E. Sathiyamoorthy

  • Citations Per Year
Learn More
This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability and efficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison(More)
In the field of Network Security, Intrusion is the severe threat for various Networks. So an efficient Intrusion Detection System is required to detect the intrusions that are spread through the Network. The main idea of this paper is to reduce the average control path latency incurred between request and response of the system as well as the increasing the(More)
Data is growing more and more for the past few decades and its volume keeps on increasing rapidly, with the variety of unstructured data. This increases the amount of data storage for the major aspects of Business analysis, prediction, search, decision making and so on. Today’s world is totally revolutionized into the cloud, which decreases the necessity of(More)
The Intrusion Detection System (IDS) deals with the huge amount of network data that includes redundant and irrelevant features causing slow training and testing procedure, higher resource usage and poor detection ratio. Feature selection is a vital preprocessing step in intrusion detection. Hence, feature selec-tion is an essential issue in intrusion(More)
In the past many researchers worked in developing trust management models in various disciplines such as E-Business, Multi-Agent Systems, Web Services, Grid Computing, P2P networks, Adhoc networks etc. These trust models are lacking in accurate computation and evaluation of trustworthiness for the Semantic web services. The trust level is measured with(More)