Intrusion Detection System to Detect Sinkhole Attack on RPL Protocol in Internet of Things DLA R. Stephen International Journal of Electrical Electronics & Computer Science …, 2017 | 43 | 2017 |
E2V: Techniques for detecting and mitigating rank inconsistency attack (RInA) in RPL based Internet of Things R Stephen, L Arockiam Journal of Physics: Conference Series 1142 (1), 012009, 2018 | 21 | 2018 |
Deist: Dynamic Detection Of Sinkhole Attack For Internet Of Things DLA R. Stephen, A. Dalvin Vinoth Kumar International Journal Of Engineering And Computer Science 5 (12), 19358-19362, 2016 | 15* | 2016 |
RIAIDRPL: Rank increased attack (RIA) identification algorithm for avoiding loop in the RPL DODAG R Stephen, L Arockiam International Journal of Pure and Applied Mathematics 119 (16), 1203-1210, 2018 | 12 | 2018 |
Priority Intensed Meta Task Scheduling Algorithm for Multi Cloud Environment (PIMTSA) BJH Shanthan, L Arockiam, AC Donald, ADV Kumar, R Stephen Journal of Physics: Conference Series 1427 (1), 012007, 2020 | 5 | 2020 |
An Enhanced Technique to Detect Sinkhole Attack in Internet of Things DLA R. Stephen International Conference on Newer Engineering Concepts And Technology 5 (13 …, 2017 | 4 | 2017 |
A review on privacy control techniques in context-aware web services R Stephen, PJ Charles, SBR Kumar International Journal of Advanced Research in Computer Science & Technology …, 2014 | 4 | 2014 |
TCAMTSA: Time and Cost based Scheduling Algorithm for Multi Cloud Systems BJH Shanthan, AC Donald, ADV Kumar, R Stephen, L Arockiam 2021 7th International Conference on Advanced Computing and Communication …, 2021 | 2 | 2021 |
AROSTEV: A Unified Framework to Enhance Secure Routing in IoT Environment R Stephen, AC Donald, AD Vinoth Kumar, BJH Shanthan, L Arockiam Advances in Computational Intelligence and Communication Technology …, 2022 | 1 | 2022 |
Internet of Things (IoT): The Standard Protocol Suite for Communication Networks R Stephen, B Ayshwarya, RSM Joshitta, HBJ Shanthan Cases on Edge Computing and Analytics, 55-72, 2021 | 1 | 2021 |
An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment DLA R. Stephen International Journal of Computer Science 5 (1), 1439-1444, 2017 | | 2017 |
Heat Reducing Using Peltier Effect on Smart Phones MVK Jeyavarthni. M, Dr. D. Ravindran, R. Stephan International Journal of Scientific Research in Computer Science …, 2017 | | 2017 |
Internet of Things : A Survey RS Jeyavarthni. M, Dr. D. Ravindran International Journal of Scientific Research in Computer Science …, 2017 | | 2017 |
A Framework for Privacy Handler Mechanism in Context-aware Web Services DSBRK R. Stephen, P. Joseph Charles International Journal of Advanced Research in Computer Science & Technology …, 2014 | | 2014 |
A Review on Privacy Control Techniques in Context-aware Web Services DSBRK R. Stephen, P. Joseph Charles International Journal of Advanced Research in Computer Science & Technology …, 2014 | | 2014 |