Review on anomaly based network intrusion detection system R Samrin, D Vasumathi 2017 international conference on electrical, electronics, communication …, 2017 | 154 | 2017 |
Homomorphic encryption techniques for securing data in cloud computing: A survey V Biksham, D Vasumathi International Journal of Computer Applications 975 (8887), 2017 | 38 | 2017 |
Data mining: min–max normalization based data perturbation technique for privacy preservation A Kiran, D Vasumathi Proceedings of the third international conference on computational …, 2020 | 29 | 2020 |
A comprehensive survey on privacy preservation algorithms in data mining A Kiran, D Vasumathi 2017 IEEE International Conference on Computational Intelligence and …, 2017 | 25 | 2017 |
An attributes similarity-based K-medoids clustering technique in data mining G Surya Narayana, D Vasumathi Arabian Journal for Science and Engineering 43 (8), 3979-3992, 2018 | 22 | 2018 |
An efficient load balancing technique based on cuckoo search and firefly algorithm in cloud KP Kumar, T Ragunathan, D Vasumathi, PK Prasad Algorithms 423, 422-432, 2020 | 20 | 2020 |
BC-WASPT: Web access sequential pattern tree mining D Vasumathi, A Govardhan International Journal of Computer Science and Network Security (IJCSNS) 9 (6 …, 2009 | 14 | 2009 |
Hybrid weighted k-means clustering and artificial neural network for an anomaly-based network intrusion detection system R Samrin, D Vasumathi Journal of Intelligent Systems 27 (2), 135-147, 2018 | 12 | 2018 |
A lightweight fully homomorphic encryption scheme for cloud security V Biksham, D Vasumathi International Journal of Information and Computer Security 13 (3-4), 357-371, 2020 | 11 | 2020 |
Query based computations on encrypted data through homomorphic encryption in cloud computing security V Biksham, D Vasumathi 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 10 | 2016 |
DCT based watermark embedding into mid frequency of DCT coefficients using luminance component T Bhaskar, D Vasumathi International Research Journal of Engineering and Technology (IRJET) 2 (3 …, 2015 | 10 | 2015 |
Efficient web usage mining based on formal concept analysis D Vasumathi, A Govardhan Journal of Theoretical and Applied Information Technology 9 (2), 99-109, 2009 | 10 | 2009 |
A novel method for content based 3D medical image retrieval system using dual tree M-band wavelets transform and multiclass support vector machine P Grandhe Journal of Advanced Research in Dynamical and Control Systems 12 (3), 279-286, 2020 | 9 | 2020 |
A study of mining software engineering data and software testing T Krishna, D Vasumathi Journal of Emerging Trends in Computing and Information Sciences 2 (11), 2011 | 9 | 2011 |
An enhanced unsupervised learning approach for sentiment analysis using extraction of tri-co-occurrence words phrases M Venkateswarlu Naik, D Vasumathi, AP Siva Kumar Proceedings of the Second International Conference on Computational …, 2018 | 8 | 2018 |
Identity-based cryptosystem based on tate pairing R Ch, KV Rao, D Vasumathi Global Journal of Computer Science and Technology 16 (5), 2, 2016 | 8 | 2016 |
Effective web personalization using clustering D Vasumathi, A Govardhan, K Suresh 2009 International Conference on Intelligent Agent & Multi-Agent Systems, 1-7, 2009 | 8 | 2009 |
A comparative study of data mining tools and techniques for business intelligence GS Ramesh, TV Rajini Kanth, D Vasumathi Performance Management of Integrated Systems and its Applications in …, 2020 | 6 | 2020 |
Clustering for high dimensional categorical data based on text similarity GS Narayana, D Vasumathi Proceedings of the 2nd international conference on communication and …, 2016 | 6 | 2016 |
A vector space model approach for web attack classification using machine learning technique BV Ram Naresh Yadav, B Satyanarayana, D Vasumathi Proceedings of the Second International Conference on Computer and …, 2016 | 6 | 2016 |