An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique M Mayuranathan, SK Saravanan, B Muthusenthil, A Samydurai Advances in Engineering Software 173, 103236, 2022 | 49 | 2022 |
A reliable next generation cyber security architecture for industrial internet of things environment C Vijayakumaran, B Muthusenthil, B Manickavasagam International Journal of Electrical and Computer Engineering 10 (1), 387, 2020 | 44 | 2020 |
Deep Learning Based Security Model for Cloud based Task Scheduling K Devi, B Muthusenthil KSII Transactions on Internet and Information 14 (9), 3663-3679, 2020 | 36* | 2020 |
Privacy preservation and protection for cluster based geographic routing protocol in MANET B Muthusenthil, S Murugavalli Wireless Networks 23, 79-87, 2017 | 20 | 2017 |
Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN-RFOA MB Devi K Trans Emerging Tel Tech 33 (9), 2022 | 14 | 2022 |
CCTV surveillance system, attacks and design goals B Muthusenthil, HS Kim International Journal of Electrical and Computer Engineering 8 (4), 2072, 2018 | 14 | 2018 |
The impact of location based attacks on geographical routing protocols B Muthusenthil, S Murugavalli J. Theor. Appl. Inf. Technol 60 (2), 189-199, 2014 | 10 | 2014 |
Hybrid Fuzzy Archimedes‐based Light GBM‐XGBoost model for distributed task scheduling in mobile edge computing G Kumaresan, K Devi, S Shanthi, B Muthusenthil, A Samydurai Transactions on Emerging Telecommunications Technologies 34 (4), e4733, 2023 | 8 | 2023 |
Location Aided Cluster based Geographical Routing Protocol for Intermittently Connected MANET M Muthusenthil International Review on Computers and Software, 1-8, 2014 | 8 | 2014 |
Location verification technique for cluster based geographical routing in MANET B Muthusenthil, H Kim, VB Prasath Informatica 31 (1), 113-130, 2020 | 7 | 2020 |
Shrp-secure hybrid routing protocol over hierarchical wireless sensor networks B Muthusenthil, H Kim International Journal of Computers Communications & Control 12 (6), 854-870, 2017 | 7 | 2017 |
Security and privacy framework for academic monitoring system B Muthusenthil, C Vijayakumaran, H Kim 2015 8th International Conference on Security Technology (SecTech), 5-8, 2015 | 6 | 2015 |
A review of digital twin leveraging technology, concepts, tools and industrial applications SK Saravanan, B Muthusenthil, S Gurusubramani 2022 1st International Conference on Computational Science and Technology …, 2022 | 3 | 2022 |
Reencryption scheme for secure data sharing B Muthusenthil, D Nivetha, H Kim 2016 International Conference on Communication and Signal Processing (ICCSP …, 2016 | 2 | 2016 |
Privacy preservation and protection scheme over ALARM on geographical routing B Muthusenthil, S Murugavalli, H Kim 2015 8th International Conference on Security Technology (SecTech), 1-4, 2015 | 2 | 2015 |
EI-RNN-based text generation for the static and dynamic isolated sign language videos S Subburaj, S Murugavalli, B Muthusenthil Journal of Intelligent & Fuzzy Systems, 1-15, 2023 | 1 | 2023 |
Performance evaluation of GPSR with ALERT in Mobile Ad-hoc Networks B Muthusenthil, S Murugavalli International Journal of Applied Engineering Research 10 (17), 13482-13491, 2015 | 1 | 2015 |
Memetic Programming Approach for Floorplanning Applications R Varatharajan, M Senthil International Journal of Information Engineering and Electronic Business 4 …, 2012 | 1 | 2012 |
Mobile-Based Cloud Detection Model for Skin Cancer Using Machine Learning K Devi, B Muthusenthil, SK Saravanan Next-Gen Technologies in Computational Intelligence, 232-236, 2024 | | 2024 |
EI-RNN-based text generation for the static and dynamic isolated sign language videos MB Subburaj S, Murugavalli S Journal of Intelligent & Fuzzy Systems, DOI:10.3233/JIFS-233610, 2023 | | 2023 |