Yogesh Palanichamy
Yogesh Palanichamy
Anna Univesity, Chennai
Verified email at auist.net
Cited by
Cited by
Intelligent feature selection and classification techniques for intrusion detection in networks: a survey
S Ganapathy, K Kulothungan, S Muthurajkumar, M Vijayalakshmi, ...
EURASIP Journal on Wireless Communications and Networking 2013 (1), 1-16, 2013
Intelligent agent-based intrusion detection system using enhanced multiclass SVM
S Ganapathy, P Yogesh, A Kannan
Computational intelligence and neuroscience 2012, 2012
An intelligent temporal pattern classification system using fuzzy temporal rules and particle swarm optimization
S Ganapathy, R Sethukkarasi, P Yogesh, P Vijayakumar, A Kannan
Sadhana 39 (2), 283-302, 2014
Does the soft aspects of TQM influence job satisfaction and commitment? An empirical analysis
T Arunachalam, Y Palanichamy
The TQM Journal, 2017
Behavior-based detection of application layer distributed denial of service attacks during flash events
R Saravanan, S Shanmuganathan, Y Palanichamy
Turkish Journal of Electrical Engineering & Computer Sciences 24 (2), 510-523, 2016
An Intelligent CRF Based Feature Selection for Effective Intrusion Detection.
S Ganapathy, P Vijayakumar, P Yogesh, A Kannan
International Arab Journal of Information Technology (IAJIT) 13 (1), 2016
An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns
R Sethukkarasi, S Ganapathy, P Yogesh, A Kannan
Journal of Intelligent & Fuzzy Systems 26 (3), 1167-1178, 2014
Secure and efficient smart-card-based remote user authentication scheme for multiserver environment
S Shunmuganathan, RD Saravanan, Y Palanichamy
Canadian Journal of Electrical and Computer Engineering 38 (1), 20-30, 2015
A novel weighted fuzzy C–means clustering based on immune genetic algorithm for intrusion detection
S Ganapathy, K Kulothungan, P Yogesh, A Kannan
Procedia Engineering 38, 1750-1757, 2012
Efficient and secure anonymous authentication with location privacy for IoT-based WBANs
P Vijayakumar, MS Obaidat, M Azees, SKH Islam, N Kumar
IEEE Transactions on Industrial Informatics 16 (4), 2603-2611, 2019
Hybrid model for security-aware cluster head selection in wireless sensor networks
A Shankar, N Jaisankar, MS Khan, R Patan, B Balamurugan
IET Wireless Sensor Systems 9 (2), 68-76, 2019
Detection of application layer DDoS attacks using information theory based metrics
SR Devi, P Yogesh
CS & IT-CSCP 10, 213-223, 2012
An intelligent intrusion detection system for mobile ad-hoc networks using classification techniques
S Ganapathy, P Yogesh, A Kannan
International Conference on Power Electronics and Instrumentation …, 2011
A practical group blind signature scheme for privacy protection in smart grid
W Kong, J Shen, P Vijayakumar, Y Cho, V Chang
Journal of Parallel and Distributed Computing 136, 29-39, 2020
QoS aware trust based routing algorithm for wireless sensor networks
T Kalidoss, L Rajasekaran, K Kanagasabai, G Sannasi, A Kannan
Wireless Personal Communications 110 (4), 1637-1658, 2020
A rule based approach for attribute selection and intrusion detection in wireless sensor networks
K Anand, S Ganapathy, K Kulothungan, P Yogesh, A Kannan
Procedia engineering 38, 1658-1664, 2012
Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks
P Nancy, S Muthurajkumar, S Ganapathy, SVNS Kumar, M Selvi, ...
IET Communications 14 (5), 888-895, 2020
An intelligent agent based intrusion detection system using fuzzy rough set based outlier detection
N Jaisankar, S Ganapathy, P Yogesh, A Kannan, K Anand
Soft computing techniques in vision science, 147-153, 2012
Proactive failure recovery in OpenFlow based software defined networks
V Padma, P Yogesh
2015 3rd International Conference on Signal Processing, Communication and …, 2015
An intelligent system for intrusion detection using outlier detection
S Ganapathy, N Jaisankar, P Yogesh, A Kannan
2011 International Conference on Recent Trends in Information Technology …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20