Product recommendation system using support vector machine K Yesodha, R Anitha, T Mala, S Vindhya Advanced Computational and Communication Paradigms: Proceedings of …, 2018 | 4 | 2018 |
Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks K Yesodha, M Krishnamurthy, K Thangaramya, A Kannan The Journal of Supercomputing, 1-34, 2024 | | 2024 |
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks K Yesodha, M Krishnamurthy, M Selvi, A Kannan Peer-to-Peer Networking and Applications, 1-26, 2024 | | 2024 |
Trust Evaluation in Social Network Using Trusted Graph M Jansi, AS Shri Vindhya, T Mala, K Yesodha Ambient Communications and Computer Systems: RACCCS 2017, 183-191, 2018 | | 2018 |
Multi‐lingual encryption technique using Unicode and Riemann zeta function and elliptic curve cryptography for secured routing in wireless sensor networks K Yesodha, S Viswanathan, M Krishnamurthy, A Kannan Concurrency and Computation: Practice and Experience, e8159, 0 | | |