R.Sathya Priya, Dr.D.Karthikeswaran
passive monitoring, quality of monitoring, multi-channel wireless networks, sniffers, user-centric model, sniffer-centric model, approximation algorithms, IP trace back algorithm, privacy
Abstract Proceedings of ICIRESM – 2020
13/11/2020
176
20176
PASSBYOP: BRING YOUR OWN PICTURE FOR SECURING GRAPHICAL PASSWORDS
R.Sharmila, A.Akthar Ruksana
graphical passwords, physical tokens, optical features, reliability, usability, security, observation attacks
Abstract Proceedings of ICIRESM – 2020
13/11/2020
177
20177
REMOTE DEVICE EXPLORER SYSTEM
Dr.K.Swathi, S.Jayanthi
Remote Device Explorer System, client-server application, network administrator, node accessibility, misuse of system resources, remote control, security threats
Abstract Proceedings of ICIRESM – 2020
13/11/2020
178
20178
DISTRIBUTED AND FAIR BEACONING RATE ADAPTATION FOR CONGESTION CONTROL IN VEHICULAR NETWORKS
Dr.S.Selvakumar, P.Poornima
beaconing rate control, fairness, NUM, vehicular networks, congestion control, simulation
Abstract Proceedings of ICIRESM – 2020
13/11/2020
179
20179
DATA CENTER ARCHITECTURE BASED TOR NETWORK USING AGAINST ATTACKER
Dr.K.Poongothai, S.Sangeetha, M.Brindha
Tor, anonymity, data center architecture, security, performance, scalability
Abstract Proceedings of ICIRESM – 2020
13/11/2020
180
20180
IMPORTANT DAYS
Paper Submission Last Date
October 20th, 2024
Notification of Acceptance
November 7th, 2024
Camera Ready Paper Submission & Author's Registration
November 1st, 2024
Date of Conference
November 15th, 2024
Publication
January 30th, 2025