A survey of attacks, security mechanisms and challenges in wireless sensor networks DG Padmavathi, M Shanmugapriya International Journal of Computer Science and Information Security (IJCSIS …, 2009 | 649 | 2009 |
A Survey on various Cyber Attacks and their Classification GP M Uma International Journal of Network Security 15 (6), 391-397, 2013 | 326 | 2013 |
A survey on resource allocation strategies in cloud computing PG Vinothina V, Sridaran R International Journal of Advanced Computer Science and Applications 3 (6 …, 2012 | 239 | 2012 |
A survey of biometric keystroke dynamics: Approaches, security and challenges D Shanmugapriya, G Padmavathi International Journal of Computer Science and Information Security 5 (1 …, 2009 | 148 | 2009 |
A Study on Vehicle Detection and Tracking Using Wireless Sensor Networks G Padmavathi, D Shanmugapriya, M Kalaivani Wireless Sensor Network 2 (2), 173-185, 2010 | 117 | 2010 |
Comparison of filters used for underwater image pre-processing G Padmavathi, P Subashini, MM Kumar, SK Thakur International Journal of Computer Science and Network Security 10 (1), 58-65, 2010 | 115 | 2010 |
Non linear Image segmentation using fuzzy c means clustering method with thresholding for underwater images G Padmavathi, MM Muthukumar, MSK Thakur International Journal of Computer Science Issues 7 (3), 35-40, 2010 | 53 | 2010 |
Mobile device security: A survey on mobile device threats, vulnerabilities and their defensive mechanism M Sujithra, G Padmavathi International Journal of Computer Applications 56 (14), 24-29, 2012 | 51 | 2012 |
Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud M Sujithra, G Padmavathi, S Narayanan Elsevier-Procedia Computer Science 47, 480-485, 2015 | 49 | 2015 |
Mrs. D. Shanmugapriya,“A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks” DG Padmavathi International Journal of Computer Science and Information Security 4 (1), 2009 | 47 | 2009 |
Enhanced Image Fusion Algorithm Using Laplacian Pyramid and Spatial frequency Based Wavelet Algorithm GP N. Indhumadhi International Journal of Soft Computing and Engineering(TM) 1 (5), 298-303, 2011 | 43 | 2011 |
Security analysis of password hardened multimodal biometric fuzzy vault VS Meenakshi, G Padmavathi Proceedings of World Academy of Science, Engineering and Technology 56, 312-320, 2009 | 42 | 2009 |
A Comparative Study and Performance Evaluation of Reactive Quality of service Routing Protocols in Mobile Adhoc Networks M Uma, G Padmavathi Journal of Theoretical and Applied Information Technology 6 (2), 223-229, 2009 | 40 | 2009 |
An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics D Shanmugapriya, G Padmavathi IJCSNS International Journal of Computer Science and Network Security 11 (10 …, 2011 | 37 | 2011 |
Classification and performance of AQM-based schemes for congestion avoidance K Chitra, G Padamavathi International Journal of Computer Science and Information Security 8 (1 …, 2010 | 32 | 2010 |
Taxonomy of security attacks and risk assessment of cloud computing MS Akshaya, G Padmavathi Advances in big data and cloud computing, 37-59, 2018 | 31* | 2018 |
A survey on various security threats and classification of malware attacks, vulnerabilities and detection techniques GP Divya, S International Journal of Computer Science & Applications (TIJCSA) 2 (04), 66-72, 2013 | 31 | 2013 |
Security Analysis of Hardened Retina Based Fuzzy Vault VS Meenakshi, G Padmavathi IEEE - International Conference on Advances in Recent Technologies in …, 2009 | 29 | 2009 |
Performance analysis of Non Linear Filtering Algorithms for underwater images DG Padmavathi, DP Subashini, MMM Kumar, SK Thakur International Journal of Computer Science and Information Security (IJCSIS …, 2009 | 26 | 2009 |
Dynamic clustering for QoS based secure multicast key distribution in mobile Ad hoc networks S Devaraju, G Padmavathi International Journal of Computer Science Issues (IJCSI) 7 (5), 30-37, 2010 | 24* | 2010 |