Distributed location and trust based replica detection in wireless sensor networks G Amudha, P Narayanasamy Wireless Personal Communications 102, 3303-3321, 2018 | 88 | 2018 |
Attention-based C-BiLSTM for fake news detection TE Trueman, A Kumar, P Narayanasamy, J Vidya Applied Soft Computing 110, 107600, 2021 | 56 | 2021 |
Trust-based evolutionary game model assisting AODV routing against selfishness K Komathy, P Narayanasamy Journal of Network and Computer Applications 31 (4), 446-471, 2008 | 56 | 2008 |
Multipath power sensitive routing protocol for mobile ad hoc networks AP Subramanian, AJ Anto, J Vasudevan, P Narayanasamy IFIP Working Conference on Wireless On-Demand Network Systems, 171-183, 2004 | 52 | 2004 |
Multiple molecular sequence alignment by island parallel genetic algorithm LA Anbarasu, P Narayanasamy, V Sundararajan Current Science, 858-863, 2000 | 50 | 2000 |
Analyzing the network performance of various replica detection algorithms in wireless sensor network A Gunasekaran, P Narayanasamy Journal of Computational and Theoretical Nanoscience 15 (3), 989-994, 2018 | 36 | 2018 |
Multiple sequence alignment using parallel genetic algorithms LA Anbarasu, P Narayanasamy, V Sundararajan Asia-Pacific Conference on Simulated Evolution and Learning, 130-137, 1998 | 32 | 1998 |
Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network K Komathy, P Narayanasamy Computer Communications 30 (18), 3721-3735, 2007 | 29 | 2007 |
Study of co-operation among selfish neighbors in manet under evolutionary game theoretic model K Komathy, P Narayanasamy 2007 International Conference on Signal Processing, Communications and …, 2007 | 23 | 2007 |
SMIRT with Call Admission Control (CAC) based vertical handover decision for seamless mobility in multi-access 4G heterogeneous wireless overlay networks P Vetrivelan, P Narayanasamy IMECS, Hong Kong, 2012 | 18 | 2012 |
The Model—Dynamic and flexible intrusion detection protocol for high error rate wireless sensor networks based on data flow S Janakiraman, S Rajasoundaran, P Narayanasamy 2012 International Conference on Computing, Communication and Applications, 1-6, 2012 | 18 | 2012 |
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS G Kousalya, P Narayanasamy, JH Park, T Kim Computer Communications 31 (12), 2781-2789, 2008 | 17 | 2008 |
A probabilistic behavioral model for selfish neighbors in a wireless ad hoc network K Komathy, P Narayanasamy IJCSNS 7 (7), 77, 2007 | 17 | 2007 |
Cooperative and feedback based authentic routing protocol for energy efficient IoT systems A Gayathri, AV Prabu, S Rajasoundaran, S Routray, P Narayanasamy, ... Concurrency and Computation: Practice and Experience 34 (11), e6886, 2022 | 15 | 2022 |
Mobile sink based reliable and energy efficient data gathering technique for WSN P Madhumathy, D Sivakumar, NKS PUTRI, A HUDIARTO, ... Journal of theoretical and applied information technology 61 (1), 1-9, 2014 | 14 | 2014 |
Secure data forwarding against denial of service attack using trust based evolutionary game K Komathy, P Narayanasamy VTC Spring 2008-IEEE Vehicular Technology Conference, 31-35, 2008 | 14 | 2008 |
Exchange rate and market microstructure in brazil O De Medeiros, V Mariappan, P Narayanasamy Academic Open Internet Journal 14, 2005 | 11 | 2005 |
Ensuring privacy and data freshness for public auditing of shared data in cloud TE Trueman, P Narayanasamy 2015 IEEE International Conference on Cloud Computing in Emerging Markets …, 2015 | 9 | 2015 |
Test suite reduction using HGS based heuristic approach A Gladston, HK Nehemiah, P Narayanasamy, A Kannan Computing and Informatics 34 (5), 1113-1132, 2015 | 9 | 2015 |
A graph-based method for ranking of cloud service providers TE Trueman, P Narayanasamy, J Ashok Kumar The Journal of Supercomputing 78 (5), 7260-7277, 2022 | 8 | 2022 |