A novel intrusion detection system based on trust evaluation to defend against DDoS attack in MANET M Poongodi, S Bose Arabian Journal for Science and Engineering 40, 3583-3594, 2015 | 160 | 2015 |
Detection and Prevention system towards the truth of convergence on decision using Aumann agreement theorem M Poongodi, S Bose Procedia Computer Science 50, 244-251, 2015 | 129 | 2015 |
Design of Intrusion Detection and Prevention System (IDPS) using DGSOTFC in collaborative protection networks M Poongodi, S Bose 2013 Fifth International Conference on Advanced Computing (ICoAC), 172-178, 2013 | 127 | 2013 |
A firegroup mechanism to provide intrusion detection and prevention system against DDoS attack in collaborative clustered networks M Poongodi, S Bose International Journal of Information Security and Privacy (IJISP) 8 (2), 1-18, 2014 | 124 | 2014 |
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS … M Poongodi, S Bose Cluster Computing 18, 1549-1559, 2015 | 121 | 2015 |
The effective intrusion detection system using optimal feature selection algorithm M Poongodi, S Bose, N Ganeshkumar International Journal of Enterprise Network Management 6 (4), 263-274, 2015 | 120 | 2015 |
The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation M Poongodi, S Bose Adv. Nat. Appl. Sci 9 (6), 574-580, 2015 | 115 | 2015 |
Chinese remainder theorem based centralised group key management for secure multicast communication P Vijayakumar, S Bose, A Kannan IET information Security 8 (3), 179-187, 2014 | 102 | 2014 |
An intrusion detection system for sdn using machine learning G Logeswari, S Bose, T Anitha Intelligent Automation & Soft Computing 35 (1), 867-880, 2023 | 73 | 2023 |
Centralized Key Distribution Protocol using the Greatest Common Divisor Method P. Vijayakumar, S. Bose, A. Kannan Computers & Mathematics with Applications 65 (9), 1360-1368, 2013 | 70 | 2013 |
Multi-layer integrated anomaly intrusion detection system for mobile adhoc networks S Bose, S Bharathimurugan, A Kannan 2007 International Conference on Signal Processing, Communications and …, 2007 | 59 | 2007 |
The combined approach for anomaly detection using neural networks and clustering techniques AS Aneetha, S Bose Computer Science & Engineering 2 (4), 37, 2012 | 44 | 2012 |
Detecting denial of service attacks using cross layer based intrusion detection system in wireless ad hoc networks S Bose, A Kannan 2008 International Conference on Signal Processing, Communications and …, 2008 | 41 | 2008 |
A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments A Avalappampatty Sivasamy, B Sundan The Scientific World Journal 2015 (1), 850153, 2015 | 37 | 2015 |
Hybrid network intrusion detection system using expert rule based approach AS Aneetha, TS Indhu, S Bose Proceedings of the Second International Conference on Computational Science …, 2012 | 31 | 2012 |
Impact of gray hole attack on adhoc networks G Usha, S Bose 2013 International Conference on Information Communication and Embedded …, 2013 | 29 | 2013 |
Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory S Vijayalakshmi, S Bose, G Logeswari, T Anitha Cyber security and applications 1, 100011, 2023 | 28 | 2023 |
Computation and communication efficient key distribution protocol for secure multicast communication P Vijayakumar, S Bose, A Kannan, L Jegatha Deborah KSII Transactions on Internet and Information Systems (TIIS) 7 (4), 878-894, 2013 | 28 | 2013 |
Rotation based secure multicast key management for batch rekeying operations P Vijayakumar, S Bose, A Kannan Networking Science 1, 39-47, 2012 | 28 | 2012 |
Adaptive multipath multimedia streaming architecture for mobile networks with proactive buffering using mobile proxies A Kannan, S Bose Journal of computing and information technology 15 (3), 215-226, 2007 | 28 | 2007 |