Follow
Usha G
Usha G
Associate Professor, SRM Institute of Science and Technology
Verified email at srmist.edu.in
Title
Cited by
Cited by
Year
A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET
MR Babu, G Usha
Wireless Personal Communications 87 (2), 1-15, 2016
44*2016
Dynamic anomaly detection using cross layer security in MANET
Dr.G.Usha,Rajeshbabu, Saravana Kumar
Computer and Electrical Engineering, 2016
35*2016
Impact of gray hole attack on adhoc networks
G Usha, S Bose
2013 International Conference on Information Communication and Embedded …, 2013
282013
Understanding Black Hole Attack in MANET
DUGDS Bose
Euro Journals Publishing 83 (3), 383-396, 2012
16*2012
Detection and classification of distributed DoS attacks using machine learning
G Usha, M Narang, A Kumar
Computer Networks and Inventive Communication Technologies: Proceedings of …, 2021
152021
Real-time DDoS flooding attack detection in intelligent transportation systems
H Karthikeyan, G Usha
Computers and Electrical Engineering 101, 107995, 2022
132022
A framework of cross layer based anomaly intrusion detection and self healing model for manet
K Jothilakshmi, G Usha, S Bose
2013 International Conference on Recent Trends in Information Technology …, 2013
132013
A Machine Learning-Based Technique with IntelligentWordNet Lemmatize for Twitter Sentiment Analysis.
S Saranya, G Usha
Intelligent Automation & Soft Computing 36 (1), 2023
122023
Static analysis method for detecting cross site scripting vulnerabilities
G Usha, S Kannimuthu, PD Mahendiran, AK Shanker, D Venugopal
International Journal of Information and Computer Security 13 (1), 32-47, 2020
122020
cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET
KS Usha GOPAL
Turkish Journal of Electrical Engineering & Computer Sciences 25, 2761 - 2769, 2017
102017
An Intelligent Centrality Measures for Influential Node Detection in Covid-19 Environment
J Dr.G.Usha
Springer-Wireless Personal Communications, 2021
8*2021
Lightweight cryptography algorithms for IoT resource‐starving devices
S Aruna, G Usha, P Madhavan, MVR Kumar
Role of Edge Analytics in Sustainable Smart City Development: Challenges and …, 2020
72020
A deep neural network strategy to distinguish and avoid cyber-attacks
S Agarwal, A Tyagi, G Usha
Artificial Intelligence and Evolutionary Computations in Engineering Systems …, 2020
72020
Efficient malicious detection for AODV in mobile ad-hoc network
M Amaresh, G Usha
2013 International Conference on Recent Trends in Information Technology …, 2013
72013
Fake information analysis and detection on pandemic in twitter
J Jeyasudha, P Seth, G Usha, P Tanna
SN Computer Science 3 (6), 456, 2022
52022
Enhanced Ransomware Detection Techniques using Machine Learning Algorithms
G Usha, P Madhavan, MV Cruz, NAS Vinoth, M Nancy
2021 4th International Conference on Computing and Communications …, 2021
52021
Cyber threat Landscape in Cyberspace
AKS Dr.G.Usha
IEEE International Conference on Electronics, Communication and Aerospace …, 2017
5*2017
Cyber Threat Landscape in Cyber Space
AKS Dr.G.Usha
IEEE International Conference on Electronics, Communication and Aerospace …, 0
5*
Dr. Bose S,“Impact of Sinking behaviour in Mobile adhoc network”
G Usha
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol …, 0
5
Signature identification and user activity analysis on WhatsApp web through network data
S Ramraj, G Usha
Microprocessors and Microsystems 97, 104756, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20