Energy efficient shortest path routing protocol for underwater acoustic wireless sensor network RM Gomathi, J Martin Leo Manickam Wireless Personal Communications 98, 843-856, 2018 | 59 | 2018 |
Fuzzy based trusted ad hoc on-demand distance vector routing protocol for MANET JML Manickam, S Shanmugavel 15th International Conference on Advanced Computing and Communications …, 2007 | 52 | 2007 |
Public key cryptosystem based security in wireless body area network AS Sangari, JML Manickam 2014 international conference on circuits, power and computing technologies …, 2014 | 28 | 2014 |
Two-way acknowledgment-based trust framework for wireless sensor networks X Anita, J Martin Leo Manickam, MA Bhagyaveni International Journal of Distributed Sensor Networks 9 (5), 952905, 2013 | 28 | 2013 |
ECG-signal based secret key generation (ESKG) scheme for WBAN and hardware implementation MV Karthikeyan, JML Manickam Wireless Personal Communications 106 (4), 2037-2052, 2019 | 26 | 2019 |
Fuzzy‐Based Trust Prediction Model for Routing in WSNs X Anita, MA Bhagyaveni, JML Manickam The Scientific World Journal 2014 (1), 480202, 2014 | 24 | 2014 |
Energy efficient dynamic clustering routing protocol in underwater wireless sensor networks RM Gomathi, JML Manickam, A Sivasangari, P Ajitha International Journal of Networking and Virtual Organisations 22 (4), 415-432, 2020 | 22 | 2020 |
Collaborative lightweight trust management scheme for wireless sensor networks X Anita, MA Bhagyaveni, J Martin Leo Manickam Wireless Personal Communications 80, 117-140, 2015 | 22 | 2015 |
A efficient and reliable communication to reduce broadcast storms in VANET protocol V Velmurugan, JM Leo Manickam Cluster Computing 22 (Suppl 6), 14099-14105, 2019 | 21 | 2019 |
Energy efficient static node selection in underwater acoustic wireless sensor network RM Gomathi, JML Manickam Wireless Personal Communications 107, 709-727, 2019 | 18 | 2019 |
Cluster-based MAC protocol for collision avoidance and TDMA scheduling in underwater wireless sensor networks L Sivagami, J Martin Leo Manickam The Computer Journal 59 (10), 1527-1535, 2016 | 18 | 2016 |
A survey on impersonation attack in wireless networks R Regan, J Manickam, M Leo International Journal of Security and Its Applications 11 (5), 39-48, 2017 | 16 | 2017 |
A comparative study on routing strategies for underwater acoustic wireless sensor network RM Gomathi, JML Manickam, A Sivasangari Contemporary Engineering Sciences 9 (2), 71-80, 2016 | 16 | 2016 |
A light-weight cryptography analysis for wireless based healthcare applications S Sangariand, L Manickam Journal of Computer Science 10 (10), 2088-2094, 2014 | 14 | 2014 |
An SETM algorithm for combating SSDF attack in cognitive radio networks S Tephillah, JML Manickam Wireless Communications and Mobile Computing 2020 (1), 9047809, 2020 | 12 | 2020 |
RETRACTED ARTICLE: A cluster based mobile data gathering using SDMA and PSO techniques in WSN K Vijayalakshmi, JML Manickam Cluster Computing 22 (Suppl 5), 12727-12736, 2019 | 11 | 2019 |
Security Issues in Wireless Body Area Networks: In Bio-signal Input Fuzzy Security Model: A Survey. MV Karthikeyan, J Manickam, M Leo Research Journal of Pharmaceutical Biological and Chemical Sciences 7 (6 …, 2016 | 11 | 2016 |
Energy preserved mobicast routing prorocol with static node for underwater acoustic sensor network RM Gomathi, JML Manickam, T Madhukumar International Confernce on Innovation Information in Computing Technologies, 1-8, 2015 | 11 | 2015 |
Privacy preservation and authentication on secure geographical routing in VANET A Punitha, JML Manickam Journal of Experimental & Theoretical Artificial Intelligence 29 (3), 617-628, 2017 | 10 | 2017 |
PAPR reduction technique using combined DCT and LDPC based OFDM system for underwater acoustic communication R Gomathi, JML Manickam ARPN J. Eng. Appl. Sci 11 (7), 4424-4430, 2016 | 10 | 2016 |