Year : 2021
Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks
Cite this Research Publication : Rajasoundaran, S. and Kumar, S.V.N.S. and Selvi, M. and Ganapathy, S. and Rakesh, R. and Kannan, A "Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks", Wireless Networks 27, 7, 4513-4534
Publisher : Springer
Year : 2021
Secure watchdog selection using intelligent key management in wireless sensor networks
Cite this Research Publication : Rajasoundaran, S. and Prabu, A.V. Rajendran, R. and Sateesh Kumar, G. "Secure watchdog selection using intelligent key management in wireless sensor networks" Materials Today: Proceedings 2021
Publisher : Science Direct
Year : 2018
Detection of DoS attacks in cloud networks using intelligent rule based classification system
Cite this Research Publication : Rajendran, R. and Santhosh Kumar, S.V.N. "Detection of DoS attacks in cloud networks using intelligent rule based classification system", Cluster Computing 22, 423-434
Publisher : Springer
Year : 2017
Detection of URL based attacks using reduced feature set and modified C4. 5 algorithm
Cite this Research Publication : R Rakesh, S Muthurajkumar, A Kannan Detection of URL based attacks using reduced feature set and modified C4. 5 algorithm Advances in Natural and Applied Sciences 9, 5, 304-311
Publisher : Advances in Natural and Applied Sciences
Year : 2016
Experimental method to improve the accuracy of phishing URL detection using theil classifier
Cite this Research Publication : Rakesh, R. and Kannan, A. Experimental method to improve the accuracy of phishing URL detection using theil classifier Asian Journal of Information Technology 15, 21, 4422-4425
Publisher : Asian Journal of Information Technology
Year : 2015
Secure data sharing in cloud storage using KAC with certificateless encryption
Cite this Research Publication : J Jayakumar, S Muthurajkumar, R Rakesh Secure data sharing in cloud storage using KAC with certificateless encryption Advances in Natural and Applied Sciences 9, 6, 192-197
Publisher : Advances in Natural and Applied Sciences
Year : 2015
Secure data storage using decentralized access control in cloud
Cite this Research Publication : R Anitha, S Muthurajkumar, R Rakesh Secure data storage using decentralized access control in cloud Advances in Natural and Applied Sciences 9, 6, 134-139
Publisher : Advances in Natural and Applied Sciences