A survey on technologies and security protocols: Reference for future generation IoT R Yugha, S Chithra Journal of Network and Computer Applications 169, 102763, 2020 | 144 | 2020 |
A survey on security issues of reputation management systems for peer-to-peer networks C Selvaraj, S Anand Computer science review 6 (4), 145-160, 2012 | 60 | 2012 |
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing ST Revathi, N Ramaraj, S Chithra Cluster Computing 22, 3521-3530, 2019 | 34 | 2019 |
Peer profile based trust model for P2P systems using genetic algorithm C Selvaraj, S Anand Peer-to-Peer Networking and Applications 5, 92-103, 2012 | 34 | 2012 |
Performance analysis of IoT protocol under different mobility models K Kabilan, N Bhalaji, C Selvaraj, M Kumaar, PTR Karthikeyan Computers & Electrical Engineering 72, 154-168, 2018 | 33 | 2018 |
Empirical study of feature selection methods over classification algorithms N Bhalaji, KBS Kumar, C Selvaraj International Journal of Intelligent Systems Technologies and Applications …, 2018 | 32 | 2018 |
Proactive maintenance of small wind turbines using IoT and machine learning models Y Selvaraj, C Selvaraj International Journal of Green Energy 19 (5), 463-475, 2022 | 14 | 2022 |
BCI cinematics–A pre-release analyser for movies using H2O deep learning platform SK KB, G Krishna, N Bhalaji, S Chithra Computers & Electrical Engineering 74, 547-556, 2019 | 13 | 2019 |
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing S Thanga Revathi, N Ramaraj, S Chithra Cluster Computing 22 (Suppl 2), 3521-3530, 2019 | 11 | 2019 |
Portable text to speech converter for the visually impaired K Ragavi, P Radja, S Chithra Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016 | 9 | 2016 |
Tracy–Singh product and genetic whale optimization algorithm for retrievable data perturbation for privacy preserved data publishing in cloud computing T Revathi S, N Ramaraj, S Chithra The Computer Journal 63 (2), 239-253, 2020 | 8 | 2020 |
Attribute based trust evaluation for secure RPL protocol in IoT environment R Yugha, S Chithra 2019 International Conference on Vision towards Emerging Trends in …, 2019 | 8 | 2019 |
Enhanced portable text to speech converter for visually impaired C Selvaraj, N Bhalaji International Journal of Intelligent Systems Technologies and Applications …, 2018 | 8 | 2018 |
Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems N Bhalaji, C Selvaraj Proceedings of International Conference on Communication and Networks …, 2017 | 7 | 2017 |
Machine learning based spectrum prediction in cognitive radio networks P Pandian, C Selvaraj, N Bhalaji, KGA Depak, S Saikrishnan 2023 International Conference on Networking and Communications (ICNWC), 1-6, 2023 | 5 | 2023 |
Analysis of 6LOWPAN and CoAP Protocols for Maternal Health Care K Kabilan, N Bhalaji, S Chithra Microelectronics, Electromagnetics and Telecommunications: Proceedings of …, 2019 | 4 | 2019 |
Bio-sensor authentication for medical applications using WBAN G Venkatesan, C Selvaraj Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016 | 4 | 2016 |
A role based trust model for peer to peer systems using credential trees C Selvaraj, S Anand International Journal of Computer Theory and Engineering 3 (2), 234, 2011 | 4 | 2011 |
An Effective Crack Identification in Civil Infrastructure with IoT and Improved Convolutional Neural Network S Yoganand, S Chithra International Journal of Structural Stability and Dynamics 22 (12), 2250128, 2022 | 2 | 2022 |
NoRegINT—A Tool for Performing OSINT and Analysis from Social Media S Karthika, N Bhalaji, S Chithra, N Sri Harikarthick, D Bhattacharya Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2021 | 2 | 2021 |