Sathya Gunasekaran

  • Citations Per Year
Learn More
Computer Networks face a constant struggle against intruders and attackers. Attacks on distributed systems grow stronger and more prevalent each and every day. Intrusion detection methods are a key to control and potentially eradicate attacks on a system. An Intrusion detection system pertains to the methods used to identify an attack on a computer or(More)
Censorship circumvention systems that use HTTP as cover traffic make tradeoffs between deniability and performance by offering either deniability at the expense of performance (e.g., Infranet) or performance at the expense of deniability (e.g., StegoTorus). These systems do so because HTTP is typically very asymmetric, with very little capacity to carry(More)
In the face of Scheduling, the tasks are scheduled by using Different scheduling Algorithms. Each Scheduling Algorithm has own particularity and complexity during Scheduling. In order to get the minimum time for the execution of the task the Scheduling algorithm must be good, once the performance of the scheduling algorithm is good then automatically the(More)
World Wide Web is a repository containing an enormous amount of documents and hyperlinked documents. The information on the web is shared based on the user interest. The search through these documents considers the user query and retrieves documents that are related. Traditionally the search engine includes three operations such as searching, indexing and(More)
  • 1