Prasad Honnavalli

Prasad Honnavalli
People's Education Society | PES · PES Institute Of Technology

Bachelor of Engineering

About

61
Publications
3,471
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
71
Citations
Citations since 2016
61 Research Items
71 Citations
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040

Publications

Publications (61)
Article
Full-text available
Today’s modern enterprises are adjusting to new realities of connectivity. As companies become more distributed and autonomous, emerging applications demand more bandwidth, low latency, more spectrum, and higher reliability. 5G technology can aid many industries or enterprises to make quicker and better business decisions. Private 5G networks, also...
Article
Full-text available
Covid-19 has posed a serious threat to the existence of the human race. Early detection of the virus is vital to effectively containing the virus and treating the patients. Profound testing methods such as the Real-time reverse transcription-polymerase chain reaction (RT-PCR) test and the Rapid Antigen Test (RAT) are being used for detection, but t...
Article
Injection-based attacks have consistently made the Open Web Application Security Project (OWASP)Top 10 vulnerabilities for years. ¹ Common types of injection attacks include SQL injection, cross-site scripting (XSS) and code injection. Filter engines are used to detect and sanitise user inputs for these malicious attacks. The user input is assumed...
Chapter
Two dominant factors that impact the future of electrical energy systems of the era are government policies, and the efficiency needs of the consumers. The electrical energy system of the future should investigate the basic requirements and concerns raised by some utilities, by using the latest technologies to create a sustainable, smarter, and hig...
Chapter
Code injection-based attacks like cross-site scripting (XSS) and Structured Query Language Injection (SQLi) are among the most critical security issues for web applications. Web application firewalls (WAFs) are installed to defend against injection attacks. The WAF has a predefined rule set to detect malicious content in HTTP requests. Nevertheless...
Chapter
With the advent of the volume, velocity and variety of data in today’s day and age, big data has become the norm in many places. Data at rest, the same data that is fed to the analyst of a company is at most times, not encrypted and depends on the fact that a person can be trusted by the company. Our contribution is implementing differential privac...
Chapter
Among several self-sufficient surface vehicles, cruising mechanical autonomy is a successful innovation for lengthy haul missions and semi-persistent nearness in the seas. Self-governance of these vehicles as far as vitality will be accomplished by inexhaustible sunlight-based and wind power sources. The fundamental commitment of this paper is to d...
Chapter
Full-text available
Card transaction is one of the most widely used transaction methods in the payment industry. There are more than 50.6 million credit cards and 840.6 million debit cards in India. These cards are so confidential that special care has to be taken while carrying and handling these cards. Carrying these cards everywhere and every time is fewer burdens...
Article
Full-text available
IT functions in organisations produce enormous quantities of data, logs and events. In the current IT world, handling a large amount of data is a challenging task and it is the responsibility of network administrators to transmit and store the data securely. If any data is disclosed or tampered with by an attacker, either locally or remotely, then...
Chapter
The Internet of Things has emerged as an area of incredible potential and growth, complemented by the advent of smart devices with increased computational power. However, these complex systems have large attack surfaces making them susceptible to various security attacks. Most common among these are data forgery and identity theft. Further, once th...
Chapter
Deep Fakes are the media that takes the person’s image in an existing photograph, audio recording, or video and replaces them with another person’s likeness by making use of synthetic intelligence and device mastering. In this era, everybody can get easy access to software packages and tools to create deep fake videos. Existing techniques are const...
Chapter
As the technology evolves rapidly, its necessary to update the traditional system. A smart grid is a modern and digitally updated version of a traditional electrical grid that makes two-way communication between its customers and the utility possible. Advanced Metering Infrastructure (AMI) plays a major role in a smart grid by automatically reporti...
Article
Full-text available
Virtual Machine Placement in Cloud Computing is to allocate the Virtual Machine (VM) (user request) to suitable Physical Machine’s (PM) so that the wastage of resources is reduced. Allocation of appropriate VM’s to suitable and effective PM’s will lead the service provider to be a better competitor with more available resources for affording a gre...
Chapter
Blockchain is expected to play a seminal role in the future of finance and cybersecurity. Blockchain has the traits of decentralization, stability, safety, and non-modifiability. The consensus algorithm performs an important role in retaining the order of transaction and performance of blockchain networks. Using the right algorithm might also deliv...
Chapter
The Internet of Things (IoT) is an exploding market as well as an important focus area for research. Security is a major issue for IoT products and solutions, with several massive problems that are still commonplace in the field. In this paper, we have successfully minimized the risk of data eavesdropping and tampering over the network by securing...
Chapter
Mobile banking is a service provided by the bank and other financial institutions, which accepts their users to do a remote online transactions by using smart devices such as mobile or tab. With the help of Mobile Banking, customer can pay bills, check account balance and recent transaction details. To keep mobile banking application secure in E-co...
Chapter
The overall scope of IoT sensor networks over the last decade has seen a considerable growth in technology as well as application in corporate and domestic requirement. The goal of the system proposed in this paper is a unique approach to a stable, robust, scalable, location independent, automated and efficient IoT network that is built to monitor...
Preprint
Full-text available
The Internet of Things (IoT) is an exploding market as well as a important focus area for research. Security is a major issue for IoT products and solutions, with several massive problems that are still commonplace in the field. In this paper, we have successfully minimized the risk of data eavesdropping and tampering over the network by securing t...

Network

Cited By