Intrusion Detection System Using Convolutional Neural Network on UNSW NB15 Dataset vinitha E.UMA, Mahalakshmi, Aroosiya Advances in Parallel Computing Technologies and Applications 40, 1, 2021 | 13 | 2021 |
Implementation of load balancing in leach protocol for wireless sensor networks R Ramesh, RMD Charaan, NTM Kumar, E Uma 2nd international conference on emerging trends in Engineering and …, 2014 | 12 | 2014 |
Detection and Prevention of Wormhole attack in LEACH protocol for a wireless sensor networks RMD Charaan, R Ramesh, E Uma Asian Journal of Information Technology 16 (1), 69-76, 2017 | 8 | 2017 |
Energy balanced clustering algorithms on LEACH protocol for WSN D Charaan, R Ramesh, E Uma International journal of innovation and scientific research 23, 293-302, 2016 | 8 | 2016 |
Self-Aware Message Validating Algorithm for Preventing XMLBased Injection Attacks E Uma, A Kannan International Journal of Technology and Engineering Studies 2 (3), 60-69, 2016 | 6 | 2016 |
Improved cross site scripting filter for input validation against attacks in web services U Elangovan, K Arputharaj Kuwait Journal of Science 41 (2), 175-204, 2014 | 5 | 2014 |
DYNAMIC REMOVAL OF CROSS SITE SCRIPTING VULNERABILITIES IN WEB APPLICATION AK P. UMASANKARI, E. UMA International Journal of Advanced Computational Engineering and Networking 1 …, 2013 | 5 | 2013 |
Trust Score Evaluation Scheme for Secure Routing in VANET E Uma, B Senthilnayaki, A Devi, C Rajeswary, P Dharanyadevi 2021 IEEE International Conference on Mobile Networks and Wireless …, 2021 | 3 | 2021 |
Machine learning based feature selection for intrusion detection system in VANET G Mahalakshmi, E Uma International Conference on Artificial Intelligence, Network Security and …, 2020 | 3 | 2020 |
Fog Enabled Cloud Based Heart Rate Monitoring System L Arulmozhiselvan, E Uma Advances in Parallel Computing Technologies and Applications, 88-95, 2021 | 2 | 2021 |
The dynamic nonce based authentication scheme to defend intermediary attack for web services E Uma, A Kannan Journal of Computer Science 9 (8), 998, 2013 | 1 | 2013 |
Design of New Architecture for Providing Secure Web Services E Uma, A Kannan, R Ramesh Proceedings of the World Congress on Engineering and Computer Science 1, 2011 | 1 | 2011 |
Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications L Arulmozhiselvan, E Uma KSII Transactions on Internet and Information Systems (TIIS) 18 (3), 685-703, 2024 | | 2024 |
Crook node identification system in VANET using CRF based feature selection and data mining classification techniques G Mahalakshmi, E Uma Journal of Intelligent & Fuzzy Systems, 1-13, 2024 | | 2024 |
Deep Neural Network Framework for Hospital Queue Management K Kamatchi, E Uma International Journal of Research in Engineering, Science and Management 5 …, 2022 | | 2022 |
QKD in Cloud-Fog Computing for Personal Health Record. L Arulmozhiselvan, E Uma Computer Systems Science & Engineering 43 (1), 2022 | | 2022 |
Context Aware Knowledge Discovery Using Hadoop Cluster in Cloud Environment E Uma, S Gr, E Mahendran | | 2022 |
COVID-19: Role of Deep Learning and Cloud Through Identification of Kidney, Pancreas and Intestine L Arulmozhiselvan, E Uma, R Jayasri Advances in Parallel Computing Technologies and Applications, 96-104, 2021 | | 2021 |
DETECTING MALICIOUS CONTROLLER BASED ON THREAT VECTORS IN SOFTWARE DEFINED NETWORKSR DEU R. Rajalakshmi, L. Leo Prasanth International Research Journal of Engineering and Technology(IRJET) 7 (07 …, 2020 | | 2020 |
DETECTING MALICIOUS CONTROLLER BASED ON THREAT VECTORS IN SOFTWARE DEFINED NETWORKS R Rajalakshmi, LL Prasanth, E Uma | | 2020 |