A hybrid and effective learning approach for click fraud detection GS Thejas, S Dheeshjith, SS Iyengar, NR Sunitha, P Badrinath Machine Learning with Applications 3, 100016, 2021 | 49 | 2021 |
Deep learning-based model to fight against ad click fraud GS Thejas, KG Boroojeni, K Chandna, I Bhatia, SS Iyengar, NR Sunitha Proceedings of the 2019 ACM southeast conference, 176-181, 2019 | 47 | 2019 |
Mini-batch normalized mutual information: A hybrid feature selection method GS Thejas, SR Joshi, SS Iyengar, NR Sunitha, P Badrinath IEEE Access 7, 116875-116885, 2019 | 43 | 2019 |
An extension of Synthetic Minority Oversampling Technique based on Kalman filter for imbalanced datasets GS Thejas, Y Hariprasad, SS Iyengar, NR Sunitha, P Badrinath, ... Machine Learning with Applications 8, 100267, 2022 | 38 | 2022 |
Key pre-distribution scheme with join leave support for SCADA systems TC Pramod, KG Boroojeni, MH Amini, NR Sunitha, SS Iyengar International Journal of Critical Infrastructure Protection 24, 111-125, 2019 | 27 | 2019 |
Metric and accuracy ranked feature inclusion: Hybrids of filter and wrapper feature selection approaches GS Thejas, R Garg, SS Iyengar, NR Sunitha, P Badrinath, S Chennupati IEEE Access 9, 128687-128701, 2021 | 25 | 2021 |
A probabilistic public key encryption switching scheme for secure cloud storage R Bhat, NR Sunitha, SS Iyengar International Journal of Information Technology 15 (2), 675-690, 2023 | 23 | 2023 |
Architecting an integrated framework for utility payment services using automated teller machines S Sridharan, TC Pramod, NR Sunitha 2014 International Conference on Science Engineering and Management Research …, 2014 | 23 | 2014 |
A multi-time-scale time series analysis for click fraud forecasting using binary labeled imbalanced dataset GS Thejas, J Soni, KG Boroojeni, SS Iyengar, K Srivastava, P Badrinath, ... 2019 4th International Conference on Computational Systems and Information …, 2019 | 22 | 2019 |
Learning-based model to fight against fake like clicks on instagram posts GS Thejas, J Soni, K Chandna, SS Iyengar, NR Sunitha, N Prabakar 2019 SoutheastCon, 1-8, 2019 | 20 | 2019 |
CKMI: Comprehensive key management infrastructure design for industrial automation and control systems P TC, T GS, SS Iyengar, NR Sunitha Future Internet 11 (6), 126, 2019 | 17* | 2019 |
A trust model for secure and qos routing in manets SG Shilpa, NR Sunitha, BB Amberker Intl. J. of Innovative Technology and Creative Engineering (IJITCE) 1, 2011 | 15 | 2011 |
Nitrogen economy in fingermillet through conjunctive use of organic manures and bio-fertilizers. N Sunitha, V Ravi, RR Reddappa Reddy | 15 | 2004 |
Intelligent access control: A self-adaptable trust-based access control (SATBAC) framework using game theory strategy GS Thejas, TC Pramod, SS Iyengar, NR Sunitha Proceedings of International Symposium on Sensor Networks, Systems and …, 2018 | 14 | 2018 |
Analysis of the consensus protocols used in blockchain networks–an overview BS Anupama, NR Sunitha 2022 IEEE international conference on data science and information system …, 2022 | 13 | 2022 |
Polynomial based scheme for secure SCADA operations TC Pramod, NR Sunitha Procedia Technology 21, 474-481, 2015 | 12 | 2015 |
An approach to detect malicious activities in SCADA systems TC Pramod, NR Sunitha 2013 fourth international conference on Computing, communications and …, 2013 | 11 | 2013 |
Formal verification of authentication and confidentiality for TACACS+ security protocol using scyther R Pradeep, NR Sunitha, V Ravi, S Verma 2019 10th International Conference on Computing, Communication and …, 2019 | 10 | 2019 |
Proxy signature schemes for controlled delegation NR Sunitha, BB Amberker Journal of Information Assurance and Security 3 (2), 159-174, 2008 | 10 | 2008 |
Preserving Location Data Integrity in Location Based Servers using Blockchain Technology KMM Kumar, NR Sunitha 2017 2nd International Conference On Emerging Computation and Information …, 2017 | 9 | 2017 |