A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism PG Sujithra.M International Journal of Computer Applications 56 (14), 2012 | 52 | 2012 |
Mobile device data security: a cryptographic approach by outsourcing mobile data to cloud M Sujithra, G Padmavathi, S Narayanan Procedia Computer Science 47, 480-485, 2015 | 49 | 2015 |
Sentiment analysis on twitter data using machine learning algorithms in python S Siddharth, R Darsini, M Sujithra Int. J. Eng. Res. Comput. Sci. Eng 5 (2), 285-290, 2018 | 23 | 2018 |
Next generation biometric security system: an approach for mobile device security M Sujithra, G Padmavathi Proceedings of the Second International Conference on Computational Science …, 2012 | 19 | 2012 |
Audit cloud: Ensuring data integrity for mobile devices in cloud storage L Krithikashree, S Manisha, M Sujithra 2018 9th International conference on Computing, communication and networking …, 2018 | 14 | 2018 |
Evolving cryptographic approach for enhancing security of resource constrained mobile device outsourced data in cloud computing K Kaviya, KK Shanthini, M Sujithra International Journal of Scientific Research in Computer Science …, 2019 | 13 | 2019 |
Research article enhanced permission based malware detection in mobile devices using optimized random forest classifier with pso-ga M Sujithra, G Padmavathi Research Journal of Applied Sciences, Engineering and Technology 12 (7), 732-741, 2016 | 10 | 2016 |
A survey of biometric iris recognition: security, techniques and metrics M Sujithra, G Padmavathi Asian Journal of Information Technology 14 (6), 192-199, 2015 | 6 | 2015 |
A Survey On Cloud Computing: Data Security Challenges And Their Defensive Mechanisms K Shanthni, K Kaviya, M Sujithra International Journal Of Recent Scientific Research 9 (5), 26497-26500, 2018 | 5 | 2018 |
Internet of things–an overview M Sujithra, G Padmavathi Avinashilingam, 2016 | 5 | 2016 |
Iot security challenges and issues–an overview M Sujithra, G Padmavathi Avinashilingam, 2016 | 5 | 2016 |
Ensuring Security on mobile device data with two phase RSA algorithm over cloud storage M Sujithra, G Padmavathi Journal of Theoretical and Applied Information Technology 80 (2), 221, 2015 | 5 | 2015 |
A Study On Psychological Stress Of Working Women In Educational Institution Using Machine Learning M Sujithra, P Velvadivu, J Rathika, R Priyadharshini, P Preethi 2022 13th International Conference on Computing Communication and Networking …, 2022 | 4 | 2022 |
A cryptographic Approach by Outsourcing Mobile data to cloud M Sujithra, G Padmavathi, N Sathya Department of Computer Technology and Applications, Coimbatore Institute of …, 2015 | 3 | 2015 |
An Intellectual Decision System for Classification of Mental Health Illness on Social Media using Computational Intelligence Approach M Sujithra Journal of Ubiquitous Computing and Communication Technologies 5 (1), 23-35, 2023 | 2 | 2023 |
Sentiment Analysis on Twitter Data Using Machine S Siddhart, R Darsini, M Sujithra International Conference on Advances in Computing Applications(ICACA-18 …, 2018 | 2 | 2018 |
Micro-blogging sentimental analysis on Twitter data using Naïve Bayes machine learning algorithm in Python K Kaviya, KK Shanthini, M Sujithra Int J Math Comput Sci 4, 2018 | 2 | 2018 |
Airline Twitter Sentiment Classification Using Machine Learning Techniques KKG Sujithra M Journal of Image Processing and Artificial Intelligence 10 (Issue 1), 1-10, 2024 | | 2024 |
Dental Biometrics Segmentation on Panoramic X-Ray Images using Computational Intelligence Approach. M Sujithra, J Rathika, P Velvadivu, R VS Grenze International Journal of Engineering & Technology (GIJET) 9 (2), 2023 | | 2023 |
Mental Stress Level Detection Among Working Women Faculty in Educational Institutions Using Machine Learning Techniques DMS K.Vaishnavi Science, Technology and Development 12 (4), 336-343, 2023 | | 2023 |