Improving medical communication process using recurrent networks and wearable antenna s11 variation with harmonic suppressions P Subramani, F Al-Turjman, R Kumar, A Kannan, A Loganthan Personal and Ubiquitous Computing, 1-13, 2023 | 29 | 2023 |
Comparative study for feature selection algorithms in intrusion detection system K Anusha, E Sathiyamoorthy Automatic Control and Computer Sciences 50, 1-9, 2016 | 21 | 2016 |
A new trust-based mechanism for detecting intrusions in MANET. K Anusha, E Sathiyamoorthy Inf. Secur. J. A Glob. Perspect. 26 (4), 153-165, 2017 | 13 | 2017 |
An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a manet environment M Nandi, K Anusha Wireless Personal Communications 127 (3), 2515-2533, 2022 | 12 | 2022 |
IOT based smart and flexible lighting in streets MN Raju Anitha, K Akhila, KS Anusha, GS Lekha International Journal of Engineering and technology, 2018 | 12 | 2018 |
Omamids: ontology based multi-agent model intrusion detection system for detecting web service attacks K Anusha, E Sathiyamoorthy Journal of Applied Security Research 11 (4), 489-508, 2016 | 12 | 2016 |
Adaptive routing mechanism in SDN to limit congestion A Kannan, S Vijayan, M Narayanan, M Reddiar Information Systems Design and Intelligent Applications: Proceedings of …, 2019 | 11 | 2019 |
ALBAE feature extraction based lung pneumonia and cancer classification M Braveen, S Nachiyappan, R Seetha, K Anusha, A Ahilan, A Prasanth, ... Soft Computing, 1-14, 2023 | 9 | 2023 |
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system K Anusha, E Sathiyamoorthy International Journal of Internet Technology and Secured Transactions 6 (3 …, 2016 | 8 | 2016 |
SURVEY OF BLOCK CHAIN TECHNOLOGY FOR DIGITIZATION IN INDIA S. PRASANNA, N. MANIKANDAN, K. VIJAYAKUMAR and ANUSHA K International Journal of Civil Engineering and Technology (IJCIET) 9 (6 …, 2018 | 7* | 2018 |
An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy K Anusha, N Jayaleshwari, S Arun Kumar, GV Rajyalakshmi International Journal of Engineering and Technology (IJET) 5 (3), 2575-84, 2013 | 5 | 2013 |
A Review on Prediction of Autism using Machine Learning Algorithm DKA Mr. Siddharaj D Pujari International Journal of Advanced Science and Technology 29 (6), 4669-4678, 2020 | 4 | 2020 |
Redundancy based WEP routing technology (IoT-WSN) K Anusha 2015 International Conference on Signal Processing and Communication …, 2015 | 4 | 2015 |
Secured key management with trusted certificate revocation in MANET M Narayanan, A Kannan, S Ulaganathan, M Reddiar Information Systems Design and Intelligent Applications: Proceedings of …, 2019 | 3 | 2019 |
Quantum Dot-Sensitized Solar Cells Via Integrated Experimental And Modeling Study L Gangadhar, A Kannan, PK Praseetha Journal of Computational and Theoretical Nanoscience 16 (2), 436-440, 2019 | 2 | 2019 |
A PREDICTIVE TRUST MODEL FOR E-COMMERCE APPLICATIONS. S NANDI, K ANUSHA, GV RAJYALAKSHMI Journal of Theoretical & Applied Information Technology 55 (2), 2013 | 2 | 2013 |
A mutual certificate-based data privacy scheme for ubiquitous and sustainable computing system users TSB Damodhar, P Anandan, C Nalini, MA Jerlin, A Victor, K Anusha, ... Sustainable Energy Technologies and Assessments 58, 103356, 2023 | 1 | 2023 |
Data location integration with stable routing: Stable and optimal data transmission in wireless sensor networks A Gayathri, D Ruby, N Manikandan, T Gopalakrishnan, K Anusha, ... Transactions on Emerging Telecommunications Technologies, e4627, 2022 | 1 | 2022 |
MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network K Anusha, E Sathiyamoorthy International Journal of Information and Computer Security 9 (4), 361-386, 2017 | 1 | 2017 |
Investigations on Classification Algorithms for Intrusion Detection System in MANETS K Anusha, D Ezhilmaran 2014 International Conference on Electronics, Communication and …, 2014 | 1 | 2014 |