Data security challenges and its solutions in cloud computing RV Rao, K Selvamani Procedia Computer Science 48, 204-209, 2015 | 317 | 2015 |
Security issues in mobile ad hoc networks S Sarika, A Pravin, A Vijayakumar, K Selvamani Procedia Computer Science 92, 329-335, 2016 | 80 | 2016 |
Node capture attack in Wireless Sensor Network: A survey MV Bharathi, RC Tanguturi, C Jayakumar, K Selvamani 2012 IEEE International Conference on Computational Intelligence and …, 2012 | 62 | 2012 |
An efficient energy-aware routing scheme for cloud-assisted MANETs in 5G H Riasudheen, K Selvamani, S Mukherjee, IR Divyasree Ad Hoc Networks 97, 102021, 2020 | 52 | 2020 |
Test cases prioritization using open dependency structure algorithm CP Indumathi, K Selvamani Procedia Computer Science 48, 250-255, 2015 | 29 | 2015 |
A novel data aggregation using multi objective based male lion optimization algorithm (DA-MOMLOA) in wireless sensor network G Saranraj, K Selvamani, P Malathi Journal of Ambient Intelligence and Humanized Computing, 1-9, 2021 | 28 | 2021 |
Subunit sign modeling framework for continuous sign language recognition R Elakkiya, K Selvamani Computers & Electrical Engineering 74, 379-390, 2019 | 28 | 2019 |
A review on cloud data security and its mitigation techniques K Selvamani, S Jayanthi Procedia Computer Science 48, 347-352, 2015 | 28 | 2015 |
Extricating manual and non-manual features for subunit level medical sign modelling in automatic sign language classification and recognition R Elakkiya, K Selvamani Journal of Medical Systems 41 (11), 1, 2017 | 21 | 2017 |
Enhanced dynamic programming approach for subunit modelling to handle segmentation and recognition ambiguities in sign language R Elakkiya, K Selvamani Journal of Parallel and Distributed Computing 117, 246-255, 2018 | 20 | 2018 |
Trusted and reputed services using enhanced mutual trusted and reputed access control algorithm in cloud G Sarojini, A Vijayakumar, K Selvamani Procedia Computer Science 92, 506-512, 2016 | 20 | 2016 |
Intelligent system for human computer interface using hand gesture recognition R Elakkiya, K Selvamani, S Kanimozhi, R Velumadhava, A Kannan Procedia engineering 38, 3180-3191, 2012 | 20 | 2012 |
A novel technique for online blood bank management K Selvamani, AK Rai Procedia Computer Science 48, 568-573, 2015 | 19 | 2015 |
Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side K Selvamani, A Duraisamy, A Kannan Arxiv preprint arXiv:1004.1769, 2010 | 16 | 2010 |
Optimal energy-efficient cluster head selection (OEECHS) for wireless sensor network G Saranraj, K Selvamani, GR Kanagachidambaresan Journal of The Institution of Engineers (India): Series B 100, 349-356, 2019 | 15 | 2019 |
Hierarchical group key management for secure data sharing in a cloud‐based environment R Velumadhava Rao, K Selvamani, S Kanimozhi, A Kannan Concurrency and Computation: Practice and Experience 31 (12), e4866, 2019 | 15 | 2019 |
Cluster head selection framework for risk awareness enabled IoT networks using ant lion optimisation approach M Sindhuja, K Selvamani Wireless Personal Communications 107, 1-21, 2019 | 14 | 2019 |
Reputed packet delivery using efficient audit misbehaviour detection and monitoring method in mobile ad hoc networks A Vijayakumar, K Selvamani Procedia Computer Science 48, 489-496, 2015 | 12 | 2015 |
A secure key transfer protocol for group communication RV Rao, K Selvamani, R Elakkiya arXiv preprint arXiv:1212.2720, 2012 | 12 | 2012 |
Secure cloud‐based e‐learning system with access control and group key mechanism S Kanimozhi, A Kannan, K Suganya Devi, K Selvamani Concurrency and computation: Practice and experience 31 (12), e4841, 2019 | 11 | 2019 |