Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance D Arivudainambi, VK KA, P Visu Computer Communications 147, 50-57, 2019 | 89 | 2019 |
Mobile technologies for contact tracing and prevention of COVID-19 positive cases: a cross-sectional study B Velan, J FV, V P, J K International Journal of Pervasive Computing and Communications 18 (2), 226-235, 2022 | 39 | 2022 |
RETRACTED ARTICLE: Bio-inspired dual cluster heads optimized routing algorithm for wireless sensor networks P Visu, TS Praba, N Sivakumar, R Srinivasan, T Sethukarasi Journal of Ambient Intelligence and Humanized Computing 12 (3), 3753-3761, 2021 | 30 | 2021 |
A review on clustering and outlier analysis techniques in datamining S Koteeswaran, P Visu, J Janet American journal of applied sciences 9 (2), 254, 2012 | 25 | 2012 |
Monitoring and sensing COVID-19 symptoms as a precaution using electronic wearable devices J MS, R R. Nair, V P, R Jothikumar International Journal of Pervasive Computing and Communications 16 (4), 341-350, 2020 | 20 | 2020 |
Software-defined forensic framework for malware disaster management in Internet of Thing devices for extreme surveillance P Visu, L Lakshmanan, V Murugananthan, MV Cruz Computer communications 147, 14-20, 2019 | 20 | 2019 |
Artificial bee colony based energy aware and energy efficient routing protocol P Visu, S Koteeswaran, J Janet Journal of Computer Science 8 (2), 227, 2012 | 15 | 2012 |
Ransomware traffic classification using deep learning models: ransomware traffic classification D Arivudainambi, VK KA, P Visu International Journal of Web Portals (IJWP) 12 (1), 1-11, 2020 | 12 | 2020 |
Combined swarm intelligence routing protocol for MANET P Visu, E Kannan Information Technology Journal 12 (4), 791, 2013 | 9 | 2013 |
Optimal energy management in wireless adhoc network using Artificial Bee Colony based routing protocol P Visu, J Janet, E Kannan, S Koteeswaran European Journal of Scientific Research 74 (2), 301-307, 2012 | 9 | 2012 |
DD-SARP: dynamic data secure anonymous routing protocol for MANETs in attacking environments S Imran, RV Karthick, P Visu 2015 International Conference on Smart Technologies and Management for …, 2015 | 8* | 2015 |
Detection of cyber crime: An approach using the lie detection technique and methods to solve it K Veena, P Visu 2016 International Conference on Information Communication and Embedded …, 2016 | 7 | 2016 |
Brainwave based accident avoidance system for drowsy drivers P Visu, KA Varunkumar, R Srinivasan, RV Kumar Indian Journal of Science and Technology 9 (3), 1-5, 2016 | 6 | 2016 |
Enhancing JS–MR based data visualisation using YARN S Koteeswaran, P Visu, E Kannan Indian Journal of Science and Technology 8 (11), 1-5, 2015 | 6 | 2015 |
Research Article Multi-model Bio-cryptographic Authentication in Cloud Storage Sharing for Higher Security P Selvarani, P Visu Research Journal of Applied Sciences, Engineering and Technology 11 (1), 95-101, 2015 | 6 | 2015 |
Terrorist intrusion monitoring system using outlier analysis based search knight algorithm S Koteeswaran, J Janet, E Kannan, P Visu Eur. J. Sci. Res 74 (3), 440-449, 2012 | 6 | 2012 |
Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection P Visu, N Sivakumar, P Kumaresan, S Yokesh Babu, PS Ramesh Multimedia Tools and Applications 79, 5355-5369, 2020 | 5 | 2020 |
An unidentified location-based efficient routing protocol in VANET P Dharani, SS Chakkaravarthy, M Ganesan, E Kamalanaban, P Visu, ... Artificial Intelligence and Evolutionary Algorithms in Engineering Systems …, 2015 | 5 | 2015 |
Web service registration and routing system and inter web proxy service model prevents the message alteration attacks, man-in-the middle attacks S Chakaravarthi, P Visu, B Balu, V Vineshwaran, M Yakeshraj 2017 International Conference on Information Communication and Embedded …, 2017 | 4 | 2017 |
Security in multicast mobile ad-hoc networks P Visu, WT Chembian, S Koteeswaran 2009 First International Conference on Advanced Computing, 38-44, 2009 | 4 | 2009 |