A survey on security issues in service delivery models of cloud computing S Subashini, V Kavitha Journal of network and computer applications 34 (1), 1-11, 2010 | 3839 | 2010 |
Efficient technique for color image noise reduction C Mythili, V Kavitha The research bulletin of Jordan ACM 2 (3), 41-44, 2011 | 91 | 2011 |
Privacy and Utility Preserving Data Clustering for Data Anonymization and Distribution on Hadoop VK J.Jesu Vedha Nayahi Future Generation Computer Systems, 2017 | 71 | 2017 |
A survey on congestion control techniques in wireless sensor networks DFJ Flora, V Kavitha, M Muthuselvi 2011 international conference on emerging trends in electrical and computer …, 2011 | 60 | 2011 |
A comprehensive survey on approaches to intrusion detection system AJ Deepa, V Kavitha Procedia Engineering 38, 2063-2069, 2012 | 56 | 2012 |
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment V Kavitha Peer-to-Peer Networking and Applications 14 (2), 821-836, 2021 | 43 | 2021 |
Churn prediction of customer in telecom industry using machine learning algorithms V Kavitha, GH Kumar, SVM Kumar, M Harish International Journal of Engineering Research & Technology (2278-0181) 9 (05 …, 2020 | 40 | 2020 |
Color image segmentation using ERKFCM C Mythili, V Kavitha International Journal of Computer Applications 41 (20), 2012 | 39 | 2012 |
A metadata based storage model for securing data in cloud environment S Subashini, V Kavitha 2011 International Conference on Cyber-Enabled Distributed Computing and …, 2011 | 39 | 2011 |
Morphology based text detection and extraction from complex video scene T Pratheeba, V Kavitha, SR Rajeswari International Journal of Engineering and technology 2 (3), 200-206, 2010 | 34 | 2010 |
A hybrid data anonymization integrated with suppression for preserving privacy in mining multi party data P Deivanai, JJV Nayahi, V Kavitha 2011 International Conference on Recent Trends in Information Technology …, 2011 | 33 | 2011 |
Optimization enabled deep learning-based DDoS attack detection in cloud computing S Balasubramaniam, C Vijesh Joe, TA Sivakumar, A Prasanth, ... International Journal of Intelligent Systems 2023, 2023 | 30 | 2023 |
Energy conservation in Cloud data centres by minimizing virtual machines migration through artificial neural network VK A. Radhakrishnan Computing, 1-18., 2016 | 27 | 2016 |
Rapid background subtraction from video sequences RAT Jenifa, C Akila, V Kavitha 2012 International Conference on Computing, Electronics and Electrical …, 2012 | 22 | 2012 |
Neural based steganography V Kavitha, KS Easwarakumar PRICAI 2004: Trends in Artificial Intelligence: 8th Pacific Rim …, 2004 | 20 | 2004 |
A survey on security Issues and vulnerabilities on cloud computing KL Neela, V Kavitha Int. J. Comput. Sci. Eng. Technol 4 (7), 855-860, 2013 | 18 | 2013 |
Enhancing privacy in arithmetic coding V Kavitha, KS Easwarakumar ICGST-AIML Journal 8 (1), 2008 | 18 | 2008 |
Feature selection and dwarf mongoose optimization enabled deep learning for heart disease detection S Balasubramaniam, KS Kumar, V Kavitha, A Prasanth, TA Sivakumar Computational intelligence and neuroscience 2022, 2022 | 17 | 2022 |
A privacy-aware deep learning framework for health recommendation system on analysis of big data T Mahesh Selvi, V Kavitha The Visual Computer 38 (2), 385-403, 2022 | 15 | 2022 |
An improved RSA technique with efficient data integrity verification for outsourcing database in cloud KL Neela, V Kavitha Wireless Personal Communications 123 (3), 2431-2448, 2022 | 14 | 2022 |