Volume 6 Issue 12 2024

Serial: 1

IMPLEMENTATION OF LOW POWER AND HIGH ACCURACY 2D FIR FILTER USING APPROXIMATE MULTIPLIER FOR IMAGE PROCESSING APPLICATIONS

Authors: Merfeena, Shanubha Mari Jero, Dyana Christilda
Page No: 1-18
Merfeena, Shanubha Mari Jero, Dyana Christilda. IMPLEMENTATION OF LOW POWER AND HIGH ACCURACY 2D FIR FILTER USING APPROXIMATE MULTIPLIER FOR IMAGE PROCESSING APPLICATIONS. 1-18. http://journalcybersecurity.com/wp-content/uploads/1-Dec-2024.pdf
Serial: 2

Automatic Medicine Dispatcher Using Tele-Monitoring System

Authors: SOFIA R
Page No: 1-5
SOFIA R. Automatic Medicine Dispatcher Using Tele-Monitoring System. 1-5. http://journalcybersecurity.com/wp-content/uploads/2-Dec-2024.pdf
Serial: 3

PV –STATCOM –A SMART INVERTER IN DISTRIBUTION SYSTEM USING PARKS TRANSFORMATION

Authors: Mr.D.Muruganandhan, Mr.J.Vijayaraghavan
Page No: 1-7
Mr.D.Muruganandhan, Mr.J.Vijayaraghavan. PV –STATCOM –A SMART INVERTER IN DISTRIBUTION SYSTEM USING PARKS TRANSFORMATION. 1-7. http://journalcybersecurity.com/wp-content/uploads/3-Dec-2024.pdf
Serial: 4

Visualizing Sorting Algorithms with ReactJS: Merge Sort and Quick Sort Demystified

Authors: Dr. Neha Gupta, Prateet Mishra, Khyati Patel, Palak Gandhi, Mustafa Panjiwala
Page No: 1-9
Dr. Neha Gupta, Prateet Mishra, Khyati Patel, Palak Gandhi, Mustafa Panjiwala. Visualizing Sorting Algorithms with ReactJS: Merge Sort and Quick Sort Demystified. 1-9. http://journalcybersecurity.com/wp-content/uploads/4-Dec-2024.pdf
Serial: 5

AUTOMATIC MEDICAL DISPATCHER WITH DYNAMIC TELE-MONITORING SYSTEM

Authors: S. Rajkumar, Dr.K.Sedhuraman, S.Kamali, S.Sowjanya, C.Hemalatha
Page No: 1-7
S. Rajkumar, Dr.K.Sedhuraman, S.Kamali, S.Sowjanya, C.Hemalatha. AUTOMATIC MEDICAL DISPATCHER WITH DYNAMIC TELE-MONITORING SYSTEM. 1-7. http://journalcybersecurity.com/wp-content/uploads/5-Dec-2024.pdf
Serial: 6

An Improved Boost Charge Inverter Circuit for PV Application without Static Device

Authors: R.Muthunagai
Page No: 1-12
R.Muthunagai. An Improved Boost Charge Inverter Circuit for PV Application without Static Device. 1-12. http://journalcybersecurity.com/wp-content/uploads/6-Dec-2024.pdf
Serial: 7

Multi-Purpose Potential of RFID Technology for Access Control, Asset Tracking, and SOS Messaging Integration

Authors: BASKARAN.A, VISHNU.S, ARUNMOZHI.S
Page No: 1-7
BASKARAN.A, VISHNU.S, ARUNMOZHI.S. Multi-Purpose Potential of RFID Technology for Access Control, Asset Tracking, and SOS Messaging Integration. 1-7. http://journalcybersecurity.com/wp-content/uploads/7-Dec-2024.pdf
Serial: 8

Advanced Dual Boost Inverter with High Voltage Gain DC to DC topology for PV Applications

Authors: Priya.R, Mr.N.Amarabalan, R.Revathy
Page No: 1-13
Priya.R, Mr.N.Amarabalan, R.Revathy. Advanced Dual Boost Inverter with High Voltage Gain DC to DC topology for PV Applications. 1-13. http://journalcybersecurity.com/wp-content/uploads/8-Dec-2024.pdf
Serial: 9

Exploring the Power of BART and BERT: Context Similarity and Extraction in NLP

Authors: Hitakshi Chellani, Saurav Singh, Saurav Singh, Devendra Chouhan
Page No: 1-9
Hitakshi Chellani, Saurav Singh, Saurav Singh, Devendra Chouhan. Exploring the Power of BART and BERT: Context Similarity and Extraction in NLP. 1-9. http://journalcybersecurity.com/wp-content/uploads/9-Dec-2024.pdf
Serial: 10

Comparison of Similarity Measure Using Density Peak Clustering For Collaborative Filtering Techniques

Authors: Dr. S. Shajun Nisha, B.Rajeswari
Page No: 1-10
Dr. S. Shajun Nisha, B.Rajeswari. Comparison of Similarity Measure Using Density Peak Clustering For Collaborative Filtering Techniques. 1-10. http://journalcybersecurity.com/wp-content/uploads/10-Dec-2024.pdf
Serial: 11

IoT and ML Based VM Scheduling Mechanism for Mitigating DDoS Attacks in Cloud Environments

Authors: Dr. Rethishkumar S, Dr.R.Vijayakumar
Page No: 1-9
View Abstract
The increasing adoption of Internet of Things (IoT) devices has transformed the landscape of cloud computing while simultaneously introducing serious cybersecurity challenges, especially Distributed Denial-of-Service (DDoS) attacks. Traditional Virtual Machine (VM) scheduling algorithms in cloud infrastructures are not designed to handle the dynamic and unpredictable nature of such attacks. This research introduces an IoT-based hybrid Machine Learning (ML) scheduling mechanism combining Random Forest (RF) and Long Short-Term Memory (LSTM) networks to detect, predict, and mitigate DDoS attacks proactively. The model leverages the classification efficiency of RF with the temporal prediction capability of LSTM, enabling adaptive VM resource allocation. Theoretical evaluation demonstrates enhanced detection accuracy, reduced latency, and optimal resource utilization compared to conventional scheduling mechanisms, establishing the framework’s potential for resilient IoT-cloud ecosystems.
Year: 2024
Journal: Research paper
Vol/Issue: 6 (12)
Dr. Rethishkumar S, Dr.R.Vijayakumar (2024). IoT and ML Based VM Scheduling Mechanism for Mitigating DDoS Attacks in Cloud Environments. Research paper, 6(12), 1-9. http://journalcybersecurity.com/wp-content/uploads/11-Dec-2024.pdf
Scroll to Top