Venkatesh Jaganathan

Learn More
With recent performance increase in the area of wireless mobile communications, mobile ad-hoc networks are playing a wide spread usage in the areas of military and other applications. But this mobile ad-hoc network does not have any centralized authorities like an access-point or a router as in case of wireless and wired networks to control and take care of(More)
Copyright © 2016 Venkatesh Jaganathan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Computing information intelligence is considered an extremely important asset to any organization.(More)
Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a(More)
  • 1