Genetic algorithm based optimization of friction welding process parameters on AA7075-SiC composite KS Sreenivasan, SS Kumar, J Katiravan Engineering Science and Technology, an International Journal 22 (4), 1136-1148, 2019 | 42 | 2019 |
Mobile application based speech and voice analysis for COVID-19 detection using computational audit techniques US SM, J Katiravan International Journal of Pervasive Computing and Communications 18 (5), 508-517, 2022 | 22 | 2022 |
ELPC-trust framework for wireless sensor networks N Dharini, N Duraipandian, J Katiravan Wireless Personal Communications 113, 1709-1742, 2020 | 14 | 2020 |
Flooding attack on MANET–a survey CM Nalayini, J Katiravan, A Prasad, U Scholar International Journal of Trend in Research and Development (IJTRD), 25-27, 2017 | 13 | 2017 |
Trust based Routing in Wireless Ad Hoc Networks under Adverse Environment D Sylvia, J Katiravan, DS Rao International Journal of Computer Applications 136 (10), 23-28, 2016 | 11 | 2016 |
Energy efficient link aware routing with power control in wireless ad hoc networks J Katiravan, D Sylvia, DS Rao The scientific world journal 2015 (1), 576754, 2015 | 11 | 2015 |
Detection of DDoS Attack Using Machine Learning Algorithms C M NALAYINI, J Katiravan Available at SSRN 4173187 9 (7), 2022 | 10 | 2022 |
False alarm detection using dynamic threshold in medical wireless sensor networks S Saraswathi, GR Suresh, J Katiravan Wireless Networks 27 (2), 925-937, 2021 | 10 | 2021 |
IDENTITY BASED ATTACK DETECTION AND MANIFOLD ADVERSARIES LOCALIZATION IN WIRELESS NETWORKS. US SM, VV Chamundeeswari, J Katiravan Journal of Theoretical & Applied Information Technology 67 (2), 2014 | 10 | 2014 |
Block link flooding algorithm for TCP SYN flooding attack CM Nalayini, J Katiravan International Conference on Computer Networks and Communication Technologies …, 2019 | 8 | 2019 |
A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction J Katiravan KSII Transactions on Internet and Information Systems (TIIS) 9 (11), 4644-4661, 2015 | 8 | 2015 |
A new IDS for detecting DDoS attacks in wireless networks using spotted hyena optimization and fuzzy temporal CNN CM Nalayini, J Katiravan Journal of Internet Technology 24 (1), 23-34, 2023 | 7 | 2023 |
Privacy-preserving and energy-centered QoS for IoT using XOR-RSA and BM-SSA P Prem Priya, J Katiravan Wireless Personal Communications 122 (2), 1671-1694, 2022 | 7 | 2022 |
Intrusion Detection in Cyber Physical Systems Using Multichain CM Nalayini, J Katiravan, V Sathya Malware Analysis and Intrusion Detection in Cyber-Physical Systems, 189-214, 2023 | 5 | 2023 |
RETRACTED ARTICLE: Localization approach of FLC and ANFIS technique for critical applications in wireless sensor networks VP Kavitha, J Katiravan Journal of Ambient Intelligence and Humanized Computing 12 (5), 4785-4795, 2021 | 5 | 2021 |
Detecting the source of TCP SYN flood attack using IP trace back J Katiravan, C Chellappan, JG Rejula European Journal of Scientific Research ISSN, 78-84, 2012 | 5 | 2012 |
A Secure Third-Party Auditing Scheme Based on Blockchain Technology in Cloud Storage SM Sankar, D Selvaraj, GK Monica, J Katiravan arXiv preprint arXiv:2304.11848, 2023 | 4 | 2023 |
Machine learning and deep learning approaches for intrusion detection: a comparative study G Prethija, J Katiravan Inventive Communication and Computational Technologies: Proceedings of …, 2022 | 4 | 2022 |
Wireless Sensor Network-based Detection of Poisonous Gases Using Principal Component Analysis. N Dharini, J Katiravan, SM Sankar Computer Systems Science & Engineering 44 (1), 2023 | 3 | 2023 |
Multi-level AES design security: from SystemC-TLM to FPGA H MESTIRI, Y LAHBIB, M MACHHOUT, R TOURKI, VV GOMATHI, ... Journal of Theoretical and Applied Information Technology 66 (2), 2014 | 3 | 2014 |