Network intrusion detection system using genetic network programming with support vector machine PK Sujatha, CS Priya, A Kannan Proceedings of the International Conference on Advances in Computing …, 2012 | 14 | 2012 |
Reduction of big data sets using fuzzy clustering S Prabha, PG Student, PK Sujatha International Journal of Advanced Research in Computer Engineering …, 2014 | 11 | 2014 |
Enhancement of segmentation and feature fusion for apple disease classification PK Sujatha, J Sandhya, JS Chaitanya, R Subashini 2018 Tenth International Conference on Advanced Computing (ICoAC), 175-181, 2018 | 10 | 2018 |
A behavior based approach to host-level intrusion detection using self-organizing maps PK Sujatha, A Kannan, S Ragunath, KS Bargavi, S Githanjali 2008 First International Conference on Emerging Trends in Engineering and …, 2008 | 10 | 2008 |
Analysis and Performance Evaluation of Cosine Neighbourhood Recommender System. K Periyasamy, J Jaiganesh, K Ponnambalam, J Rajasekar, K Arputharaj International Arab Journal of Information Technology (IAJIT) 14 (5), 2017 | 6 | 2017 |
Performance evaluation of classifiers for analysis of road accidents C Sugetha, L Karunya, E Prabhavathi, PK Sujatha 2017 Ninth International Conference on Advanced Computing (ICoAC), 365-368, 2017 | 5 | 2017 |
Segmentation based representation for tweet hashtag SP Sharmila, PK Sujatha 2015 Seventh International Conference on Advanced Computing (ICoAC), 1-7, 2015 | 5 | 2015 |
Network level anomaly detection system using MST based genetic clustering P Kola Sujatha, R Arun, PV Shanthoosh, I Ezra Prince Jebahar, A Kannan Advances in Network Security and Applications: 4th International Conference …, 2011 | 4 | 2011 |
Anomaly Detection in Video Using Gaussian Model and Recurrent Neural Network PK Sujatha, S Yuvarani 2018 Tenth International Conference on Advanced Computing (ICoAC), 202-207, 2018 | 1 | 2018 |
Topic summarisation on tweets T Divyasree, PK Sujatha 2015 Seventh International Conference on Advanced Computing (ICoAC), 1-6, 2015 | 1 | 2015 |
Memory efficacious pattern matching intrusion detection system S Dhivya, D Dhakchianandan, A Gowtham, PK Sujatha, A Kannan 2013 International Conference on Recent Trends in Information Technology …, 2013 | 1 | 2013 |
Trustworthy distributed collaborative intrusion detection using mobile agents N Asokan, A Sujitha, R Poornima, PK Sujatha, A Kannan 2013 International Conference on Recent Trends in Information Technology …, 2013 | | 2013 |
Application-Layer Attacks Sleuthing Model Using Eccentric Classifiers PK Sujatha, M Ajay, G Hariharan, S Albert, A Kannan European Journal of Scientific Research 78 (3), 375-383, 2012 | | 2012 |
Weighted Linked Data based Unsupervised Feature Selection JS Jenifa, PK Sujatha | | |
Data mining approach for hybrid intrusion detection system P Kola Sujatha Chennai, 0 | | |
Data Mining Based Learning Agents in Intrusion Detection System V Viswanathan, K Prathiba, M Bhuvaneshwari, P Kola Sujatha | | |
MINING OUTLIERS IN LARGE DATASETS USING HADOOP ENVIRONMENT S Kumar, PK Sujatha | | |