scispace - formally typeset
D

D. Sangeetha

Researcher at Madras Institute of Technology

Publications -  23
Citations -  278

D. Sangeetha is an academic researcher from Madras Institute of Technology. The author has contributed to research in topics: Cloud computing & Encryption. The author has an hindex of 7, co-authored 20 publications receiving 130 citations. Previous affiliations of D. Sangeetha include Anna University & Mother Teresa Women's University.

Papers
More filters
Journal ArticleDOI

A Survey on malware analysis and mitigation techniques

TL;DR: A detailed study on sophisticated attack and evasion techniques used by the contemporary malwares is presented and existing malware analysis techniques, application hardening techniques and CPU assisted application security schemes are discussed.
Journal ArticleDOI

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks

TL;DR: The experimental result confirms that the proposed Intrusion Detection Honeypot significantly improves the ransomware detection time, rate, and accuracy compared with the existing state of the art ransomware detection model.
Journal ArticleDOI

Role-based policy to maintain privacy of patient health records in cloud

TL;DR: The proposed MediTrust combines two schemes namely RBAC and attribute-based encryption (ABE) and works on semantic database, ensuring the accessibility of patient data for different access controls, and is better than existing work in terms of time complexity and computational overhead.
Proceedings ArticleDOI

WC-PAD: Web Crawling based Phishing Attack Detection

TL;DR: A three phase attack detection named as Web Crawler based Phishing Attack Detector(WC-PAD) has been proposed, which gives 98.9% accuracy in both phishing and zero-day phishing attack detection.
Proceedings ArticleDOI

Modified balanced energy efficient network integrated super heterogeneous protocol

TL;DR: A modified and improvised algorithm in electing the cluster head and an overall cluster head, which shows drastic improvement in the network lifetime is proposed, which differentiates and makes the proposed m-BEenISH protocol better than the existing BEENISH protocol.