A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases S Narayan, E Sathiyamoorthy Neural Computing and Applications 31, 93-102, 2019 | 49 | 2019 |
Comparative study for feature selection algorithms in intrusion detection system K Anusha, E Sathiyamoorthy Automatic Control and Computer Sciences 50, 1-9, 2016 | 24 | 2016 |
Agent based security for cloud computing using obfuscation K Govinda, E Sathiyamoorthy Procedia Engineering 38, 125-129, 2012 | 19 | 2012 |
A new trust-based mechanism for detecting intrusions in MANET. K Anusha, E Sathiyamoorthy Inf. Secur. J. A Glob. Perspect. 26 (4), 153-165, 2017 | 14 | 2017 |
A prevention model for session hijack attacks in wireless networks using strong and encrypted session ID SS Manivannan, E Sathiyamoorthy cybernetics and information technologies 14 (3), 46-60, 2014 | 14 | 2014 |
Omamids: ontology based multi-agent model intrusion detection system for detecting web service attacks K Anusha, E Sathiyamoorthy Journal of Applied Security Research 11 (4), 489-508, 2016 | 12 | 2016 |
A Novel and efficient public key encryption algorithm PMDR Vincent, E Sathiyamoorthy International Journal of Information and communication technology 9 (2), 199-211, 2016 | 12 | 2016 |
Agent based trust management model based on weight value model for online auctions E Sathiyamoorthy, N Iyenger, V Ramachandran arXiv preprint arXiv:1004.0765, 2010 | 10 | 2010 |
Mobile agent based trust management framework using fuzzy logic in B2C e-business environment E Sathiyamoorthy, N Iyengar, V Ramachandran International Journal of Computer Theory and Engineering 2 (2), 308-312, 2010 | 10 | 2010 |
Agent based trust management framework in distributed e-business environment E Sathiyamoorthy, N Iyenger, V Ramachandran International journal of computer science & information technology (IJCSIT …, 2010 | 10 | 2010 |
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system K Anusha, E Sathiyamoorthy International Journal of Internet Technology and Secured Transactions 6 (3 …, 2016 | 9 | 2016 |
A narrative review of medical image processing by deep learning models: origin to COVID-19 V Mareeswari, R Vijayan, E Sathiyamoorthy, EP Ephzibah International Journal of Advanced Technology and Engineering Exploration 9 …, 2022 | 7 | 2022 |
A secured and time efficient electronic business framework based on public key cryptography PM Vincent, E Sathiyamoorthy Int Rev Comp Softw 9, 1791-8, 2014 | 6 | 2014 |
A novel and efficient key sharing technique for web applications PMDR Vincent, E Sathiyamoorthy 2013 Fourth International Conference on Computing, Communications and …, 2013 | 6 | 2013 |
Privacy Preservation of a Group and Secure Data Storage in Cloud Environment K Govinda, E Sathiyamoorthy Cybernetics and Information Technologies 15 (1), 46-54, 2015 | 5 | 2015 |
Data Auditing in Cloud Environment using Message Authentication Code‖ K Govinda, E Sathiyamoorthy International Conference on Emerging Trends on Advanced Engineering Research …, 2012 | 5 | 2012 |
Secure traffic management in cluster environment to handle ddos attack K Govinda, E Sathiyamoorthy World Applied Sciences Journal 32 (9), 1828-1834, 2014 | 4 | 2014 |
Intricacies of an Automatic Text Summarizer LM Mathews, E Sathiyamoorthy International Journal of Engineering and Technology (IJET) 5 (3), 2013 | 4 | 2013 |
An efficient and light weight secure framework for applications of cloud environment using identity encryption method E Sathiyamoorthy, SS Manivannan International Journal of Engineering and Technology (IJET) 5, 20932100, 2013 | 4 | 2013 |
Early Prediction of Heart Diseases using Naive Bayes Classification Algorithm and Laplace Smoothing Technique. S Narayan, E Sathiyamoorthy Int. J. Grid High Perform. Comput. 14 (1), 1-14, 2022 | 3 | 2022 |