Machine learning based intrusion detection system A Halimaa, K Sundarakantham 2019 3rd International conference on trends in electronics and informatics …, 2019 | 179 | 2019 |
Design of cognitive fog computing for intrusion detection in Internet of Things S Prabavathy, K Sundarakantham, SM Shalinie Journal of Communications and Networks 20 (3), 291-298, 2018 | 174 | 2018 |
Detecting DDoS attacks using decision tree algorithm S Lakshminarasimman, S Ruswin, K Sundarakantham 2017 fourth international conference on signal processing, communication and …, 2017 | 43 | 2017 |
An automated testing framework for testing android mobile applications in the cloud CM Prathibhan, A Malini, N Venkatesh, K Sundarakantham 2014 IEEE International Conference on Advanced Communications, Control and …, 2014 | 32 | 2014 |
DDAM: detecting DDoS attacks using machine learning approach K Narasimha Mallikarjunan, A Bhuvaneshwaran, K Sundarakantham, ... Computational Intelligence: Theories, Applications and Future Directions …, 2018 | 24 | 2018 |
A privacy-preserving framework for endorsement process in hyperledger fabric J Dharani, K Sundarakantham, K Singh Computers & Security 116, 102637, 2022 | 16 | 2022 |
Mobile application testing on smart devices using MTAAS framework in cloud A Malini, N Venkatesh, K Sundarakantham, S Mercyshalinie International Conference on Computing and Communication Technologies, 1-5, 2014 | 16 | 2014 |
Performance evaluation of online mobile application using Test My App VSS Rajan, A Malini, K Sundarakantham 2014 IEEE International Conference on Advanced Communications, Control and …, 2014 | 13 | 2014 |
A hybrid deep learning framework for privacy preservation in edge computing K Sundarakantham, E Sivasankar Computers & Security 129, 103209, 2023 | 8 | 2023 |
Evaluation of security metrics for system security analysis K Narasimha Mallikarjunan, S Mercy Shalinie, K Sundarakantham, ... Computational Intelligence: Theories, Applications and Future Directions …, 2018 | 8 | 2018 |
Model for cyber attacker behavioral analysis KN Mallikarjunan, S Prabavathy, K Sundarakantham, SM Shalinie 2015 IEEE workshop on computational intelligence: theories, applications and …, 2015 | 8 | 2015 |
Design of cognitive fog computing for autonomic security system in critical infrastructure S Prabavathy, K Sundarakantham, SM Shalinie Journal of Universal Computer Science 24 (5), 577-602, 2018 | 7 | 2018 |
QeCSO: Design of hybrid Cuckoo Search based Query expansion model for efficient information retrieval JF Lilian, K Sundarakantham, SM Shalinie Sādhanā 46 (3), 181, 2021 | 6 | 2021 |
Fog computing-based autonomic security approach to Internet of Things applications S Prabavathy, K Sundarakantham, SM Shalinie, KN Mallikarjunan Computational Intelligence: Theories, Applications and Future Directions …, 2018 | 6 | 2018 |
CoDe—An collaborative detection algorithm for DDoS attacks SM Shalinie, MPM Kumar, M Karthikeyan, JD Sajani, VA Nachammai, ... 2011 International Conference on Recent Trends in Information Technology …, 2011 | 5 | 2011 |
SSE: semantic sentence embedding for learning user interactions JF Lilian, K Sundarakantham, H Rajashree, SM Shalinie 2019 10th International Conference on Computing, Communication and …, 2019 | 4 | 2019 |
Cosine similarity-based clustering and dynamic reputation trust aware key generation scheme for trusted communication on social networking M Parvathy, K Sundarakantham, S Mercy Shalinie Journal of Statistical Computation and Simulation 85 (16), 3247-3258, 2015 | 4 | 2015 |
Collision Handling in a Data Deduplication System Using Permutation Hashing J Angelina, J Rubel, K Sundarakantham | 3 | 2018 |
Decentralized secure framework for social collaborative internet of things S Prabavathy, K Sundarakantham, SM Shalinie 2017 Fourth International Conference on Signal Processing, Communication and …, 2017 | 3 | 2017 |
Anti-negation method for handling negation words in question answering system JF Lilian, K Sundarakantham, SM Shalinie The Journal of Supercomputing 77, 4244-4266, 2021 | 2 | 2021 |