Generative AI for pentesting: the good, the bad, the ugly E Hilario, S Azam, J Sundaram, K Imran Mohammed, B Shanmugam International Journal of Information Security 23 (3), 2075-2097, 2024 | 14 | 2024 |
An efficient contiguous pattern mining technique to predict mutations in breast cancer for dna data sequences S Jawahar, P Sumathi International Journal of Bioinformatics and Biological Science 6 (1), 35-41, 2018 | 4 | 2018 |
Self-healing hybrid intrusion detection system: an ensemble machine learning approach S Kushal, B Shanmugam, J Sundaram, S Thennadil Discover Artificial Intelligence 4 (1), 28, 2024 | 1 | 2024 |
An Exploration of Python Libraries in Machine Learning Models for Data Science J Sundaram, S Jayaprakash, K Gowri, H Anandaram, S Devaraju, ... | 1 | 2023 |
Entropy-based feature selection for network intrusion detection systems S Devaraju, S Ramakrishnan, S Jawahar, D Soni, A Somasundaram Methods, Implementation, and Application of Cyber Security Intelligence and …, 2022 | 1 | 2022 |
A COMPUTATIONAL APPROACH TO IDENTIFY THE CO EXPRESSION BASED MICRORNA (MIRNA) REGULATION IN THE DISEASE PATHOLOGY OF PSORIASIS A Harishchander, S Jawahar, AA Rashmi International Journal of Life Science and Pharmacology Research, Special …, 2020 | 1 | 2020 |
Efficiently Mining Closed Sequence Patterns in DNA without Candidate Genertion S Jawahar, A Harishchander, S Devaraju, S Reshmi, C Manivasagan, ... SPECIAL ISSUE ON, 14, 2020 | 1 | 2020 |
Closed Sequential Pattern Mining in Biological Data S Jawahar, A Harishchander, S Devaraju, SAJ ALI, C MANIVASAGAN, ... SPECIAL ISSUE ON, 9, 2020 | 1 | 2020 |
Fast and accurate identification of Short Tandem Repeats (STRs) using hash function in DNA sequences S Jawahar, DP Sumathi International journal of Engineering and Technology (UAE) 7 (4S2), 2018 | 1 | 2018 |
The risk of breast cancer associated with brca1 and brca2 gene genetic mutation: A review S Jawahar, P Sumathi International Journal of Management, IT and Engineering 8 (8), 137-147, 2018 | 1 | 2018 |
A Survey on Sequential Generator Mining Algorithms S Jawahar, P Sumathi International Journal of Research in Engineering, IT and Social Sciences 7 …, 2017 | 1 | 2017 |
Vulnerability Analysis and Exploitation Attacks on Smart Wearable Devices SA Khan, HR Bajwa, J Sundaram, B Shanmugam 2024 2nd International Conference on Advancement in Computation & Computer …, 2024 | | 2024 |
Malware Classification using LSTM-CF Framework for Disk Forensic Analysis CY Thirupathi, J Sundaram, KC Yeo, SA Khan, D Sellappan 2024 IEEE International Conference on Contemporary Computing and …, 2024 | | 2024 |
DiscoverArtificial Intelligence S Kushal, B Shanmugam, J Sundaram, S Thennadil Discover 4, 28, 2024 | | 2024 |
13 Diabetic Disease Prediction Using AAA Aayush, J Sundaram, S Devaraju, S Jayaprakash, H Anandaram, ... Machine Learning and Deep Learning Techniques for Medical Image Recognition, 217, 2023 | | 2023 |
Diabetic disease prediction using machine learning models and algorithms for early classification and diagnosis assessment Aayush, J Sundaram, D S, S Jayaprakash, H Anandaram, M C Machine Learning and Deep Learning Techniques for Medical Image Recognition, 217, 2023 | | 2023 |
Interference Minimized Delay Reduction Based Routing Protocol (IMDRRP) For Wireless Ad Hoc Networks M Thenmozhi, S Devaraju, A Somasundaram, S Jawahar | | 2023 |
Simulation of IoT-based Smart City of Darwin: Leading Cyber Attacks and Prevention Techniques SA Khan, J Sundaram, M Palendeng, S Azam, B Shanmugam 2023 14th International Conference on Computing Communication and Networking …, 2023 | | 2023 |
Reinforcing Research in Higher Education for Quality Enhancement in Industry and Educational Institution S Devaraju, S Jawahar, A Harishchander Asian Review of Mechanical Engineering 10 (2), 38-42, 2021 | | 2021 |
PENETRATION OF TECHNOLOGY TO VIRTUAL REALITY IN ARTIFICIAL INTELLIGENCE AND ITS CHALLENGES S Reshmi, S Jawahar | | 2020 |