Color image steganography based on pixel value modification method using modulus function V Nagaraj, V Vijayalakshmi, G Zayaraz IERI Procedia 4, 17-24, 2013 | 52 | 2013 |
Concept relation extraction using Naïve Bayes classifier for ontology-based question answering systems G Zayaraz Journal of King Saud University-Computer and Information Sciences 27 (1), 13-24, 2015 | 46 | 2015 |
Software quality assurance through COSMIC FFP G Zayaraz, DP Thambidurai, M Srinivasan, DP Rodrigues ACM SIGSOFT Software Engineering Notes 30 (5), 1-5, 2005 | 31 | 2005 |
A modulo based LSB steganography method V Vijayalakshmi, G Zayaraz, V Nagaraj 2009 International Conference on Control, Automation, Communication and …, 2009 | 29 | 2009 |
An improved level of security for dna steganography using hyperelliptic curve cryptography P Vijayakumar, V Vijayalakshmi, G Zayaraz Wireless Personal Communications 89, 1221-1242, 2016 | 26 | 2016 |
Lightweight cryptography algorithms for internet of things enabled networks: An overview LM Shamala, G Zayaraz, K Vivekanandan, V Vijayalakshmi Journal of Physics: Conference Series 1717 (1), 012072, 2021 | 24 | 2021 |
A survey on testing soa built using web services P Kalamegam, Z Godandapani International Journal of Software Engineering and Its Applications 6 (4), 91-104, 2012 | 24 | 2012 |
Modulo based image steganography technique against statistical and histogram analysis V Nagaraj, V Vijayalakshmi, G Zayaraz IJCA Special Issue on “Network Security and Cryptography” NSC 4, 34-39, 2011 | 23 | 2011 |
Multicriteria decision analysis method for evaluation of software architectures S Vijayalakshmi, G Zayaraz, V Vijayalakshmi International Journal of Computer Applications 1 (25), 22-27, 2010 | 22 | 2010 |
A qos aware quantitative web service selection model RD Kumar, G Zayaraz International Journal on Computer Science and Engineering 3 (4), 1534-1538, 2011 | 21 | 2011 |
DNA computing based elliptic curve cryptography P Vijayakumar, V Vijayalakshmi, G Zayaraz International Journal of Computer Applications 36 (4), 18-21, 2011 | 19 | 2011 |
Comparative study of hyperelliptic curve cryptosystem over prime field and its survey P Vijayakumar, V Vijayalakshmi, G Zayaraz International Journal of Hybrid Information Technology 7 (1), 137-146, 2014 | 18 | 2014 |
Optimal selection of security countermeasures for effective information security R Sarala, G Zayaraz, V Vijayalakshmi Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016 | 16 | 2016 |
Effective bug triage–a framework V Akila, G Zayaraz, V Govindasamy Procedia Computer Science 48, 114-120, 2015 | 15 | 2015 |
Software architecture selection framework based on quality attributes G Zayaraz, P Thambidurai 2005 Annual IEEE India Conference-Indicon, 167-170, 2005 | 15 | 2005 |
Fuzzy cognitive map-based reasoning for prediction of multi-stage attacks in risk assessment R Sarala, G Zayaraz, V Vijayalakshmi International Journal of Intelligent Engineering Informatics 4 (2), 151-167, 2016 | 13 | 2016 |
Bug triage in open source systems: a review V Akila, G Zayaraz, V Govindasamy International Journal of Collaborative Enterprise 4 (4), 299-319, 2014 | 13 | 2014 |
Quantitative measurement of software architectural qualities through cosmic ffp G Zayaraz, P Thambidurai 2006 Annual IEEE India Conference, 1-4, 2006 | 11 | 2006 |
Fuzzy based quantitative evaluation of architectures using architectural knowledge C Dhaya, G Zayaraz International Journal of Advanced Science and Technology 49, 2012 | 10 | 2012 |
Securing biometric authentication using DNA sequence and Naccache Stern Knapsack cryptosystem G Zayaraz, V Vijayalakshmi, D Jagadiswary 2009 International Conference on Control, Automation, Communication and …, 2009 | 10 | 2009 |