A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform S Koppu, VM Viswanatham Modelling and Simulation in Engineering 2017 (1), 7470204, 2017 | 35 | 2017 |
A novel technique for embedding data in spatial domain VM Viswanatham, J Manikonda International Journal on Computer Science and Engineering, IJCSE 2 (2), 2010 | 35 | 2010 |
Classifying spam emails using artificial intelligent techniques SS Roy, VM Viswanatham International Journal of Engineering Research in Africa 22, 152-161, 2016 | 28 | 2016 |
Applicability of rough set technique for data investigation and optimization of intrusion detection system SS Roy, VM Viswanatham, PV Krishna, N Saraf, A Gupta, R Mishra Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th …, 2013 | 27 | 2013 |
An approach for detecting attacks in mobile adhoc networks VM Viswanatham, AA Chari Journal of Computer Science 4 (3), 245, 2008 | 26 | 2008 |
ADDRESSING SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING. S Sudha, VM Viswanatham Journal of Theoretical & Applied Information Technology 48 (2), 2013 | 24 | 2013 |
Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm S Koppu, VM Viswanatham Evolutionary Intelligence 11 (1), 53-71, 2018 | 22 | 2018 |
Spam detection using hybrid model of rough set and decorate ensemble SS Roy, VM Viswanatham, PV Krishna International Journal of Computational Systems Engineering 2 (3), 139-147, 2016 | 20 | 2016 |
Preliminary cardiac disease risk prediction based on medical and behavioural data set using supervised machine learning techniques T Puyalnithi, VM Viswanatham Indian Journal of Science and Technology, 2016 | 19 | 2016 |
A smart technique for attendance system to recognize faces through parallelism B Prabhavathi, V Tanuja, VM Viswanatham, MR Babu IOP Conference Series: Materials Science and Engineering 263 (4), 042095, 2017 | 18 | 2017 |
Approach for channel reservation and allocation to improve quality of service in vehicular communications VMV Vankadara Saritha IET Networks 3 (2), 150-159, 2015 | 18* | 2015 |
Performance analysis of data compression algorithms for heterogeneous architecture through parallel approach FS Mahammad, VM Viswanatham The Journal of Supercomputing 76 (4), 2275-2288, 2020 | 17 | 2020 |
A Framework for detecting malicious nodes in mobile Adhoc Network Y Haripriya, KVB Pavani, S Lavanya, VM Viswanatham Indian Journal of Science and Technology 8 (S2), 151-5, 2015 | 16 | 2015 |
A study on h. 26x family of video streaming compression techniques FS Mahammad, VM Viswanatham International Journal of Pure and Applied Mathematics 117 (10), 63-66, 2017 | 15 | 2017 |
Efficient multipath routing protocol with quality of service for mobile ad hoc networks V Saritha, PV Krishna, I Alagiri, VM Viswanatham, MS Obaidat 2018 IEEE International Conference on Communications (ICC), 1-6, 2018 | 13 | 2018 |
A fast approach to encrypt and decrypt of video streams for secure channel transmission MF Sunar, VM Viswanatham World Review of Science, Technology and Sustainable Development 14 (1), 11-28, 2018 | 13 | 2018 |
Comparison of performance of various data classification algorithms with ensemble methods using RAPIDMINER T Puyalnithi, V Madhu Viswanatham, A Singh International Journal 6 (5), 2016 | 12 | 2016 |
A clever system of presence to see the face in the same way B Prabhavathi, V Tanuja, VM Viswanatham, MR Babu IOP Conf. Series: Materials Science and Engineering 263, 2017 | 9 | 2017 |
Secured and authenticated transmission of data using multipath routing in mobile AD-HOC networks G Anjaneyulu, VM Viswanatham, B Venkateswarlu Advances in Applied Science Research 2 (4), 177-186, 2011 | 9 | 2011 |
Dynamic node influence tracking based influence maximization on dynamic social networks J Chandran, VM Viswanatham Microprocessors and Microsystems 95, 104689, 2022 | 7 | 2022 |