Program slicing techniques and its applications N Sasirekha, AE Robert, DM Hemalatha arXiv preprint arXiv:1108.1352, 2011 | 40 | 2011 |
Quantum Cryptography using Quantum Key Distribution and its Applications MH N.Sasirekha International Journal of Engineering and Advanced Technology 3 (4), 6, 2014 | 19 | 2014 |
LOSSLESS TEXT COMPRESSION FOR UNICODE TAMIL DOCUMENTS. B Vijayalakshmi, N Sasirekha ICTACT Journal on Soft Computing 8 (2), 2018 | 14 | 2018 |
A survey on software protection techniques against various attacks N Sasirekha, M Hemalatha Global Journal of Computer Science and Technology 12 (1), 53-58, 2012 | 11 | 2012 |
An enhanced code encryption approach with HNT transformations for software security N Sasirekha, M Hemalatha International Journal of Computer Applications 53 (10), 2012 | 11 | 2012 |
An Identification of Variety of Leaf Diseases Using Various Data Mining Techniques NS Dr. N. Sasirekha International Journal of Advanced Research in Computer and Communication …, 2015 | 10 | 2015 |
Reverse Engineering for Malicious Code Behavior Analysis using Virtual Security Patching A EdwinRobert, G Manivasagam, N Sasirekha, M Hemalatha Int. Journal of Computer Applications(IJCA) 26 (4), 41-45, 2011 | 5 | 2011 |
An empirical model for clustering and classification of instrumental music using machine learning technique M Hemalatha, N Sasirekha, S Easwari, N Nagasaranya 2010 IEEE International Conference on Computational Intelligence and …, 2010 | 5 | 2010 |
Lossless Text Compression Technique Based on Static Dictionary for Unicode Tamil Document B Vijayalakshmi, N Sasirekha Int. J. Pure Appl. Math 118, 85-91, 2018 | 4 | 2018 |
WITHDRAWN: Kulczynski indexed dragonfly feature optimization based Polytomous Adaptive Base classifier for anomaly intrusion detection AS Sona, N Sasirekha Materials Today: Proceedings, 2021 | 3 | 2021 |
Performance Improvisation on 3D Converted 2D Unraveled Fingerprint DNS R.Anitha IOSR Journal of Computer Engineering(IOSR-JCE) 16 (6), 8, 2014 | 3 | 2014 |
Image Securing Mechanism by Gradient Techniques DNS R.Anitha International Journal of Computer Engineering and Applications(IJCEA) 8 (1), 10, 2014 | 2 | 2014 |
An improved secure code encryption approach based on indexed table N Sasirekha, M Hemalatha Proceedings of the International Conference on Advances in Computing …, 2012 | 2 | 2012 |
An Overview on Test Case Reduction Methods For Data Mining Techniques D Yamuna, N Sasirekha International Journal of Contemporary Research in Computer Science and …, 2017 | 1 | 2017 |
Prediction of Leaf Disease using Segmentation with Hierarchical Clustering DNS Swetha, N. International Journal of Engineering Technology Science and Research 3 (6 …, 2016 | 1 | 2016 |
An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protection N Sasirekha, M Hemalatha Proceedings of the Second International Conference on Computational Science …, 2012 | 1 | 2012 |
Energy consumption of High Power MANET Using LVC DNS K.Santhya International Journal Of Engineering And Computer Science 6 (1), 19945 - 19950, 2017 | | 2017 |
An Efficient Node Failure Discovery Mec-hanism in the Wireless Sensor Network M KB, N Sasirekha International Journal of Control Theory and Applications 9 (36), 461-471, 2016 | | 2016 |
Power Heterogeneous MANET Using LVC Algorithm K Santhya, N Sasirekha Wireless Communication 8 (8), 299-303, 2016 | | 2016 |
A Thorough Investigation on Software Protection Techniques against Various Attacks N Sasirekha, M Hemalatha | | 2014 |