关注
Dr K Sundarakantham
Dr K Sundarakantham
Professor of Computer Science, Thiagaraja Engineering College, India
在 tce.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Machine learning based intrusion detection system
A Halimaa, K Sundarakantham
2019 3rd International conference on trends in electronics and informatics …, 2019
1792019
Design of cognitive fog computing for intrusion detection in Internet of Things
S Prabavathy, K Sundarakantham, SM Shalinie
Journal of Communications and Networks 20 (3), 291-298, 2018
1742018
Detecting DDoS attacks using decision tree algorithm
S Lakshminarasimman, S Ruswin, K Sundarakantham
2017 fourth international conference on signal processing, communication and …, 2017
432017
An automated testing framework for testing android mobile applications in the cloud
CM Prathibhan, A Malini, N Venkatesh, K Sundarakantham
2014 IEEE International Conference on Advanced Communications, Control and …, 2014
322014
DDAM: detecting DDoS attacks using machine learning approach
K Narasimha Mallikarjunan, A Bhuvaneshwaran, K Sundarakantham, ...
Computational Intelligence: Theories, Applications and Future Directions …, 2018
242018
A privacy-preserving framework for endorsement process in hyperledger fabric
J Dharani, K Sundarakantham, K Singh
Computers & Security 116, 102637, 2022
162022
Mobile application testing on smart devices using MTAAS framework in cloud
A Malini, N Venkatesh, K Sundarakantham, S Mercyshalinie
International Conference on Computing and Communication Technologies, 1-5, 2014
162014
Performance evaluation of online mobile application using Test My App
VSS Rajan, A Malini, K Sundarakantham
2014 IEEE International Conference on Advanced Communications, Control and …, 2014
132014
A hybrid deep learning framework for privacy preservation in edge computing
K Sundarakantham, E Sivasankar
Computers & Security 129, 103209, 2023
82023
Evaluation of security metrics for system security analysis
K Narasimha Mallikarjunan, S Mercy Shalinie, K Sundarakantham, ...
Computational Intelligence: Theories, Applications and Future Directions …, 2018
82018
Model for cyber attacker behavioral analysis
KN Mallikarjunan, S Prabavathy, K Sundarakantham, SM Shalinie
2015 IEEE workshop on computational intelligence: theories, applications and …, 2015
82015
Design of cognitive fog computing for autonomic security system in critical infrastructure
S Prabavathy, K Sundarakantham, SM Shalinie
Journal of Universal Computer Science 24 (5), 577-602, 2018
72018
QeCSO: Design of hybrid Cuckoo Search based Query expansion model for efficient information retrieval
JF Lilian, K Sundarakantham, SM Shalinie
Sādhanā 46 (3), 181, 2021
62021
Fog computing-based autonomic security approach to Internet of Things applications
S Prabavathy, K Sundarakantham, SM Shalinie, KN Mallikarjunan
Computational Intelligence: Theories, Applications and Future Directions …, 2018
62018
CoDe—An collaborative detection algorithm for DDoS attacks
SM Shalinie, MPM Kumar, M Karthikeyan, JD Sajani, VA Nachammai, ...
2011 International Conference on Recent Trends in Information Technology …, 2011
52011
SSE: semantic sentence embedding for learning user interactions
JF Lilian, K Sundarakantham, H Rajashree, SM Shalinie
2019 10th International Conference on Computing, Communication and …, 2019
42019
Cosine similarity-based clustering and dynamic reputation trust aware key generation scheme for trusted communication on social networking
M Parvathy, K Sundarakantham, S Mercy Shalinie
Journal of Statistical Computation and Simulation 85 (16), 3247-3258, 2015
42015
Collision Handling in a Data Deduplication System Using Permutation Hashing
J Angelina, J Rubel, K Sundarakantham
32018
Decentralized secure framework for social collaborative internet of things
S Prabavathy, K Sundarakantham, SM Shalinie
2017 Fourth International Conference on Signal Processing, Communication and …, 2017
32017
Anti-negation method for handling negation words in question answering system
JF Lilian, K Sundarakantham, SM Shalinie
The Journal of Supercomputing 77, 4244-4266, 2021
22021
系统目前无法执行此操作,请稍后再试。
文章 1–20