E. Kirubakaran

Learn More
Remote user authentication scheme has been widely adopted in today's web-enabled world due to increasing online threats and insecure communication. Security and privacy are two most important factors in today's real time applications. Thus many schemes have enhanced the traditional password based authentication scheme so that the number of online attacks(More)
Wireless networks are becoming increasingly popular among corporate and home users worldwide. Users are looking forward to new technologies that allow them to communicate anytime, anywhere, and using any communication device. Toward this end, wireless communications are foreseen to play a key role in future communication systems. The primary advantages of(More)
Making a network foolproof is a very important task that every Intrusion Detection System should provide to the network. Areas of deployment of an IDS is also an important task that helps in efficient functioning of the system. Deploying the IDS in all the systems is a very inefficient strategy that reduces the performance of the entire network, while(More)
Weather forecasting is a crucial application in meteorology. Weather is a continuous, data-intensive, multidimensional, dynamic process that makes weather forecasting a formidable challenge. This paper proposes a novel method to develop a service oriented architecture for a weather information system and forecast weather using data mining techniques. Web(More)
Data Mining is the efficient knowledge discovery form database. It is also form of knowledge discovery essential for solving problem in specific domain like health care, business and other field. The proposed system is based on population based on heuristic search technique, which can used to solve combinatorial optimization problem. Our research focus on(More)
This paper presents a method of encryption that enhances the security of vital data against brute force attack. The method is based on dual key encryption in which two different keys encrypt the data simultaneously, one being the regular key and the other being the time of key entry. The encryption process uses conventional encryption methods with some(More)
Web mining is a rapidly growing research area. It consists of Web usage mining, Web structure mining, and Web content mining. Web usage mining refers to the discovery of user access patterns from Web usage logs. Web structure mining tries to discover useful knowledge from the structure of hyperlinks. Web content mining aims to extract/mine useful(More)
The increase in the collaborative data sharing and usage has resulted in resource usage being more and more distributed. The need to access and use more and more distributed computers has led to the development of Grid Technologies. This paper discusses the security requirements of the grid environment against potential threats of day to day attacks. This(More)
Detecting intrusions in a network is one of the major functionalities that cannot be overlooked. Even though the intrusion detection systems in networks tend to perform their best, the other side is always ahead conjuring new attacks every time. Further, detecting an attack earlier or at least as soon as the attack has occurred is the only way to counter(More)