Trust Model for IoT Using Cluster Analysis: A Centralized Approach S Feslin Anish Mon, G Winster S, R Ramesh Wireless Personal Communications, 1-22, 2021 | 15* | 2021 |
Logistic Regression Trust–A Trust Model for Internet-of-Things Using Regression Analysis FA Mon, G Winster S, R S Computer Systems Science and Engineering 44 (2), 1125-1142, 2023 | 8 | 2023 |
An Access Control Models In Cloud Computing: A Review G Priya, BR Kavitha, G Ramya, P Kumaresan, FA Mon International Journal of Pure and Applied Mathematics 116 (24), 539-548, 2017 | 4 | 2017 |
A Progression Based Method for the Detection of Black and Gray Hole Attacks in MANET SF Mon, RK Shah, L Rajaji International Journal of Computer Networking, Wireless and Mobile …, 2013 | 3 | 2013 |
Fog Level Trust for Internet of Things Devices Using Node Feedback Aggregation FA Mon Solomon, GW Sathianesan Journal of Computational and Theoretical Nanoscience 17 (5), 2181-2186, 2020 | 2 | 2020 |
Emerging Technologies and Applications for Cloud-based Gaming PV Krishna IGI Global, 2016 | 2 | 2016 |
Innovative shopping through mobile using Google’s ARCore S kumar P, C prakash S, M Ajith kumar K, L shri, FAM K, Santhi International Journal of Psychosocial Rehabilitation 24 (8), 12987-12993, 2020 | | 2020 |
Smart Home Observing and Control Security System: A Case Study MBBAM Priya G and Feslin Anish Mon K. Santhi, M. Deepa, M. Lawanya Shri International Journal of Civil Engineering and Technology 9 (9), 1468-1477, 2018 | | 2018 |
A Case Study on Commending User in Social Media Based on User Information and Rating of Product in Interface Forums MBBAM G. Priya and Feslin Anish Mon Deepa .M, K. Santhi, M. Lawnyashri International Journal of Civil Engineering and Technology 9 (9), 1478-1484, 2018 | | 2018 |
Providing privacy and dimensional search on longitudinal data using safe computing: A case study D M, K Santhi, L Shri M, MBBA Malar, P G, FA Mon International Journal of Civil Engineering and Technology 9 (9), 315 - 322, 2018 | | 2018 |
Balanced trust management for Ad Hoc Networks SFA Mon, RK Saha, L Rajaji 2012 International Conference on Radar, Communication and Computing (ICRCC …, 2012 | | 2012 |
Security Enhancement for Wi-Fi through multiple encryptions P Jinesh, SF ANISH MON, T UGURLU ICWN 2010: proceedings of the 2010 international conference on wireless …, 2010 | | 2010 |
Recent research and development priorities on Aluminium Metal Matrix composites in the prospects of various processes S Venkatesan, FA Mon | | |
Chakraborty, M. 250 Chandrajit Pal 92 Chayan Halder 272 Chithra, B. 202 AS Garhwal, A Roy, P Adhavan, R Adhikary, AS Bhatt, A Varadarajan, ... Moon 2000, 6, 0 | | |
Isolating Tainted Nodule G Ramya, G Priya, SFA Mon Imperial Journal of Interdisciplinary Research 2 (11), 0 | | |
DoS Attacker Identification in MANET IPv6 Using ICMPv6 SFA Mon, RK Saha, L Rajaji | | |