Implementation of text based cryptosystem using elliptic curve cryptography SMC Vigila, K Muneeswaran 2009 First international conference on advanced computing, 82-85, 2009 | 91 | 2009 |
Intrusion detection system: Classification and techniques SS Soniya, SMC Vigila 2016 International Conference on Circuit, Power and Computing Technologies …, 2016 | 33 | 2016 |
Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications. SMC Vigila, K Muneeswaran Int. J. Netw. Secur. 14 (4), 236-242, 2012 | 25 | 2012 |
Cluster head selection algorithm for MANETs using hybrid particle swarm optimization-genetic algorithm F Hamza, SMC Vigila International Journal of Computer Networks and Applications 8 (2), 119-129, 2021 | 19 | 2021 |
A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network S Soniya. S, MC Vigila. S International Journal of Adaptive Control and Signal Processing 36 (5), 1060 …, 2022 | 18 | 2022 |
Fuzzy based intrusion detection system in MANET CE Singh, SMC Vigila Measurement: Sensors 26, 100578, 2023 | 16 | 2023 |
F-CAPSO: Fuzzy chaos adaptive particle swarm optimization for energy-efficient and secure data transmission in MANET MR Jose, SMC Vigila Expert Systems with Applications 234, 120944, 2023 | 15 | 2023 |
Review of Machine Learning-Based Intrusion Detection Techniques for MANETs F Hamza, S Maria Celestin Vigila Computing and Network Sustainability: Proceedings of IRSCNS 2018, 367-374, 2019 | 13 | 2019 |
Hiding of Confidential Data in Spatial Domain Images using Image Interpolation. SMC Vigila, K Muneeswaran Int. J. Netw. Secur. 17 (6), 722-727, 2015 | 13 | 2015 |
Key generation based on elliptic curve over finite prime field SMC Vigila, K Muneeswaran International Journal of Electronic Security and Digital Forensics 4 (1), 65-81, 2012 | 13 | 2012 |
An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CPABE Using ECC Scheme for Patient Health Record F Sammy, SMC Vigila Security and communication networks 2022 (1), 8685273, 2022 | 12 | 2022 |
A new elliptic curve cryptosystem for securing sensitive data applications SMC Vigila, K Muneeswaran International Journal of Electronic Security and Digital Forensics 5 (1), 11-24, 2013 | 11 | 2013 |
Elliptic curve based key generation for symmetric encryption SMC Vigila, K Muneeswaran 2011 International Conference on Signal Processing, Communication, Computing …, 2011 | 11 | 2011 |
WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services. C Edwin Singh, SM Celestin Vigila Intelligent Automation & Soft Computing 35 (2), 2023 | 9 | 2023 |
A new diffusion and substitution based cryptosystem for securing medical image applications L Mancy, SMC Vigila International Journal of Electronic Security and Digital Forensics, 2018 | 9 | 2018 |
Biometric security system over finite field for mobile applications SAMC Vigila, K Muneeswaran, WTBA Antony IET Information Security 9 (2), 119-126, 2015 | 9 | 2015 |
An investigation of machine learning-based intrusion detection system in mobile ad hoc network CE Singh, SMC Vigila International Journal of Intelligent Engineering Informatics 11 (1), 54-70, 2023 | 8 | 2023 |
A comparative analysis on cloud data security S Varghese, SMC Vigila 2015 Global Conference on Communication Technologies (GCCT), 507-510, 2015 | 8 | 2015 |
A varied approach to attribute based access model for secure storage in cloud S Varghese, SMC Vigila 2017 International Conference on Innovations in Information, Embedded and …, 2017 | 7 | 2017 |
An energy-efficient cluster head selection in MANETs using emperor penguin optimization fuzzy genetic algorithm F Hamza, SMC Vigila Proceedings of International Conference on Recent Trends in Computing: ICRTC …, 2023 | 6 | 2023 |