A fast algorithm for mining high utility itemsets S Shankar, N Babu, T Purusothaman, S Jayanthi 2009 IEEE International Advance Computing Conference, 1459-1464, 2009 | 69 | 2009 |
Performance analysis of clustering algorithms in brain tumor detection of MR images PT Selvy, V Palanisamy, T Purusothaman European Journal of Scientific Research 62 (3), 321-330, 2011 | 67 | 2011 |
Utility sentient frequent itemset mining and association rule mining: a literature survey and comparative study S Shankar, T Purusothaman International Journal of Soft Computing Applications 4 (1), 81-95, 2009 | 59 | 2009 |
Classification of substitution ciphers using neural networks G Sivagurunathan, V Rajendran, T Purusothaman IJCSNS International Journal of Computer Science and Network Security 10 (3 …, 2010 | 21 | 2010 |
Efficient star topology based multicast key management algorithm K Saravanan, T Purusothaman Journal of Computer Science 8 (6), 951, 2012 | 19 | 2012 |
Novel algorithm for mining high utility itemsets S Shankar, T Purusothaman, S Jayanthi 2008 International Conference on Computing, Communication and Networking, 1-6, 2008 | 19 | 2008 |
Fault-tolerant adaptive mobile agent system using dynamic role based access control P Marikkannu, JJA Jovin, T Purusothaman International Journal of Computer Applications 20 (2), 1-6, 2011 | 18 | 2011 |
Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol. SG Oliver, T Purusothaman Computer Systems Science & Engineering 41 (2), 2022 | 17 | 2022 |
GLS with secure routing in ad-hoc networks V Sumathy, P Narayanasmy, K Baskaran, T Purusothaman TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region 3 …, 2003 | 17 | 2003 |
A new scalable and reliable cost effective key agreement protocol for secure group communication SJ Begum, DT Purusothaman Journal of Computer Science 7 (3), 328, 2011 | 16 | 2011 |
An efficient routing protocol design for distributed wireless sensor networks P Manikandan, DT Purusothaman International Journal of Computer Applications, 0975-8887, 2010 | 15 | 2010 |
IPSD: New coverage preserving and connectivity maintenance scheme for improving lifetime of wireless sensor networks A Balamurugan, T Purusothaman WSEAS Transactions on Communications 11 (1), 26-36, 2012 | 12 | 2012 |
Reduction of key search space of vigenere cipher using particle swarm optimization G Sivagurunathan, T Purusothaman Journal of computer science 7 (11), 1633, 2011 | 12 | 2011 |
Performance Evaluation of Exponential TCP/IP Congestion Control Algorithm M Kalpana, T Purusothaman IJCSNS 9 (3), 312, 2009 | 11 | 2009 |
Cryptanalysis of simple block ciphers using extensive heuristic attacks G Selvi, T Purusothaman European Journal of Scientific Research 78 (2), 198-221, 2012 | 10 | 2012 |
Fast multimodal biometric approach using dynamic fingerprint authentication and enhanced iris features AJ Basha, V Palanisamy, T Purusothaman 2010 IEEE International Conference on Computational Intelligence and …, 2010 | 10 | 2010 |
Privacy preserving distributed data mining using randomized site selection M Rajalakshmi, T Purusothaman European Journal of Scientific Research 64 (4), 610-624, 2011 | 9 | 2011 |
An enhanced mobile agent security protocol P Marikkannu, JJA Jovin, T Purusothaman European Journal of Scientific Research 51 (3), 321-331, 2011 | 8 | 2011 |
Comparison of data centric routing protocols with random way point mobility model in mobile sensor networks KE Kannammal, T Purusothaman European Journal of Scientific Research 65 (4), 546-552, 2011 | 8 | 2011 |
A generic interface for resource aggregation in grid of grids D Surendran, T Purusothaman, RA Balachandar International Journal of Information Technology, Communications and …, 2011 | 8 | 2011 |