Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm AP Muniyandi, R Rajeswari, R Rajaram Procedia Engineering 30, 174-182, 2012 | 333 | 2012 |
An Efficient Password Authentication Scheme for Smart Card. R Ramasamy, AP Muniyandi Int. J. Netw. Secur. 14 (3), 180-186, 2012 | 67 | 2012 |
An efficient technique for preventing SQL injection attack using pattern matching algorithm MA Prabakar, M KarthiKeyan, K Marimuthu 2013 IEEE international conference on emerging trends in computing …, 2013 | 63 | 2013 |
New Remote Mutual Authentication Scheme using Smart Cards. R Ramasamy, AP Muniyandi Trans. Data Priv. 2 (2), 141-152, 2009 | 43 | 2009 |
Knapsack based ECC encryption and decryption. RR Ramasamy, MA Prabakar, MI Devi, M Suguna Int. J. Netw. Secur. 9 (3), 218-226, 2009 | 35 | 2009 |
Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review SA Sheik, AP Muniyandi Cyber Security and Applications 1, 100002, 2023 | 26 | 2023 |
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC. RR Ramasamy, MA Prabakar Int. J. Netw. Secur. 12 (1), 7-12, 2011 | 20 | 2011 |
Dependable and provable secure two-factor mutual authentication scheme using ECC for IoT-based telecare medical information system N Radhakrishnan, AP Muniyandi Journal of Healthcare Engineering 2022, 2022 | 19 | 2022 |
Password based remote authentication scheme using ECC for smart card AP Muniyandi, R Ramasamy, Indrani Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 12 | 2011 |
A supervised learning approach for criminal identification using similarity measures and K-Medoids clustering ST Bharathi, B Indrani, MA Prabakar 2017 International Conference on Intelligent Computing, Instrumentation and …, 2017 | 8 | 2017 |
Knapsack based ECC encryption and decryption R Rajaram Ramasamy, M Amutha Prabakar, M Indra Devi, M Suguna International Journal of Network Security 9 (3), 218-226, 2009 | 7 | 2009 |
A new algorithm for encryption/decryption for field applications R Ramasamy, AP Muniyandi, I Devi Computer Standards & Interfaces 31 (6), 1069-1072, 2009 | 5 | 2009 |
WITHDRAWN: Sports activity recognition using classification techniques R Balamurugan, NN Prasanth, MA Prabakar, KV Devi Materials Today: Proceedings, 2021 | 4 | 2021 |
Computing the Modular Inverse of a Polynomial Function over GF (2P) Using Bit Wise Operation. R Ramasamy, AP Muniyandi Int. J. Netw. Secur. 10 (2), 107-113, 2010 | 4 | 2010 |
An efficient technique for preventing SQL Injection attack using pattern matching algorithm M Amutha Prabakar, M KarthiKeyan, K Marimuthu IEEE, 2013 | 3 | 2013 |
Knapsack based ECC for digital signature authentication R Rajaram, M Amutha Prabakar, M Indra Devi International Journal of Communication Networks and Distributed Systems 3 (4 …, 2009 | 2 | 2009 |
Renewable Energy Sources for Modern Agricultural Trends S Arulvel, TJ Devadas, DDW Rufuss, MA Prabakar Cloud IoT Systems for Smart Agricultural Engineering, 223-242, 2022 | 1 | 2022 |
A Detailed Analysis of Intruders’ Activities in the Network Through the Real-Time Virtual Honeynet Experimentation R Ganesarathinam, MA Prabakar, M Singaravelu, AL Fernandez Artificial Intelligence and Evolutionary Computations in Engineering Systems …, 2020 | 1 | 2020 |
An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card SA Sheik, MA Prabakar International Journal of Information and Computer Security 16 (3-4), 207-225, 2021 | | 2021 |
Robust and provable secure three-factor mutual authentication scheme using a smart card R Niranchana, MA Prabakar International Journal of Internet Technology and Secured Transactions 11 (5 …, 2021 | | 2021 |