Fast congestion control scheme for wireless sensor networks using hybrid optimal routing algorithm VJ C.J.Raman Cluster Computing, 1-11, 2018 | 44* | 2018 |
WITHDRAWN: Inception ResNet deep transfer learning model for human action recognition using LSTM AJ Suresh, J Visumathi Materials Today: Proceedings, 2020 | 27 | 2020 |
An effective and secure mechanism for phishing attacks using a machine learning approach G Mohamed, J Visumathi, M Mahdal, J Anand, M Elangovan Processes 10 (7), 1356, 2022 | 24 | 2022 |
Reverse Circle Cipher for personal and network security ERHP Isaac, JHR Isaac, J Visumathi 2013 International Conference on Information Communication and Embedded …, 2013 | 18 | 2013 |
A computational intelligence for evaluation of intrusion detection system J Visumathi, KL Shunmuganathan Indian Journal of Science and Technology 4 (1), 40-45, 2011 | 18 | 2011 |
A novel MOGNDO algorithm for security-constrained optimal power flow problems SB Pandya, J Visumathi, M Mahdal, TK Mahanta, P Jangir Electronics 11 (22), 3825, 2022 | 13 | 2022 |
WITHDRAWN: A predictive model of machine learning against phishing attacks and effective defense mechanisms JG Mohamed, J Visumathi Materials Today: Proceedings, 2020 | 12 | 2020 |
Towards secure cloud computing using digital signature CM Pauliesther, J Visumathi, S ERRIHANI, S ELFEZAZI, K BENHIDA, ... Journal of Theoretical and Applied Information Technology 79 (2), 185-190, 2015 | 11 | 2015 |
An effective IDS for MANET using forward feature selection and classification algorithms J Visumathi, KL Shunmuganathan Procedia Engineering 38, 2816-2823, 2012 | 9 | 2012 |
A review on community detection algorithms and evaluation measures in social networks P Ponveni, J Visumathi 2021 7th International Conference on Advanced Computing and Communication …, 2021 | 7 | 2021 |
Research paper on privacy preservation by data anonymization in public cloud for hospital management on big data PS Rose, J Visumathi, H Haripriya International Journal of Control Theory and Applications, 2016 | 6 | 2016 |
Cubic Bezier curve approach for automated offline signature verification with intrusion identification A Vijayaragavan, J Visumathi, KL Shunmuganathan Mathematical Problems in Engineering 2014 (1), 928039, 2014 | 6 | 2014 |
A secured and reliable biometric user authentication using keystroke template method J Visumathi, P Jesu Jayarin Journal of Applied Security Research 10 (3), 375-384, 2015 | 5 | 2015 |
Misuse and anomaly-based network intrusion detection system using fuzzy and genetic classification algorithms J Visumathi, KL Shanmuganathan, KAM Junaid Fuzzy Systems 4 (4), 137-141, 2012 | 4 | 2012 |
Convolutional neural network-based MRI brain tumor classification system M Amanullah, J Visumathi, N Sammeta, M Ashok AIP Conference Proceedings 2519 (1), 2022 | 3 | 2022 |
Advanced lightweight encryption algorithm for android (IoT) devices RV Chandrashekhar, J Visumathi, APS Anandaraj 2022 International Conference on Advances in Computing, Communication and …, 2022 | 3 | 2022 |
An improved non-destructive shrimp freshness detection method based on hybrid CNN and SVM with GAN augmentation K Prema, J Visumathi 2022 International Conference on Advances in Computing, Communication and …, 2022 | 3 | 2022 |
Hybrid Approach of CNN and SVM for Shrimp Freshness Diagnosis in Aquaculture Monitoring System using IoT based Learning Support System K Prema, J Visumathi Journal of Internet Technology 23 (4), 801-810, 2022 | 2 | 2022 |
Fragile data storing in public cloud for hospital administration S Selvaprabhu, J Visumathi 2017 Third International Conference on Science Technology Engineering …, 2017 | 2 | 2017 |
A Secured Key Distribution for Effective File Transfer Using HMAC-SHA Algorithm with Self-Healing Property PJ Jayarin, J Visumathi, R Srilakshmi, M Pendyala Journal of Applied Security Research 10 (2), 221-237, 2015 | 2 | 2015 |