Yogesh Palanichamy
Yogesh Palanichamy
Associate Professor of Information Science and Technology Anna University
No verified email
Cited by
Cited by
Intelligent feature selection and classification techniques for intrusion detection in networks: a survey
S Ganapathy, K Kulothungan, S Muthurajkumar, M Vijayalakshmi, ...
EURASIP Journal on Wireless Communications and Networking 2013 (1), 1-16, 2013
Intelligent agent-based intrusion detection system using enhanced multiclass SVM
S Ganapathy, P Yogesh, A Kannan
Computational intelligence and neuroscience 2012, 2012
An intelligent temporal pattern classification system using fuzzy temporal rules and particle swarm optimization
S Ganapathy, R Sethukkarasi, P Yogesh, P Vijayakumar, A Kannan
Sadhana 39 (2), 283-302, 2014
Does the soft aspects of TQM influence job satisfaction and commitment? An empirical analysis
T Arunachalam, Y Palanichamy
The TQM Journal, 2017
Behavior-based detection of application layer distributed denial of service attacks during flash events
R Saravanan, S Shanmuganathan, Y Palanichamy
Turkish Journal of Electrical Engineering & Computer Sciences 24 (2), 510-523, 2016
An Intelligent CRF Based Feature Selection for Effective Intrusion Detection.
S Ganapathy, P Vijayakumar, P Yogesh, A Kannan
International Arab Journal of Information Technology (IAJIT) 13 (1), 2016
An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns
R Sethukkarasi, S Ganapathy, P Yogesh, A Kannan
Journal of Intelligent & Fuzzy Systems 26 (3), 1167-1178, 2014
Secure and efficient smart-card-based remote user authentication scheme for multiserver environment
S Shunmuganathan, RD Saravanan, Y Palanichamy
Canadian Journal of Electrical and Computer Engineering 38 (1), 20-30, 2015
A novel weighted fuzzy C–means clustering based on immune genetic algorithm for intrusion detection
S Ganapathy, K Kulothungan, P Yogesh, A Kannan
Procedia Engineering 38, 1750-1757, 2012
Detection of application layer DDoS attacks using information theory based metrics
SR Devi, P Yogesh
CS & IT-CSCP 10, 213-223, 2012
An intelligent intrusion detection system for mobile ad-hoc networks using classification techniques
S Ganapathy, P Yogesh, A Kannan
International Conference on Power Electronics and Instrumentation …, 2011
A rule based approach for attribute selection and intrusion detection in wireless sensor networks
K Anand, S Ganapathy, K Kulothungan, P Yogesh, A Kannan
Procedia engineering 38, 1658-1664, 2012
An intelligent agent based intrusion detection system using fuzzy rough set based outlier detection
N Jaisankar, S Ganapathy, P Yogesh, A Kannan, K Anand
Soft computing techniques in vision science, 147-153, 2012
Proactive failure recovery in OpenFlow based software defined networks
V Padma, P Yogesh
2015 3rd International Conference on Signal Processing, Communication and …, 2015
An intelligent system for intrusion detection using outlier detection
S Ganapathy, N Jaisankar, P Yogesh, A Kannan
2011 International Conference on Recent Trends in Information Technology …, 2011
TRUNCMAN: Trust based routing mechanism using non-cooperative movement in mobile ad-hoc network
G Thanigaivel, NA Kumar, P Yogesh
2012 Second International Conference on Digital Information and …, 2012
Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach
K Kulothungan, S Ganapathy, SI Gandhi, P Yogesh, A Kannan
International Journal of Soft Computing 6 (5), 210-215, 2011
Detection of DoS attacks in cloud networks using intelligent rule based classification system
R Rajendran, SVNS Kumar, Y Palanichamy, K Arputharaj
Cluster Computing 22 (1), 423-434, 2019
A hybrid approach to counter application layer DDoS attacks
SR Devi, P Yogesh
International Journal on Cryptography and Information Security (IJCIS) 2 (2 …, 2012
Students’ utilization of academic libraries in Nigeria; a case of Federal University of Technology, Akure between Year 2001-2005
AO Akin, PO Ajayi
Asian Jnl. of Infor. Tech 7 (5), 172-174, 2008
The system can't perform the operation now. Try again later.
Articles 1–20