A survey of green base stations in cellular networks CR Murthy, C Kavitha International Journal of Computer Networks and Wireless Communications …, 2012 | 48 | 2012 |
A survey on secured routing protocols for wireless sensor network C Kavitha 2012 Third International Conference on Computing, Communication and …, 2012 | 14 | 2012 |
An energy efficient fault tolerant multipath (EEFTM) routing protocol for wireless sensor networks C Kavitha, KV Viswanatha 2009 IEEE International Advance Computing Conference, 746-751, 2009 | 13 | 2009 |
A hybrid reliable routing technique (HRR) for wireless sensor network C Kavitha, K Viswanatha International Journal of Computer Science and Network Security 9 (3), 35-39, 2009 | 13 | 2009 |
Secured data integrity routing for Wireless Sensor Networks R Shashikala, C Kavitha International Conference on Advances in Electronics Computers and …, 2014 | 12 | 2014 |
Sentiment analysis for text extracted from Twitter G Jalaja, C Kavitha Integrated Intelligent Computing, Communication and Security, 693-700, 2019 | 7 | 2019 |
Secure cluster-based data integrity routing for wireless sensor networks Shashikala, C Kavitha Sensors and Image Processing: Proceedings of CSI 2015, 157-167, 2018 | 6 | 2018 |
SECURED DATA DELETION IN CLOUD BASED MULTI-TENANT DATABASE ARCHITECTURE V Muthusamy, C Kavitha International Journal on information Sciences and Computing 6 (2), 2012 | 4 | 2012 |
Reinforcement learning-based approach for establishing energy-efficient routes in underwater sensor networks KR Shruthi, C Kavitha 2022 IEEE International Conference on Electronics, Computing and …, 2022 | 3 | 2022 |
A pull based energy efficient data aggregation scheme for wireless sensor networks C Kavitha, KV Viswanatha International Journal of Computer Applications 1 (28), 57-64, 2010 | 3 | 2010 |
Network intrusion detection using fusion features and convolutional bidirectional recurrent neural network H Jagruthi, C Kavitha, M Mulimani International Journal of Computer Applications in Technology 69 (1), 93-100, 2022 | 2 | 2022 |
Reviewing the pathway of text-mining approaches to gauge the applicability in data analysis G Jalaja, N Sajitha, KRU Kumar International Journal of Computer Applications 125 (3), 2015 | 2 | 2015 |
Secured data integrity routing for Wireless Sensor Networks C Kavitha 2014 International Conference on Advances in Electronics Computers and …, 2014 | 2 | 2014 |
A secured alternative path routing protocol against DoS attack C Kavitha 2014 Eleventh International Conference on Wireless and Optical …, 2014 | 2 | 2014 |
Analyzing sentiment dynamics from sparse text coronavirus disease-19 vaccination using natural language processing model J Govindappa, K Channegowda International Journal of Electrical and Computer Engineering (IJECE) 12 (4 …, 2022 | 1 | 2022 |
Analysis and evaluation of machine learning classifiers for iot attack dataset H Jagruthi, C Kavitha Machine Learning and Autonomous Systems: Proceedings of ICMLAS 2021, 471-482, 2022 | 1 | 2022 |
A Novel Framework for NIDS Using Stacked Ensemble Learning H Jagruthi, C Kavitha Soft Computing for Security Applications: Proceedings of ICSCS 2021, 115-127, 2022 | 1 | 2022 |
A Deep Learning Approach to Find Optimal Path in Underwater Networks Using ns3-ai KR Shruthi, C Kavitha | | 2024 |
Interactive Screens Using Hand Gestures and Microcontroller C Kavitha, M Poonia, M Ahmed, M Meghana, N Naveed 2024 4th International Conference on Data Engineering and Communication …, 2024 | | 2024 |
Securing crime case summary and E-FIR using blockchain concept T Kayarga, CV Kavitha, P Lokamathe, M Yamuna, MS Meghana Recent Trends in Computational Sciences, 192-199, 2023 | | 2023 |