Clustering in wireless sensor networks: Performance comparison of leach & leach-c protocols using ns2 VA Geetha, PV Kallapur, S Tellajeera Procedia Technology 4, 163-170, 2012 | 128 | 2012 |
SQL Injection detection using machine learning A Joshi, V Geetha 2014 international conference on control, instrumentation, communication and …, 2014 | 84 | 2014 |
Jamura: a conversational smart home assistant built on Telegram and Google Dialogflow S Salvi, V Geetha, SS Kamath TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 1564-1571, 2019 | 35 | 2019 |
Effect of Mobility over Performance of the Ad hoc Networks V Geetha, S Aithal, KC Sekaran 2006 International Symposium on Ad Hoc and Ubiquitous Computing, 138-141, 2006 | 24 | 2006 |
A distributed trust based secure communication framework for wireless sensor network V Geetha, K Chandrasekaran Wireless Sensor Network 6 (09), 173, 2014 | 21 | 2014 |
A survey and comparison of GTS allocation and scheduling algorithms in IEEE 802.15. 4 wireless sensor networks S Rao, S Keshri, D Gangwar, P Sundar, V Geetha 2013 IEEE Conference on Information & Communication Technologies, 98-103, 2013 | 20 | 2013 |
Research challenges in using mobile agents for data aggregation in wireless sensor networks with dynamic deadlines PV Kallapur, V Geetha International Journal of Computer Applications 30 (5), 34-38, 2011 | 9 | 2011 |
Human activity recognition in smart home using deep learning techniques R Kolkar, V Geetha 2021 13th International conference on information & communication technology …, 2021 | 8 | 2021 |
Follow me: A human following robot using wi-fi received signal strength indicator V Geetha, S Salvi, G Saini, N Yadav, RP Singh Tomar ICT Systems and Sustainability: Proceedings of ICT4SD 2020, Volume 1, 585-593, 2021 | 8 | 2021 |
Enhanced beta trust model for identifying insider attacks in wireless sensor networks V Geetha, K Chandrasekaran Int. J. Comput. Sci. Netw. Secur 13, 14-19, 2013 | 8 | 2013 |
Enhanced back-off technique for IEEE 802.15. 4 WSN standard A Vutukuri, S Bhattacharya, T Raj, Sridhar, V Geetha Networks and Communications (NetCom2013) Proceedings of the Fifth …, 2014 | 7 | 2014 |
From light to li-fi: Research challenges in modulation, mimo, deployment strategies and handover S Salvi, V Geetha 2019 International Conference on Data Science and Engineering (ICDSE), 107-119, 2019 | 6 | 2019 |
Evaluation of wear properties of industrial waste (slag) reinforced polypropylene composites NV Kumar, MMM Sarcar, K Ramji, V Geetha Int. J. Theor. Appl. Res. Mech. Eng 3, 2319-3182, 2014 | 6 | 2014 |
Survey on routing protocols for Internet of Things A Bhat, V Geetha 2017 7th International Symposium on Embedded Computing and System Design …, 2017 | 5 | 2017 |
A User Authentication and Access Control Scheme for IoT-Based Healthcare Using Blockchain V Geetha, B Balakrishnan 2021 12th International Conference on Computing Communication and Networking …, 2021 | 4 | 2021 |
Trust factor based leach-c protocol for wireless sensor networks V Geetha, K Chandrasekaran International Journal of Computer Applications 105 (18), 10.5120, 2014 | 4 | 2014 |
Efficient and secure communication of quantum image steganography using 3-way’s of authentication KC Chandana, V Geetha 2019 1st International Conference on Advances in Information Technology …, 2019 | 3 | 2019 |
Web security: A survey of latest trends in security attacks PV Kallapur, V Geetha Advances in Computer, Communication, Control and Automation, 405-415, 2012 | 3 | 2012 |
Deepfake Image Detection using CNNs and Transfer Learning N Kumar, P Pranav, V Nirney, V Geetha 2021 International Conference on Computing, Communication and Green …, 2021 | 2 | 2021 |
Smart home environment: Artificial intelligence-enabled iot framework for smart living and smart health V Geetha, SS Kamath, SS Salvi AI-Based services for smart cities and urban infrastructure, 310-325, 2021 | 2 | 2021 |