关注
Jeevaa Katiravan
Jeevaa Katiravan
在 velammal.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Genetic algorithm based optimization of friction welding process parameters on AA7075-SiC composite
KS Sreenivasan, SS Kumar, J Katiravan
Engineering Science and Technology, an International Journal 22 (4), 1136-1148, 2019
422019
Mobile application based speech and voice analysis for COVID-19 detection using computational audit techniques
US SM, J Katiravan
International Journal of Pervasive Computing and Communications 18 (5), 508-517, 2022
222022
ELPC-trust framework for wireless sensor networks
N Dharini, N Duraipandian, J Katiravan
Wireless Personal Communications 113, 1709-1742, 2020
142020
Flooding attack on MANET–a survey
CM Nalayini, J Katiravan, A Prasad, U Scholar
International Journal of Trend in Research and Development (IJTRD), 25-27, 2017
132017
Trust based Routing in Wireless Ad Hoc Networks under Adverse Environment
D Sylvia, J Katiravan, DS Rao
International Journal of Computer Applications 136 (10), 23-28, 2016
112016
Energy efficient link aware routing with power control in wireless ad hoc networks
J Katiravan, D Sylvia, DS Rao
The scientific world journal 2015 (1), 576754, 2015
112015
Detection of DDoS Attack Using Machine Learning Algorithms
C M NALAYINI, J Katiravan
Available at SSRN 4173187 9 (7), 2022
102022
False alarm detection using dynamic threshold in medical wireless sensor networks
S Saraswathi, GR Suresh, J Katiravan
Wireless Networks 27 (2), 925-937, 2021
102021
IDENTITY BASED ATTACK DETECTION AND MANIFOLD ADVERSARIES LOCALIZATION IN WIRELESS NETWORKS.
US SM, VV Chamundeeswari, J Katiravan
Journal of Theoretical & Applied Information Technology 67 (2), 2014
102014
Block link flooding algorithm for TCP SYN flooding attack
CM Nalayini, J Katiravan
International Conference on Computer Networks and Communication Technologies …, 2019
82019
A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction
J Katiravan
KSII Transactions on Internet and Information Systems (TIIS) 9 (11), 4644-4661, 2015
82015
A new IDS for detecting DDoS attacks in wireless networks using spotted hyena optimization and fuzzy temporal CNN
CM Nalayini, J Katiravan
Journal of Internet Technology 24 (1), 23-34, 2023
72023
Privacy-preserving and energy-centered QoS for IoT using XOR-RSA and BM-SSA
P Prem Priya, J Katiravan
Wireless Personal Communications 122 (2), 1671-1694, 2022
72022
Intrusion Detection in Cyber Physical Systems Using Multichain
CM Nalayini, J Katiravan, V Sathya
Malware Analysis and Intrusion Detection in Cyber-Physical Systems, 189-214, 2023
52023
RETRACTED ARTICLE: Localization approach of FLC and ANFIS technique for critical applications in wireless sensor networks
VP Kavitha, J Katiravan
Journal of Ambient Intelligence and Humanized Computing 12 (5), 4785-4795, 2021
52021
Detecting the source of TCP SYN flood attack using IP trace back
J Katiravan, C Chellappan, JG Rejula
European Journal of Scientific Research ISSN, 78-84, 2012
52012
A Secure Third-Party Auditing Scheme Based on Blockchain Technology in Cloud Storage
SM Sankar, D Selvaraj, GK Monica, J Katiravan
arXiv preprint arXiv:2304.11848, 2023
42023
Machine learning and deep learning approaches for intrusion detection: a comparative study
G Prethija, J Katiravan
Inventive Communication and Computational Technologies: Proceedings of …, 2022
42022
Wireless Sensor Network-based Detection of Poisonous Gases Using Principal Component Analysis.
N Dharini, J Katiravan, SM Sankar
Computer Systems Science & Engineering 44 (1), 2023
32023
Multi-level AES design security: from SystemC-TLM to FPGA
H MESTIRI, Y LAHBIB, M MACHHOUT, R TOURKI, VV GOMATHI, ...
Journal of Theoretical and Applied Information Technology 66 (2), 2014
32014
系统目前无法执行此操作,请稍后再试。
文章 1–20