关注
Dr. S Maria Celestin  Vigila
Dr. S Maria Celestin Vigila
Noorul Islam Center for Higher Education
在 niuniv.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Implementation of text based cryptosystem using elliptic curve cryptography
SMC Vigila, K Muneeswaran
2009 First international conference on advanced computing, 82-85, 2009
912009
Intrusion detection system: Classification and techniques
SS Soniya, SMC Vigila
2016 International Conference on Circuit, Power and Computing Technologies …, 2016
332016
Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications.
SMC Vigila, K Muneeswaran
Int. J. Netw. Secur. 14 (4), 236-242, 2012
252012
Cluster head selection algorithm for MANETs using hybrid particle swarm optimization-genetic algorithm
F Hamza, SMC Vigila
International Journal of Computer Networks and Applications 8 (2), 119-129, 2021
192021
A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network
S Soniya. S, MC Vigila. S
International Journal of Adaptive Control and Signal Processing 36 (5), 1060 …, 2022
182022
Fuzzy based intrusion detection system in MANET
CE Singh, SMC Vigila
Measurement: Sensors 26, 100578, 2023
162023
F-CAPSO: Fuzzy chaos adaptive particle swarm optimization for energy-efficient and secure data transmission in MANET
MR Jose, SMC Vigila
Expert Systems with Applications 234, 120944, 2023
152023
Review of Machine Learning-Based Intrusion Detection Techniques for MANETs
F Hamza, S Maria Celestin Vigila
Computing and Network Sustainability: Proceedings of IRSCNS 2018, 367-374, 2019
132019
Hiding of Confidential Data in Spatial Domain Images using Image Interpolation.
SMC Vigila, K Muneeswaran
Int. J. Netw. Secur. 17 (6), 722-727, 2015
132015
Key generation based on elliptic curve over finite prime field
SMC Vigila, K Muneeswaran
International Journal of Electronic Security and Digital Forensics 4 (1), 65-81, 2012
132012
An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CPABE Using ECC Scheme for Patient Health Record
F Sammy, SMC Vigila
Security and communication networks 2022 (1), 8685273, 2022
122022
A new elliptic curve cryptosystem for securing sensitive data applications
SMC Vigila, K Muneeswaran
International Journal of Electronic Security and Digital Forensics 5 (1), 11-24, 2013
112013
Elliptic curve based key generation for symmetric encryption
SMC Vigila, K Muneeswaran
2011 International Conference on Signal Processing, Communication, Computing …, 2011
112011
WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services.
C Edwin Singh, SM Celestin Vigila
Intelligent Automation & Soft Computing 35 (2), 2023
92023
A new diffusion and substitution based cryptosystem for securing medical image applications
L Mancy, SMC Vigila
International Journal of Electronic Security and Digital Forensics, 2018
92018
Biometric security system over finite field for mobile applications
SAMC Vigila, K Muneeswaran, WTBA Antony
IET Information Security 9 (2), 119-126, 2015
92015
An investigation of machine learning-based intrusion detection system in mobile ad hoc network
CE Singh, SMC Vigila
International Journal of Intelligent Engineering Informatics 11 (1), 54-70, 2023
82023
A comparative analysis on cloud data security
S Varghese, SMC Vigila
2015 Global Conference on Communication Technologies (GCCT), 507-510, 2015
82015
A varied approach to attribute based access model for secure storage in cloud
S Varghese, SMC Vigila
2017 International Conference on Innovations in Information, Embedded and …, 2017
72017
An energy-efficient cluster head selection in MANETs using emperor penguin optimization fuzzy genetic algorithm
F Hamza, SMC Vigila
Proceedings of International Conference on Recent Trends in Computing: ICRTC …, 2023
62023
系统目前无法执行此操作,请稍后再试。
文章 1–20