Follow
Dr. Uma Elangovan
Title
Cited by
Cited by
Year
Intrusion Detection System Using Convolutional Neural Network on UNSW NB15 Dataset
vinitha E.UMA, Mahalakshmi, Aroosiya
Advances in Parallel Computing Technologies and Applications 40, 1, 2021
152021
Implementation of load balancing in leach protocol for wireless sensor networks
R Ramesh, RMD Charaan, NTM Kumar, E Uma
2nd international conference on emerging trends in Engineering and …, 2014
122014
Detection and Prevention of Wormhole attack in LEACH protocol for a wireless sensor networks
RMD Charaan, R Ramesh, E Uma
Asian Journal of Information Technology 16 (1), 69-76, 2017
82017
Energy balanced clustering algorithms on LEACH protocol for WSN
D Charaan, R Ramesh, E Uma
International journal of innovation and scientific research 23, 293-302, 2016
82016
Self-Aware Message Validating Algorithm for Preventing XMLBased Injection Attacks
E Uma, A Kannan
International Journal of Technology and Engineering Studies 2 (3), 60-69, 2016
62016
Improved cross site scripting filter for input validation against attacks in web services
U Elangovan, K Arputharaj
Kuwait Journal of Science 41 (2), 175-204, 2014
52014
DYNAMIC REMOVAL OF CROSS SITE SCRIPTING VULNERABILITIES IN WEB APPLICATION
AK P. UMASANKARI, E. UMA
International Journal of Advanced Computational Engineering and Networking 1 …, 2013
52013
Trust Score Evaluation Scheme for Secure Routing in VANET
E Uma, B Senthilnayaki, A Devi, C Rajeswary, P Dharanyadevi
2021 IEEE International Conference on Mobile Networks and Wireless …, 2021
32021
VANET: Trust Evaluation Using Artificial Neural Network
G Mahalakshmi, E Uma, M Vinitha, M Aroosiya
Advances in Parallel Computing Technologies and Applications, 9-17, 2021
32021
Machine learning based feature selection for intrusion detection system in VANET
G Mahalakshmi, E Uma
International Conference on Artificial Intelligence, Network Security and …, 2020
32020
Fog Enabled Cloud Based Heart Rate Monitoring System
L Arulmozhiselvan, E Uma
Advances in Parallel Computing Technologies and Applications, 88-95, 2021
22021
The dynamic nonce based authentication scheme to defend intermediary attack for web services
E Uma, A Kannan
Journal of Computer Science 9 (8), 998, 2013
12013
Design of New Architecture for Providing Secure Web Services
E Uma, A Kannan, R Ramesh
Proceedings of the World Congress on Engineering and Computer Science 1, 2011
12011
Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications.
L Arulmozhiselvan, E Uma
KSII Transactions on Internet & Information Systems 18 (3), 2024
2024
Crook node identification system in VANET using CRF based feature selection and data mining classification techniques
G Mahalakshmi, E Uma
Journal of Intelligent & Fuzzy Systems, 1-13, 2024
2024
Deep Neural Network Framework for Hospital Queue Management
K Kamatchi, E Uma
International Journal of Research in Engineering, Science and Management 5 …, 2022
2022
QKD in Cloud-Fog Computing for Personal Health Record.
L Arulmozhiselvan, E Uma
Computer Systems Science & Engineering 43 (1), 2022
2022
Context Aware Knowledge Discovery Using Hadoop Cluster in Cloud Environment
E Uma, S Gr, E Mahendran
2022
COVID-19: Role of Deep Learning and Cloud Through Identification of Kidney, Pancreas and Intestine
L Arulmozhiselvan, E Uma, R Jayasri
Advances in Parallel Computing Technologies and Applications, 96-104, 2021
2021
DETECTING MALICIOUS CONTROLLER BASED ON THREAT VECTORS IN SOFTWARE DEFINED NETWORKSR
DEU R. Rajalakshmi, L. Leo Prasanth
International Research Journal of Engineering and Technology(IRJET) 7 (07 …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20