Efficient realization of digital logic circuit using QCA multiplexer M Goswami, B Kumar, H Tibrewal, S Mazumdar 2014 2nd International conference on business and information management …, 2014 | 52 | 2014 |
Comparative Study on AES and RSA Algorithm for Medical images RRVK Santhosh Kumar B J, A Nair International Conference on Communication and Signal Processing, 0502, 2017 | 40* | 2017 |
An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS) in MANET AA Acharya, KM Arpitha, BJ Santhosh Kumar International Journal of Engineering and Technology (IJET) 8 (2), 2016 | 29 | 2016 |
Vulnerability detection and prevention of SQL injection BJS Kumar, PP Anaswara International Journal of Engineering & Technology 7 (2.31), 16-18, 2018 | 20 | 2018 |
Hybridization of RSA and AES Algorithms for Authentication and Confidentiality of Medical Images AN Santhosh Kumar B J, RR V K International Conference on Communication and Signal Processing, 1057, 2017 | 18* | 2017 |
An Intrusion Detection and Prevention System against DOS Attacks for Internet-Integrated WSN BJS Kumar, S Sinha 2022 7th International Conference on Communication and Electronics Systems …, 2022 | 11 | 2022 |
Detection and avoidance of web vulnerability using XSS GK Nischitha, S Sahana, BJ Santhosh Kumar Int J Recent Technol Eng 8 (2), 1737-1740, 2019 | 10 | 2019 |
Extraction of retinal blood vessel using artificial bee-colony optimization K Kavya, MG Dechamma, BJS Kumar Journal of Theoretical and Applied Information Technology 88 (3), 535-540, 2016 | 10 | 2016 |
Detection and Prevention of TCP SYN Flooding Attack in WSN Using Protocol Dependent Detection and Classification System BJS Kumar, KRK Gowda 2022 IEEE International Conference on Data Science and Information System …, 2022 | 9 | 2022 |
Web application vulnerability detection using hybrid string matching algorithm BJS Kumar, K Pujitha International Journal of Engineering & Technology 7 (3.6), 106-109, 2018 | 8 | 2018 |
Detection and Prevention of UDP Protocol Exploiting and Smurf Attack in WSN Using Sequential Probability Ratio Test Algorithm NK Singh, SK BJ 2023 International Conference on Data Science and Network Security (ICDSNS), 1-6, 2023 | 7 | 2023 |
Identifying Rank Attacks and Alert Application in WSN DS Nair, S Kumar BJ 2021 6th International Conference on Communication and Electronics Systems …, 2020 | 7 | 2020 |
Integrity based Authentication and Secure Information Transfer Over Cloud for Hospital Management System B Raj L., R Vandana, SK B.J. 2020 4th International Conference on Intelligent Computing and Control …, 2020 | 7* | 2020 |
Symmetric key based encryption and decryption using lissajous curve equations BJ Santhosh Kumar, K Vijay International Journal of Electrical and Computer Engineering (IJECE) 7 (1 …, 2017 | 7 | 2017 |
Fault Analysis Detection in Public Key Cryptosystems (RSA) RK Mamathashree A M, SK B J International Conference on Communication and Signal Processing, 0505, 2017 | 5 | 2017 |
Double Circle Localization for the Detection of Jamming Attack in Wireless Sensor Network HJ Inchana, SK BJ 2022 IEEE North Karnataka Subsection Flagship International Conference …, 2022 | 4 | 2022 |
Jamming attack detection using ewma in clustered wireless sensor network SK BJ, CS Shravya 2022 IEEE International Conference on Data Science and Information System …, 2022 | 4 | 2022 |
First Level Security System for Intrusion Detection and Prevention in LAN R Abhijith, BJS Kumar 2021 2nd International Conference for Emerging Technology (INCET) 3 (10.1109 …, 2021 | 4 | 2021 |
A Method for Information Grabbing, Bypassing Security and Detecting Web Application Vulnerabilities BRP B.J. Santhosh Kumar International Journal of Engineering & Technology 7 (4), 762-765, 2018 | 4 | 2018 |
Detection and prevention of UDP reflection amplification attack in WSN using cumulative sum algorithm BJS Kumar, VSS Gowda 2022 IEEE International Conference on Data Science and Information System …, 2022 | 3 | 2022 |