Information security breaches due to ransomware attacks-a systematic literature review TR Reshmi International Journal of Information Management Data Insights 1 (2), 100013, 2021 | 89 | 2021 |
Extended 3PAKE authentication scheme for value-added services in VANETs R Muthumeenakshi, TR Reshmi, K Murugan Computers & Electrical Engineering 59, 27-38, 2017 | 34 | 2017 |
Improved self-healing technique for 5G networks using predictive analysis TR Reshmi, M Azath Peer-to-Peer Networking and Applications 14 (1), 375-391, 2021 | 22 | 2021 |
Filter-based address autoconfiguration protocol (FAACP) for duplicate address detection and recovery in MANETs TR Reshmi, K Murugan Computing 97, 309-331, 2015 | 21 | 2015 |
Light Weight Cryptographic Address Generation (LW-CGA) using System State Entropy Gathering for IPv6 based MANETs RTR Murugan K China Communications, 114-126, 2017 | 18 | 2017 |
Multi-hop Energy-Efficient reliable Cluster-based sectoring scheme using Markov chain model to improve QOS parameters in a WSN DN Wategaonkar, SV Nagaraj, TR Reshmi Wireless Personal Communications 119 (1), 393-421, 2021 | 10 | 2021 |
Optimized Query Ordering Data Aggregation Model Using Neural Networks and Group Search Optimization inWireless Sensor Network. P Sarode, TR Reshmi Adhoc & Sensor Wireless Networks 46, 2020 | 7 | 2020 |
Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN P Sarode, TR Reshmi, V Pattabiraman Wireless Personal Communications 116 (1), 513-538, 2021 | 6 | 2021 |
Secure relay selection scheme for Traffic Congested Zone in VANET using grasshopper optimization and modified authentication key agreement algorithms AA Monisha, TR Reshmi, K Murugan Applied Intelligence 53 (5), 5497-5518, 2023 | 3 | 2023 |
CEOF: Enhanced Clustering-based Entries Optimization scheme to prevent Flow table overflow N Priyanka, TR Reshmi, K Murugan Wireless Networks, 1-15, 2022 | 2 | 2022 |
Selective address allocator configuration protocol (SAACP) for resource constrained MANETs. TR Reshmi, K Murugan J. Inf. Sci. Eng. 32 (1), 197-211, 2016 | 2 | 2016 |
Intelligent Computing Models KT al Narosa Publishing House 1, 306, 2009 | 2 | 2009 |
Enhancing PKI Security in Hyperledger Fabric with an Indigenous Certificate Authority TR Santhosh, M. G., & Reshmi IEEE International Conference on Public Key Infrastructure and its …, 2023 | 1 | 2023 |
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET AA Monisha, TR Reshmi, K Murugan Peer-to-Peer Networking and Applications 16 (4), 1761-1784, 2023 | 1 | 2023 |
CSO-Based Energy-Efficient Reliable Sectoring-Scheme in WSN. DN Wategaonkar, TR Reshmi Journal of Information Science & Engineering 36 (5), 2020 | 1 | 2020 |
Study on query-based information extraction in IoT-integrated wireless sensor networks P Sarode, TR Reshmi Countering Cyber Attacks and Preserving the Integrity and Availability of …, 2019 | 1 | 2019 |
Security in Cloud Computing TR Reshmi 2018 International Conference on Recent Trends in Advance Computing (ICRTAC …, 2018 | 1 | 2018 |
Secure and Reliable Autoconfiguration Protocol (SRACP) for MANETs TR Reshmi, K Murugan Wireless Personal Communications 89, 1243-1264, 2016 | 1 | 2016 |
Internal hardware states based privacy extension of IPv6 addresses TR Reshmi, SM Manoharan, K Murugan Security in Computing and Communications: Second International Symposium …, 2014 | 1 | 2014 |
Enabling QoS in stateful auto-configuration protocol used in IPv6 based manets R Punitha, TR Reshmi, K Murugan 2013 International Conference on Communication and Signal Processing, 1129-1133, 2013 | 1 | 2013 |