Speaker recognition systems are useful for deriving intelligence information by tracking telephone conversations of people who are perceived to be a threat to the national security. Rules prohibit security agencies. . .
Attacks on information systems have grown exponentially in volume and in sophistication. While there are many security systems and ‘honeypots’ designed to harvest or trap the malware and study its. . .
The project ‘Security Event Processing Acceleration Using GPGPU’ proposes to provide a proof of concept for building a FPGA based NIDS for highspeed network environments. The proposed FPGA based NIDS would. . .
Visual cryptography is a perfectly secure way to protect secrets and is characterized by its decryption method. This project is to develop new visual cryptographic scheme satisfying certain conditions. In. . .
The project titled “Indoor Information Representation and Management System” is funded by Department of Science and Technology, India. Dr. Vidhya Balasubramanian, Associate Professor, Department of Computer Science Engineering, Amrita School of Engineering, Coimbatore, is the Principal Investigator.
An indoor information system is a system that gives information about the details of a building such as the different spaces within the building, exits, and their properties and also. . .
The goal of this project is to create a hierarchical extendible data model for indoor information which can represent buildings, entities within it, utilities, objects inside the building, and sensors. . .
Over the recent years, video camera networks have become ubiquitous and a part of our everyday environments. Such camera networks are deployed in a wide gamut of applications ranging from. . .
COTS Security Incident and Event Management (SIEM) Systems process log events based on built-in rules and identify actionable incidents. These primarily identify known attacks. Using Machine Learning techniques such as. . .