Authentication of e-learners using multimodal biometric technology S Asha, C Chellappan 2008 international symposium on biometrics and security technologies, 1-6, 2008 | 111 | 2008 |
Performance analysis of mobile agent failure recovery in e-service applications S Venkatesan, C Chellappan, P Dhavachelvan Computer Standards & Interfaces 32 (1-2), 38-43, 2010 | 65 | 2010 |
Detecting malicious urls in e-mail–an implementation D Ranganayakulu, C Chellappan AASRI Procedia 4, 125-131, 2013 | 58 | 2013 |
A heuristic approach for identification of redundant constraints in linear programming models S Paulraj, C Chellappan, TR Natesan International Journal of computer mathematics 83 (8-9), 675-683, 2006 | 50 | 2006 |
Advanced mobile agent security models for code integrity and malicious availability check S Venkatesan, C Chellappan, T Vengattaraman, P Dhavachelvan, ... Journal of Network and Computer Applications 33 (6), 661-671, 2010 | 48 | 2010 |
Biometrics: an overview of the technology, issues and applications S Asha, C Chellappan International Journal of Computer Applications 39 (10), 35-52, 2012 | 41 | 2012 |
The replication attack in wireless sensor networks: Analysis and defenses V Manjula, C Chellappan Advances in Networks and Communications: First International Conference on …, 2011 | 41 | 2011 |
An intelligent video analytics model for abnormal event detection in online surveillance video A Balasundaram, C Chellappan Journal of Real-Time Image Processing 17 (4), 915-930, 2020 | 38 | 2020 |
A mitigation model for TCP SYN flooding with IP spoofing L Kavisankar, C Chellappan 2011 International Conference on Recent Trends in Information Technology …, 2011 | 35 | 2011 |
Replication attack mitigations for static and mobile WSN V Manjula, DC Chellappan arXiv preprint arXiv:1103.3378, 2011 | 23 | 2011 |
Detection of phishing websites and secure transactions R Dhanalakshmi, C Prabhu, C Chellapan International Journal Communication & Network Security (IJCNS) 15, 21, 2011 | 21 | 2011 |
Artificial immune system based mobile agent platform protection S Venkatesan, R Baskaran, C Chellappan, A Vaish, P Dhavachelvan Computer Standards & Interfaces 35 (4), 365-373, 2013 | 20 | 2013 |
A different approach to appearance–based statistical method for face recognition using median MA Rabbani, C Chellappan International Journal of Computer Science and Network Security 7 (4), 262-267, 2007 | 20 | 2007 |
A combined PFCM and recurrent neural network-based intrusion detection system for cloud environment M Manickam, N Ramaraj, C Chellappan International Journal of Business Intelligence and Data Mining 14 (4), 504-527, 2019 | 19 | 2019 |
Performance evaluation of energy efficient on-demand routing algorithms for MANET P Sivasankar, C Chellappan, S Balaji 2008 IEEE Region 10 and the Third international Conference on Industrial and …, 2008 | 17 | 2008 |
Protection of mobile agent platform through attack identification scanner (AIS) by malicious identification police (MIP) S Venkatesan, C Chellappan 2008 First international conference on emerging trends in engineering and …, 2008 | 17 | 2008 |
Node rank based energy efficient routing algorithm for mobile Ad-hoc network D Kothandaraman, C Chellappan International Journal of Computer Networks & Communications (IJCNC) 11 (1 …, 2019 | 15 | 2019 |
Human activity detection system using internet of things D Kothandaraman, C Chellappan International Journal on Computer Science and Engineering 9 (11), 657-665, 2017 | 15 | 2017 |
TRUST BASED NODE REPLICATION ATTACK DETECTION PROTOCOL FOR WIRELESS SENSOR NETWORKS V Manjula, C Chellappan Journal of Computer Science 8 (11), 1880-1888, 2012 | 15 | 2012 |
An economic-based resource management and scheduling for grid computing applications G Murugesan, C Chellappan arXiv preprint arXiv:1004.3566, 2010 | 15 | 2010 |