A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases S Narayan, E Sathiyamoorthy Neural Computing and Applications 31, 93-102, 2019 | 47 | 2019 |
Comparative study for feature selection algorithms in intrusion detection system K Anusha, E Sathiyamoorthy Automatic Control and Computer Sciences 50, 1-9, 2016 | 21 | 2016 |
Agent based security for cloud computing using obfuscation K Govinda, E Sathiyamoorthy Procedia Engineering 38, 125-129, 2012 | 18 | 2012 |
A new trust-based mechanism for detecting intrusions in MANET. K Anusha, E Sathiyamoorthy Inf. Secur. J. A Glob. Perspect. 26 (4), 153-165, 2017 | 13 | 2017 |
A prevention model for session hijack attacks in wireless networks using strong and encrypted session ID SS Manivannan, E Sathiyamoorthy cybernetics and information technologies 14 (3), 46-60, 2014 | 13 | 2014 |
Omamids: ontology based multi-agent model intrusion detection system for detecting web service attacks K Anusha, E Sathiyamoorthy Journal of Applied Security Research 11 (4), 489-508, 2016 | 12 | 2016 |
A Novel and efficient public key encryption algorithm PMDR Vincent, E Sathiyamoorthy International Journal of Information and communication technology 9 (2), 199-211, 2016 | 11 | 2016 |
Agent based trust management model based on weight value model for online auctions E Sathiyamoorthy, N Iyenger, V Ramachandran arXiv preprint arXiv:1004.0765, 2010 | 10 | 2010 |
Mobile agent based trust management framework using fuzzy logic in B2C e-business environment E Sathiyamoorthy, N Iyengar, V Ramachandran International Journal of Computer Theory and Engineering 2 (2), 308-312, 2010 | 10 | 2010 |
Agent based trust management framework in distributed e-business environment E Sathiyamoorthy, NCSN Iyenger AIRCC's International Journal of Computer Science and Information Technology …, 2010 | 10 | 2010 |
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system K Anusha, E Sathiyamoorthy International Journal of Internet Technology and Secured Transactions 6 (3 …, 2016 | 8 | 2016 |
A secured and time efficient electronic business framework based on public key cryptography P Vincent, E Sathiyamoorthy International Review on Computers and Software 9 (10), 1791-1798, 2014 | 6 | 2014 |
A novel and efficient key sharing technique for web applications PMDR Vincent, E Sathiyamoorthy 2013 Fourth International Conference on Computing, Communications and …, 2013 | 6 | 2013 |
A narrative review of medical image processing by deep learning models: origin to COVID-19 V Mareeswari, R Vijayan, E Sathiyamoorthy, EP Ephzibah International Journal of Advanced Technology and Engineering Exploration 9 …, 2022 | 5 | 2022 |
Privacy Preservation of a Group and Secure Data Storage in Cloud Environment K Govinda, E Sathiyamoorthy Cybernetics and Information Technologies 15 (1), 46-54, 2015 | 5 | 2015 |
Data Auditing in Cloud Environment using Message Authentication Code‖ K Govinda, E Sathiyamoorthy International Conference on Emerging Trends on Advanced Engineering Research …, 2012 | 5 | 2012 |
Secure traffic management in cluster environment to handle ddos attack K Govinda, E Sathiyamoorthy World Applied Sciences Journal 32 (9), 1828-1834, 2014 | 4 | 2014 |
Intricacies of an Automatic Text Summarizer LM Mathews, E Sathiyamoorthy International Journal of Engineering and Technology (IJET) 5 (3), 2013 | 4 | 2013 |
An efficient and light weight secure framework for applications of cloud environment using identity encryption method E Sathiyamoorthy, SS Manivannan International Journal of Engineering and Technology (IJET) 5, 20932100, 2013 | 4 | 2013 |
LocPSORank-Prediction of Ranking of Web Services Using Location-Based Clustering and PSO Algorithm V Mareeswari, E Sathiyamoorthy International Journal of Web Services Research (IJWSR) 15 (3), 38-60, 2018 | 3 | 2018 |