Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier G Subburayalu, H Duraivelu, AP Raveendran, R Arunachalam, ... Journal of Applied Security Research 18 (3), 402-420, 2023 | 42 | 2023 |
An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs) D Hemanand, GV Reddy, SS Babu, KR Balmuri, T Chitra, ... International Journal of Intelligent Systems and Applications in Engineering …, 2022 | 27 | 2022 |
Performance analysis of malicious node detection and elimination using clustering approach on MANET S Gopalakrishnan Circuits and Systems 7 (06), 748, 2016 | 21 | 2016 |
Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications P Satyanarayana, G Diwakar, BV Subbayamma, NVPS Kumar, M Arun, ... Computer Communications 198, 262-281, 2023 | 17 | 2023 |
A survey of wireless network security S Gopalakrishnan International Journal of Computer Science and Mobile Computing 3 (1), 53-68, 2014 | 17 | 2014 |
An intelligent heuristic manta-ray foraging optimization and adaptive extreme learning machine for hand gesture image recognition S Khetavath, NC Sendhilkumar, P Mukunthan, S Jana, S Gopalakrishnan, ... Big Data Mining and Analytics 6 (3), 321-335, 2023 | 11 | 2023 |
Investigation and classification of chronic wound tissue images using random forest algorithm (RF) T Chitra, C Sundar, S Gopalakrishnan International Journal of Nonlinear Analysis and Applications 13 (1), 643-651, 2022 | 11 | 2022 |
Implementation of enhanced energy aware clustering based Routing (EEACBR) algorithm to improve network lifetime in WSN’s P Satyanarayana, UD Yalavarthi, YSS Sriramam, M Arun, VG Krishnan, ... 2022 IEEE 2nd International Conference on Mobile Networks and Wireless …, 2022 | 10 | 2022 |
A novel approach for design energy efficient inexact reverse carry select adders for IoT applications R Turaka, SR Chand, R Anitha, RA Prasath, S Ramani, H Kumar, ... Results in Engineering 18, 101127, 2023 | 7 | 2023 |
Cluster based Intrusion Detection System for Mobile Ad-hoc Network S Gopalakrishnan 5th IEEE International Conference on Science, Technology, Engineering and …, 2019 | 7 | 2019 |
Security Enhancement for Mobile Ad Hoc Network Using Region Splitting Technique PM Kumar, S Gopalakrishnan Journal of Applied Security Research 11 (2), 185-198, 2016 | 7 | 2016 |
Enhancement of Energy Efficiency and Network Lifetime Using Modified Cluster Based Routing in Wireless Sensor Networks P Satyanarayana, T Sushma, M Arun, VSR Talari, S Gopalakrishnan, ... 2023 International Conference on Intelligent Systems for Communication, IoT …, 2023 | 6 | 2023 |
INTRUSION DETECTION IN MOBILE AD HOC NETWORK USING SECURE ROUTING FOR ATTACKER IDENTIFICATION PROTOCOL S Gopalakrishnan, P Ganeshkumar American Journal of Applied Sciences 8 (11), 1391-1397, 2014 | 6 | 2014 |
Human action recognition using difference of gaussian and difference of wavelet GV Reddy, K Deepika, L Malliga, D Hemanand, C Senthilkumar, ... Big Data Mining and Analytics 6 (3), 336-346, 2023 | 5 | 2023 |
Engineering education with tool based technical activity (TBTA) R Dineshkumar, M Kalimuthu, K Deepika, S Gopalakrishnan Journal of Engineering Education Transformations 36 (2), 185-191, 2022 | 5 | 2022 |
Analysis of Artificial Intelligence Enabled Intelligent Sixth Generation (6G) Wireless Communication Networks SM Periannasamy, C Thangavel, S Latha, GV Reddy, S Ramani, PV Phad, ... 2022 IEEE International Conference on Data Science and Information System …, 2022 | 4 | 2022 |
Performance analysis of multicast routing using multi agent zone based mechanism in MANET S Manthandi Periannasamy, NC Sendhilkumar, R Arun Prasath, ... International Journal of Nonlinear Analysis and Applications 13 (1), 1047-1055, 2022 | 4 | 2022 |
Heavy Secured Routing Protocol: A Secured Routing Protocol for Wireless Networks PGS Gopalakrishnan Journal of Computational and Theoretical Nanoscience 12 (6), 1086-1095(10), 2015 | 4* | 2015 |
SECURE AND EFFICIENT TRANSMISSION IN MANET TO IDENTIFY THE FAKE ID’S USING FAKE ID DETECTION PROTOCOL S Gopalakrishnan, p Ganeshkumar Journal of Computer Science 11 (2), 394-402, 2015 | 4* | 2015 |
An Intelligent Harris Hawks Optimization (IHHO) based Pivotal Decision Tree (PDT) Machine Learning Model for Diabetes Prediction R Fayaz, GV Reddy, M Sujaritha, N Soundiraraj, WG Theresa, DK Roy, ... International Journal of Intelligent Systems and Applications in Engineering …, 2022 | 3 | 2022 |