S. Karthika

Learn More
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality(More)
Security is the biggest challenge in MANET. MANET presents various types of security attacks on data exchanges taking place between source and destination. In this misbehavior detection schemes for conventional wireless networks has opposed black hole attack and malicious node occur routing, this proposed technique as a great challenges in networks. In this(More)
In this paper, the authors propose a naïve methodology, IBeH, for detecting the community structure of the covert network. Unlike most of the existing methods, IBeH, considers the roles, contribution metric and similarity of the actor profiles. The proposed method computes the reciprocating factor among the actors using the contribution metric rather(More)
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality(More)
Ceramic tiles have become very popular and are used in the flooring of offices and shopping malls. As testing the quality of tiles manually in a highly polluted environment in the manufacturing industry is a labor-intensive and time consuming process, analysis is carried out on the tile images. This paper discusses an automated system to detect the defects(More)
  • Mrs R Sridevi, S Karthika, Assistant Professor
  • 2014
This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-" voice over internet protocol (IP) "(More)
Cloud computing is making a revolutionary change in IT industries and other organizations. Salesforce are the top cloud service providers.Cloud provides different types of services such as Saas, Iaas, Paas.Different organizations choose cloud because of its efficiency, scalability and high utilization. This paper deals with the various cloud computing(More)
In recent days terrorism poses a threat to homeland security. The major problem faced in network analysis is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more concerned about the network structure rather than the node(More)
  • 1