Karthik Sadasivam

Learn More
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network(More)
Security in MANETs is of prime importance in several scenarios of deployment such as battlefield, event coverage, etc. The traditional non-secure routing protocols for MANETs fail to prevent against attacks such as DoS, spoofing and cache poisoning. One of the primary goals of designing secure routing protocols is to prevent the compromised nodes in the(More)
Across the US and the rest of the world, there exists a lack of computer security components in many CS/IT curricula. For those programs that do have such components in computer security, a common difficulty is to integrate " real-world " labs into the courses, in order to provide hands-on experiences to the learners. Due to concerns for security breaches(More)
The " International Journal of Pharma and Bio Sciences " (IJPBS) is an international journal in English published quarterly. The aim of IJPBS is to publish peer reviewed research and review articles rapidly without delay in the developing field of pharmaceutical and biological sciences ABSTRACT The search for novel drugs from higher plants led to the(More)
The " International Journal of Pharma and Bio Sciences " (IJPBS) is an international journal in English published quarterly. The aim of IJPBS is to publish peer reviewed research and review articles rapidly without delay in the developing field of pharmaceutical and biological sciences ABSTRACT Antioxidants generally possess the ability to protect the body(More)
  • 1