Follow
Yogesh Palanichamy
Yogesh Palanichamy
Anna Univesity, Chennai
Verified email at auist.net - Homepage
Title
Cited by
Cited by
Year
Intelligent feature selection and classification techniques for intrusion detection in networks: a survey
S Ganapathy, K Kulothungan, S Muthurajkumar, M Vijayalakshmi, ...
EURASIP Journal on Wireless Communications and Networking 2013, 1-16, 2013
2762013
Does the soft aspects of TQM influence job satisfaction and commitment? An empirical analysis
T Arunachalam, Y Palanichamy
The TQM Journal 29 (2), 385-402, 2017
952017
Intelligent Agent‐Based Intrusion Detection System Using Enhanced Multiclass SVM
S Ganapathy, P Yogesh, A Kannan
Computational intelligence and neuroscience 2012 (1), 850259, 2012
902012
An intelligent temporal pattern classification system using fuzzy temporal rules and particle swarm optimization
S Ganapathy, R Sethukkarasi, P Yogesh, P Vijayakumar, A Kannan
Sadhana 39, 283-302, 2014
802014
An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns
R Sethukkarasi, S Ganapathy, P Yogesh, A Kannan
Journal of Intelligent & Fuzzy Systems 26 (3), 1167-1178, 2014
612014
Behavior-based detection of application layer distributed denial of service attacks during flash events
R Saravanan, S Shanmuganathan, Y Palanichamy
Turkish Journal of Electrical Engineering and Computer Sciences 24 (2), 510-523, 2016
552016
An Intelligent CRF Based Feature Selection for Effective Intrusion Detection.
S Ganapathy, P Vijayakumar, P Yogesh, A Kannan
International Arab Journal of Information Technology (IAJIT) 13 (1), 2016
542016
Secure and efficient smart-card-based remote user authentication scheme for multiserver environment
S Shunmuganathan, RD Saravanan, Y Palanichamy
Canadian Journal of Electrical and Computer Engineering 38 (1), 20-30, 2015
542015
Detection of DoS attacks in cloud networks using intelligent rule based classification system
R Rajendran, SVN Santhosh Kumar, Y Palanichamy, K Arputharaj
Cluster Computing 22, 423-434, 2019
522019
A novel weighted fuzzy C–means clustering based on immune genetic algorithm for intrusion detection
S Ganapathy, K Kulothungan, P Yogesh, A Kannan
Procedia Engineering 38, 1750-1757, 2012
472012
Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks
SVN Santhosh Kumar, Y Palanichamy, M Selvi, S Ganapathy, A Kannan, ...
Wireless Networks 27, 3873-3894, 2021
452021
Detection of application layer DDoS attacks using information theory based metrics
SR Devi, P Yogesh
CS & IT-CSCP 10, 213-223, 2012
432012
Proactive failure recovery in OpenFlow based software defined networks
V Padma, P Yogesh
2015 3rd International Conference on Signal Processing, Communication and …, 2015
362015
An intelligent intrusion detection system for mobile ad-hoc networks using classification techniques
S Ganapathy, P Yogesh, A Kannan
Advances in Power Electronics and Instrumentation Engineering: Second …, 2011
322011
Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN
SVN Santhosh Kumar, Y Palanichamy
Wireless Networks 24, 1343-1360, 2018
312018
A rule based approach for attribute selection and intrusion detection in wireless sensor networks
K Anand, S Ganapathy, K Kulothungan, P Yogesh, A Kannan
Procedia Engineering 38, 1658-1664, 2012
292012
An intelligent agent based intrusion detection system using fuzzy rough set based outlier detection
N Jaisankar, S Ganapathy, P Yogesh, A Kannan, K Anand
Soft computing techniques in vision science, 147-153, 2012
292012
Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach
K Kulothungan, S Ganapathy, S Indra Gandhi, P Yogesh, A Kannan
International Journal of Soft Computing 6 (5), 210-215, 2011
252011
Q-learning based routing for in-network aggregation in wireless sensor networks
R Maivizhi, P Yogesh
Wireless Networks 27 (3), 2231-2250, 2021
242021
A hybrid approach to counter application layer DDoS attacks
SR Devi, P Yogesh
International Journal on Cryptography and Information Security (IJCIS) 2 (2), 2012
232012
The system can't perform the operation now. Try again later.
Articles 1–20