Measuring privacy leaks in online social networks A Srivastava, G Geethakumari 2013 International Conference on Advances in Computing, Communications and …, 2013 | 371 | 2013 |
Detecting misinformation in online social networks using cognitive psychology KPK Kumar, G Geethakumari Human-centric Computing and Information Sciences 4 (1), 14, 2014 | 305 | 2014 |
API access control in cloud using the role based access control model A Sirisha, GG Kumari Trendz in Information Sciences & Computing (TISC2010), 135-137, 2010 | 65 | 2010 |
Attack graph—Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT R Sahay, G Geethakumari, K Modugu 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 308-313, 2018 | 56 | 2018 |
A novel blockchain based framework to secure IoT-LLNs against routing attacks R Sahay, G Geethakumari, B Mitra Computing 102 (11), 2445-2470, 2020 | 50 | 2020 |
An efficient approach to forensic investigation in cloud using VM snapshots DR Rani, G Geethakumari 2015 International Conference on Pervasive Computing (ICPC), 1-5, 2015 | 36 | 2015 |
Patient data viewer: an android application for healthcare S Challa, G Geethakumari, CSN Prasad 2011 annual IEEE India conference, 1-4, 2011 | 36 | 2011 |
Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN DR Rani, G Geethakumari Computer Communications 150, 799-810, 2020 | 32 | 2020 |
Information diffusion model for spread of misinformation in online social networks KPK Kumar, G Geethakumari 2013 International Conference on Advances in Computing, Communications and …, 2013 | 29 | 2013 |
Regeneration of events using system snapshots for cloud forensic analysis A Belorkar, G Geethakumari 2011 Annual IEEE India Conference, 1-4, 2011 | 28 | 2011 |
Cloud forensics: Evidence collection and preliminary analysis S Saibharath, G Geethakumari 2015 IEEE International Advance Computing Conference (IACC), 464-467, 2015 | 26 | 2015 |
Design and Implementation of a forensic framework for Cloud in OpenStack cloud platform S Saibharath, G Geethakumari 2014 International Conference on Advances in Computing, Communications and …, 2014 | 24 | 2014 |
A Cross-Domain Role Mapping and Authorization Framework for RBAC in Grid Systems. G Geethakumari, A Negi, VN Sastry Int. J. Comput. Sci. Appl. 6 (1), 1-12, 2009 | 21 | 2009 |
Efficient framework for detection of version number attack in internet of things R Sahay, G Geethakumari, B Mitra, I Sahoo Intelligent Systems Design and Applications: 18th International Conference …, 2020 | 20 | 2020 |
Event correlation in cloud: a forensic perspective B Kumar Raju, G Geethakumari Computing 98, 1203-1224, 2016 | 20 | 2016 |
HTTP botnet detection in IOT devices using network traffic analysis M Goyal, I Sahoo, G Geethakumari 2019 International Conference on Recent Advances in Energy-efficient …, 2019 | 19 | 2019 |
Exponential smoothing based approach for detection of blackhole attacks in IoT R Sahay, G Geethakumari, B Mitra, V Thejas 2018 IEEE International Conference on Advanced Networks and …, 2018 | 19 | 2018 |
A framework for detecting anti-forensics in cloud environment DR Rani, GG Kumari 2016 International Conference on Computing, Communication and Automation …, 2016 | 18 | 2016 |
A privacy settings recommender system for online social networks A Srivastava, G Geethakumari International Conference on Recent Advances and Innovations in Engineering …, 2014 | 18 | 2014 |
Mitigating the worst parent attack in RPL based internet of things R Sahay, G Geethakumari, B Mitra Cluster Computing 25 (2), 1303-1320, 2022 | 17 | 2022 |