Comprehensive study of threats, their operational architecture, and adoption of threat modeling for their classification, form the foundation for development of secure technologies for cloud. Cloud platforms today assist providers. . .
In order to facilitate remote experimentation for multiple users, the project demonstrates the possibility of real-time shared access for multiplexing the usage of control and acquisition hardware. The project also. . .
Speaker recognition systems are useful for deriving intelligence information by tracking telephone conversations of people who are perceived to be a threat to the national security. Rules prohibit security agencies. . .
Attacks on information systems have grown exponentially in volume and in sophistication. While there are many security systems and ‘honeypots’ designed to harvest or trap the malware and study its. . .
The project ‘Security Event Processing Acceleration Using GPGPU’ proposes to provide a proof of concept for building a FPGA based NIDS for highspeed network environments. The proposed FPGA based NIDS would. . .
Visual cryptography is a perfectly secure way to protect secrets and is characterized by its decryption method. This project is to develop new visual cryptographic scheme satisfying certain conditions. In. . .
The project titled “Indoor Information Representation and Management System” is funded by Department of Science and Technology, India. Dr. Vidhya Balasubramanian, Associate Professor, Department of Computer Science Engineering, Amrita School of Engineering, Coimbatore, is the Principal Investigator.
An indoor information system is a system that gives information about the details of a building such as the different spaces within the building, exits, and their properties and also. . .
The goal of this project is to create a hierarchical extendible data model for indoor information which can represent buildings, entities within it, utilities, objects inside the building, and sensors. . .