A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET MR Babu, G Usha Wireless Personal Communications 87 (2), 1-15, 2016 | 44* | 2016 |
Dynamic anomaly detection using cross layer security in MANET Dr.G.Usha,Rajeshbabu, Saravana Kumar Computer and Electrical Engineering, 2016 | 36* | 2016 |
Impact of gray hole attack on adhoc networks G Usha, S Bose 2013 International Conference on Information Communication and Embedded …, 2013 | 28 | 2013 |
Detection and classification of distributed DoS attacks using machine learning G Usha, M Narang, A Kumar Computer Networks and Inventive Communication Technologies: Proceedings of …, 2021 | 17 | 2021 |
Understanding Black Hole Attack in MANET DUGDS Bose Euro Journals Publishing 83 (3), 383-396, 2012 | 16* | 2012 |
A Machine Learning-Based Technique with IntelligentWordNet Lemmatize for Twitter Sentiment Analysis. S Saranya, G Usha Intelligent Automation & Soft Computing 36 (1), 2023 | 15 | 2023 |
Real-time DDoS flooding attack detection in intelligent transportation systems H Karthikeyan, G Usha Computers and Electrical Engineering 101, 107995, 2022 | 14 | 2022 |
Static analysis method for detecting cross site scripting vulnerabilities G Usha, S Kannimuthu, PD Mahendiran, AK Shanker, D Venugopal International Journal of Information and Computer Security 13 (1), 32-47, 2020 | 14 | 2020 |
A framework of cross layer based anomaly intrusion detection and self healing model for manet K Jothilakshmi, G Usha, S Bose 2013 International Conference on Recent Trends in Information Technology …, 2013 | 13 | 2013 |
cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET KS Usha GOPAL Turkish Journal of Electrical Engineering & Computer Sciences 25, 2761 - 2769, 2017 | 10 | 2017 |
An Intelligent Centrality Measures for Influential Node Detection in Covid-19 Environment J Dr.G.Usha Springer-Wireless Personal Communications, 2021 | 8* | 2021 |
Lightweight cryptography algorithms for IoT resource‐starving devices S Aruna, G Usha, P Madhavan, MVR Kumar Role of Edge Analytics in Sustainable Smart City Development: Challenges and …, 2020 | 7 | 2020 |
A deep neural network strategy to distinguish and avoid cyber-attacks S Agarwal, A Tyagi, G Usha Artificial Intelligence and Evolutionary Computations in Engineering Systems …, 2020 | 7 | 2020 |
Efficient malicious detection for AODV in mobile ad-hoc network M Amaresh, G Usha 2013 International Conference on Recent Trends in Information Technology …, 2013 | 7 | 2013 |
Fake information analysis and detection on pandemic in twitter J Jeyasudha, P Seth, G Usha, P Tanna SN Computer Science 3 (6), 456, 2022 | 6 | 2022 |
Forensic analysis of online social network data in crime scene investigation S Saranya, G Usha Artificial Intelligence and Blockchain in Digital Forensics, 183-209, 2023 | 5 | 2023 |
Enhanced Ransomware Detection Techniques using Machine Learning Algorithms G Usha, P Madhavan, MV Cruz, NAS Vinoth, M Nancy 2021 4th International Conference on Computing and Communications …, 2021 | 5 | 2021 |
Cyber threat Landscape in Cyberspace AKS Dr.G.Usha IEEE International Conference on Electronics, Communication and Aerospace …, 2017 | 5* | 2017 |
Cyber Threat Landscape in Cyber Space AKS Dr.G.Usha IEEE International Conference on Electronics, Communication and Aerospace …, 0 | 5* | |
Dr. Bose S,“Impact of Sinking behaviour in Mobile adhoc network” G Usha International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol …, 0 | 5 | |