关注
Sundaram Jawahar
Sundaram Jawahar
Christ Academy Institute of Advanced Studies
没有经过验证的电子邮件地址
标题
引用次数
引用次数
年份
Generative AI for pentesting: the good, the bad, the ugly
E Hilario, S Azam, J Sundaram, K Imran Mohammed, B Shanmugam
International Journal of Information Security 23 (3), 2075-2097, 2024
142024
An efficient contiguous pattern mining technique to predict mutations in breast cancer for dna data sequences
S Jawahar, P Sumathi
International Journal of Bioinformatics and Biological Science 6 (1), 35-41, 2018
42018
Self-healing hybrid intrusion detection system: an ensemble machine learning approach
S Kushal, B Shanmugam, J Sundaram, S Thennadil
Discover Artificial Intelligence 4 (1), 28, 2024
12024
An Exploration of Python Libraries in Machine Learning Models for Data Science
J Sundaram, S Jayaprakash, K Gowri, H Anandaram, S Devaraju, ...
12023
Entropy-based feature selection for network intrusion detection systems
S Devaraju, S Ramakrishnan, S Jawahar, D Soni, A Somasundaram
Methods, Implementation, and Application of Cyber Security Intelligence and …, 2022
12022
A COMPUTATIONAL APPROACH TO IDENTIFY THE CO EXPRESSION BASED MICRORNA (MIRNA) REGULATION IN THE DISEASE PATHOLOGY OF PSORIASIS
A Harishchander, S Jawahar, AA Rashmi
International Journal of Life Science and Pharmacology Research, Special …, 2020
12020
Efficiently Mining Closed Sequence Patterns in DNA without Candidate Genertion
S Jawahar, A Harishchander, S Devaraju, S Reshmi, C Manivasagan, ...
SPECIAL ISSUE ON, 14, 2020
12020
Closed Sequential Pattern Mining in Biological Data
S Jawahar, A Harishchander, S Devaraju, SAJ ALI, C MANIVASAGAN, ...
SPECIAL ISSUE ON, 9, 2020
12020
Fast and accurate identification of Short Tandem Repeats (STRs) using hash function in DNA sequences
S Jawahar, DP Sumathi
International journal of Engineering and Technology (UAE) 7 (4S2), 2018
12018
The risk of breast cancer associated with brca1 and brca2 gene genetic mutation: A review
S Jawahar, P Sumathi
International Journal of Management, IT and Engineering 8 (8), 137-147, 2018
12018
A Survey on Sequential Generator Mining Algorithms
S Jawahar, P Sumathi
International Journal of Research in Engineering, IT and Social Sciences 7 …, 2017
12017
Vulnerability Analysis and Exploitation Attacks on Smart Wearable Devices
SA Khan, HR Bajwa, J Sundaram, B Shanmugam
2024 2nd International Conference on Advancement in Computation & Computer …, 2024
2024
Malware Classification using LSTM-CF Framework for Disk Forensic Analysis
CY Thirupathi, J Sundaram, KC Yeo, SA Khan, D Sellappan
2024 IEEE International Conference on Contemporary Computing and …, 2024
2024
DiscoverArtificial Intelligence
S Kushal, B Shanmugam, J Sundaram, S Thennadil
Discover 4, 28, 2024
2024
13 Diabetic Disease Prediction Using
AAA Aayush, J Sundaram, S Devaraju, S Jayaprakash, H Anandaram, ...
Machine Learning and Deep Learning Techniques for Medical Image Recognition, 217, 2023
2023
Diabetic disease prediction using machine learning models and algorithms for early classification and diagnosis assessment
Aayush, J Sundaram, D S, S Jayaprakash, H Anandaram, M C
Machine Learning and Deep Learning Techniques for Medical Image Recognition, 217, 2023
2023
Interference Minimized Delay Reduction Based Routing Protocol (IMDRRP) For Wireless Ad Hoc Networks
M Thenmozhi, S Devaraju, A Somasundaram, S Jawahar
2023
Simulation of IoT-based Smart City of Darwin: Leading Cyber Attacks and Prevention Techniques
SA Khan, J Sundaram, M Palendeng, S Azam, B Shanmugam
2023 14th International Conference on Computing Communication and Networking …, 2023
2023
Reinforcing Research in Higher Education for Quality Enhancement in Industry and Educational Institution
S Devaraju, S Jawahar, A Harishchander
Asian Review of Mechanical Engineering 10 (2), 38-42, 2021
2021
PENETRATION OF TECHNOLOGY TO VIRTUAL REALITY IN ARTIFICIAL INTELLIGENCE AND ITS CHALLENGES
S Reshmi, S Jawahar
2020
系统目前无法执行此操作,请稍后再试。
文章 1–20