A noncooperative game approach for intrusion detection in mobile adhoc networks T Poongothai, K Jayarajan 2008 International Conference on Computing, Communication and Networking, 1-4, 2008 | 35 | 2008 |
Intrusion detection in mobile AdHoc networks using machine learning approach T Poongothai, K Duraiswamy International Conference on Information Communication and Embedded Systems …, 2014 | 26 | 2014 |
Malicious attack alleviation using improved time-based dimensional traffic pattern generation in UWSN T Saravanan, S Saravanakumar, G Rathinam, M Narayanan, ... Journal of Theoretical and Applied Information Technology 100 (3), 682-689, 2022 | 11 | 2022 |
An effective intrusion system for mobile ad hoc networks using rough set theory and support vector machine P Sivaranjanadevi, M Geetanjali, S Balaganesh, T Poongothai IJCA Proceedings on EGovernance and Cloud Computing Services 2, 1-7, 2012 | 9 | 2012 |
Cross layer intrusion detection system of mobile ad hoc networks using feature selection approach T Poongothai, K Duraiswamy WSEAS Transactions on Communications 13, 71-79, 2014 | 7 | 2014 |
Crypto-based secure outbound supply chain authentication for industry 4.0 M Narayanan, T Poongothai, B Saravanan Cyber Security and Operations Management for Industry 4.0, 33-45, 2022 | 3 | 2022 |
Intrusion Detection System for Mobile Ad Hoc Networks using Cross Layer and Machine Learning Approach T Poongothai, K Jayarajan International Journal of Computer Applications 179 (34), 5-13, 2018 | 3 | 2018 |
Home Appliance Based Device Monitoring and Control Inputting Through Capacitive Touch T Poongothai, S Navaneethan, GD Priya, KM Mohan International Journal of Engineering Trends and Applications (IJETA) 2 (2 …, 2015 | 3 | 2015 |
An Effective and Intelligent Intrusion DetectionSystem using Deep Auto-Encoders T Poongothai, K Jayarajan, P Udayakumar International Journal of Advanced Science and Technology 29, 3139-3154, 2020 | 2 | 2020 |
A Recent Survey of Intrusion Detection System in Mobile Ad Hoc Networks KJ Poongodhai, K Duraiswamy International Journal of Communications and Engineering 4 (5), 0 | 2 | |
Enhancing security in mobile ad hoc networks using non cooperative Bayesian game approach T Poongothai, K Jayarajan, P Patra AIP Conference Proceedings 2393 (1), 2022 | 1 | 2022 |
Biometric Security with a Robust Multimodal Features Level Fusion Using Modify Incremental Principal Component Analysis S Saravanankumar, T Saravanan, M Narayanan, T Poongothai, ... Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (10), 2021 | 1 | 2021 |
A power efficient Mac protocol and fault-tolerant event boundary detection in wireless sensor networks KM Mohan, R Sudha, K Shalini, T Poongothai International Journal of Engineering Trends and Applications (IJETA) 2, 2015 | 1 | 2015 |
2 Crypto-Outbound Based Supply Secure M Narayanan, T Poongothai, T Saravanan Cyber Security and Operations Management for Industry 4.0, 33, 2022 | | 2022 |
Multimodality Medical Images for Healthcare Disease Analysis B Rajalingam, R Santhoshkumar, P Santosh Kumar Patra, M Narayanan, ... Medical Imaging and Health Informatics, 209-235, 2022 | | 2022 |
Robust emotion recognition on hand crafted features in static action sequences R Santhoshkumar, B Rajalingam, P Patra, M Narayanan, T Poongothai, ... AIP Conference Proceedings 2393 (1), 2022 | | 2022 |
An Effective Multi-class Object Detection Model for Remotely Sensed Image using Mask R-DCNN. P Deepan, LR Sudha, T Poongothai, R Santhoshkumar Turkish Online Journal of Qualitative Inquiry 12 (9), 2021 | | 2021 |
Building a Novel Intrusion Detection System using Long Short-Term Memory for Detecting Network Attacks. K Jayarajan, T Poongothai, P Patra Turkish Online Journal of Qualitative Inquiry 12 (8), 2021 | | 2021 |
Route Inference Based Sinkhole Attack Detection System for Mobile Ad Hoc Networks KJ T.Poongothai International Journal of Innovative Technology and Exploring Engineering …, 2020 | | 2020 |
Energy Efficient Routing and Fault Node Replacement Algorithm for Wireless Sensor Networks P Sivaranjanadevi, T Poongothai Energy 2 (01), 2013 | | 2013 |