Vehicular ad hoc networks (VANET): architectures, methodologies and design issues B Ayyappan, PM Kumar 2016 second international conference on science technology engineering and …, 2016 | 45 | 2016 |
Survey on DDoS defense mechanisms E Fenil, P Mohan Kumar Concurrency and Computation: Practice and Experience 32 (4), e5114, 2020 | 32 | 2020 |
Medical diagnosis of cerebral palsy rehabilitation using eye images in machine learning techniques P Illavarason, J Arokia Renjit, P Mohan Kumar Journal of medical systems 43 (8), 278, 2019 | 30 | 2019 |
Performance analysis of malicious node detection and elimination using clustering approach on MANET S Gopalakrishnan Circuits and Systems 7 (06), 748, 2016 | 26 | 2016 |
Recognition and analysis of Tamil inscriptions and mapping using image processing techniques G Janani, V Vishalini, PM Kumar 2016 Second International Conference on Science Technology Engineering and …, 2016 | 23 | 2016 |
Optimal processing of nearest-neighbor user queries in crowdsourcing based on the whale optimization algorithm N Bhaskar, PM Kumar Soft Computing 24 (17), 13037-13050, 2020 | 20 | 2020 |
Clinical evaluation of functional vision assessment by utilizing the visual evoked potential device for cerebral palsy rehabilitation P Illavarason, A Renjit Procedia Computer Science 132, 128-140, 2018 | 19 | 2018 |
Brain tumour classification and abnormality detection using neuro-fuzzy technique and Otsu thresholding A Renjith, P Manjula, P Mohan Kumar Journal of medical engineering & technology 39 (8), 498-507, 2015 | 17 | 2015 |
Developing a secure image steganographic system using TPVD adaptive LSB matching revisited algorithm for maximizing the embedding rate PM Kumar, KL Shunmuganathan Information Security Journal: A Global Perspective 21 (2), 65-70, 2012 | 16 | 2012 |
A reversible high embedding capacity data hiding technique for hiding secret data in images PM Kumar, KL Shunmuganathan arXiv preprint arXiv:1004.1676, 2010 | 15 | 2010 |
Adaptive mobility-based intelligent decision-making system for driver behaviour prediction with motion nano sensor in VANET S Cloudin, PM Kumar International journal of heavy vehicle systems 25 (3-4), 391-405, 2018 | 13 | 2018 |
Challenges on Mobility Models Suitable to Vanet. S Cloudin, PM Kumar J. Softw. 12 (2), 91-100, 2017 | 12 | 2017 |
Security protocols in WSN: A survey B Ayyappan, PM Kumar 2017 Third International Conference on Science Technology Engineering …, 2017 | 11 | 2017 |
Encryption-based secure sharing of data with fine-grained access control in public clouds L Selvam, PM Kumar, JA Renjith Journal of Applied Security Research 9 (2), 172-184, 2014 | 10 | 2014 |
A Multilayered architecture for hiding executable files in 3D images PM Kumar, KL Shunmuganathan Indian Journal of Science & Technology 3, 2010 | 10 | 2010 |
Towards a secure software defined network with adaptive mitigation of dDoS attacks by machine learning approaches E Fenil, PM Kumar 2022 International Conference on Advances in Computing, Communication and …, 2022 | 9 | 2022 |
Evolutionary Fuzzy‐based gravitational search algorithm for query optimization in crowdsourcing system to minimize cost and latency N Bhaskar, PM Kumar, JA Renjit Computational Intelligence 37 (1), 2-20, 2021 | 9 | 2021 |
Performance evaluation of visual therapy method used for cerebral palsy rehabilitation P Illavarason, JA Renjit, PM Kumar Journal of Medical Imaging and Health Informatics 8 (9), 1804-1818, 2018 | 9 | 2018 |
Evaluating the effectiveness of visual techniques methodologies for cerebral palsy children and analyzing the global developmental delay P Illavarason, J Arokia Renjit, P Mohan Kumar Microelectronics, Electromagnetics and Telecommunications: Proceedings of …, 2019 | 7 | 2019 |
Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey P Dharshini, J Arokia Renjith, P Mohan Kumar Security and Communication Networks 9 (18), 6379-6385, 2016 | 7 | 2016 |