Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment SR D. Prabakaran Computers, Materials & Continua 70 (1), 1781-1798, 2021 | 36 | 2021 |
A review on performance of voice feature extraction techniques D Prabakaran, R Shyamala 2019 3rd International Conference on Computing and Communications …, 2019 | 35 | 2019 |
Impact of Sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks S Ramachandran, V Shanmugan Journal of Computer Science 7 (7), 973, 2011 | 22 | 2011 |
A two way authentication using bilinear mapping function for wireless sensor networks S Ramachandran, V Shanmugam Computers & Electrical Engineering 59, 242-249, 2017 | 16 | 2017 |
A survey on security issues and solutions in virtual private network R Shyamala, D Prabakaran International Journal of Pure and Applied Mathematics 119 (15), 3115-3122, 2018 | 15 | 2018 |
Impact of DoS attack in software defined network for virtual network S Ramachandran, V Shanmugam Wireless Personal Communications 94, 2189-2202, 2017 | 12 | 2017 |
Performance comparison of routing attacks in MANET and WSN S Ramachandran, V Shanmugam International Journal of Ad Hoc, Sensor & Ubiquitous Computing 3 (4), 41, 2012 | 10 | 2012 |
Impact of blackhole and rushing attack on the location-based routing protocol for wireless sensor networks R Shyamala, S Valli Advances in Computing and Information Technology: Proceedings of the Second …, 2012 | 10 | 2012 |
Secure channel for financial transactions in cloud environment using blockchain technology D Prabakaran, S Ramachandran | 5 | 2022 |
An approach to secure leach using tesla based certificate S Ramachandran, V Shanmugam Life Science Journal 10 (2), 1018-1027, 2013 | 5 | 2013 |
Optimization Based Multi-Objective Framework in Mobile Social Networks for Crowd Sensing SR Sasireka, V. Wireless Personal Communication 124, 3055-3076, 2022 | 4 | 2022 |
RANC-CROP recommendation attributed to soil nutrients and stock analysis using machine learning J Daniel, R Shyamala, R Pugalenthi, P Mohan Kumar IETE Journal of Research 69 (11), 8077-8089, 2023 | 3 | 2023 |
Descriptive Study and Analysis of Crowd Sourcing Techniques in Mobile Social Media Networks S Ramachandran, V Sasireka 2019 1st International Conference on Innovations in Information and …, 2019 | 2 | 2019 |
Securing GMR protocol using TESLA based certificate for WSN R Shyamala, S Valli European Journal of Scientific and Research 94 (2), 186-196, 2013 | 2 | 2013 |
Secure Key Generation from Speech signal Using Enhanced MFCC Algorithm S Ramachandran 2021 IEEE International Conference on Mobile Networks and Wireless …, 2021 | 1 | 2021 |
Securing Route Discovery in MAODV for Wireless Sensor Networks R Shyamala, S Valli Ubiquitous Computing and Communication, 2009 | 1 | 2009 |
A Novel Deep Reinforcement Learning (DRL) Method for Detecting Evasion Attack in Iot Environment S Ramachandran, D Prabakaran 2024 International Conference on Integrated Circuits and Communication …, 2024 | | 2024 |
Hybrid optimized task scheduling with multi-objective framework for crowd sensing in mobile social networks S Ramachandran Peer-to-Peer Networking and Applications, 1-17, 2024 | | 2024 |
Secure Channel for Financial Transactions in Cloud Environment Using Blockchain Technology S Ramachandran | | 2022 |
Privacy preserving for Big Data using Blowfish Algorithm in MobileCloud Computing PPBA Dr.Shyamala Ramachandran, P.Vanitha International Conference on Technological Advancement in Computers and …, 2022 | | 2022 |