UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3
hits: 28
1.
  • Intrusion detection using d... Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks
    Nancy, Periasamy; Muthurajkumar, S; Ganapathy, S ... IET communications, 03/2020, Volume: 14, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Intrusion detection systems assume a noteworthy job in the provision of security in wireless Sensor networks. The existing intrusion detection systems focus only on the detection of the known types ...
Full text

PDF
2.
  • A Matrix Translation and El... A Matrix Translation and Elliptic Curve Based Cryptosystem for Secured Data Communications in WSNs
    Pradeep, S.; Muthurajkumar, S.; Ganapathy, Sannasi ... Wireless personal communications, 07/2021, Volume: 119, Issue: 1
    Journal Article
    Peer reviewed

    In this paper, we propose a new cryptosystem based on matrix translation and Elliptic curve cryptography for developing a secure routing algorithm to provide energy efficient and secured data ...
Full text
3.
  • Efficient classification an... Efficient classification and preservation of log integrity through propagated chain in cloud
    Sahayaraj, L. Remegius Praveen; Muthurajkumar, S. Journal of intelligent & fuzzy systems, 08/2023, Volume: 45, Issue: 3
    Journal Article
    Peer reviewed

    Preserving the integrity of log data and using the same for forensic analysis is one of the prime concerns of cloud-oriented applications. Since log data collates sensitive information, providing ...
Full text
4.
Full text

PDF
5.
  • An Intelligent Secured and ... An Intelligent Secured and Energy Efficient Routing Algorithm for MANETs
    Muthurajkumar, S.; Ganapathy, S.; Vijayalakshmi, M. ... Wireless personal communications, 09/2017, Volume: 96, Issue: 2
    Journal Article
    Peer reviewed

    Energy consumption and security are two important aspects of Mobile Ad Hoc Networks (MANETs). In MANET, application security can be provided using trust management, key management, firewalls and ...
Full text
6.
  • Semantic Graph Based Convol... Semantic Graph Based Convolutional Neural Network for Spam e-mail Classification in Cybercrime Applications
    Muthurajkumar, S.; Rahmath Nisha, S. International journal of computers, communications & control, 02/2023, Volume: 18, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Spam is characterized as unnecessary and garbage E-mails. Due to the increasing of unsolicited E-mails, it is becoming more and more crucial for mail users to utilize a trustworthy spam E-mail ...
Full text
7.
  • An Efficient Privacy-Preser... An Efficient Privacy-Preserving Ranked Keyword Search Method
    Nirmala, E.; Muthurajkumar, S.; Subitha, D. IOP conference series. Materials Science and Engineering, 03/2021, Volume: 1084, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract The keyword searching algorithm plays a vital role in cloud computing Architecture. Here, the searching technique is applied as a tool to encrypted data set which is outsourced. This ...
Full text

PDF
8.
  • Optimal and Energy Efficien... Optimal and Energy Efficient Scheduling Techniques for Resource Management in Public Cloud Networks
    Muthurajkumar, S.; Vijayalakshmi, M.; Kannan, A. ... National Academy science letters, 08/2018, Volume: 41, Issue: 4
    Journal Article

    Heterogeneous and multi-core server processors are connected across the clouds and cloud data centers in cloud networks. In such a scenario, the overall performance of the cloud system must be ...
Full text
9.
  • Sentiment Analysis Techniqu... Sentiment Analysis Techniques for Social Media-Based Recommendation Systems
    Munuswamy, Selvi; Saranya, M. S.; Ganapathy, S. ... National Academy science letters, 06/2021, Volume: 44, Issue: 3
    Journal Article

    Social networks build and maintain relationships between individuals. Sentiment analysis is important in social network analysis for extracting user’s interest from product preferences based on ...
Full text
10.
  • Secured Data Storage and Re... Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases
    Muthurajkumar, S.; Vijayalakshmi, M.; Kannan, A. Wireless personal communications, 10/2017, Volume: 96, Issue: 4
    Journal Article
    Peer reviewed

    Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security ...
Full text
1 2 3
hits: 28

Load filters