Follow
E.Sathiyamoorthy
E.Sathiyamoorthy
Verified email at vit.ac.in
Title
Cited by
Cited by
Year
A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases
S Narayan, E Sathiyamoorthy
Neural Computing and Applications 31, 93-102, 2019
472019
Comparative study for feature selection algorithms in intrusion detection system
K Anusha, E Sathiyamoorthy
Automatic Control and Computer Sciences 50, 1-9, 2016
212016
Agent based security for cloud computing using obfuscation
K Govinda, E Sathiyamoorthy
Procedia Engineering 38, 125-129, 2012
182012
A new trust-based mechanism for detecting intrusions in MANET.
K Anusha, E Sathiyamoorthy
Inf. Secur. J. A Glob. Perspect. 26 (4), 153-165, 2017
132017
A prevention model for session hijack attacks in wireless networks using strong and encrypted session ID
SS Manivannan, E Sathiyamoorthy
cybernetics and information technologies 14 (3), 46-60, 2014
132014
Omamids: ontology based multi-agent model intrusion detection system for detecting web service attacks
K Anusha, E Sathiyamoorthy
Journal of Applied Security Research 11 (4), 489-508, 2016
122016
A Novel and efficient public key encryption algorithm
PMDR Vincent, E Sathiyamoorthy
International Journal of Information and communication technology 9 (2), 199-211, 2016
112016
Agent based trust management model based on weight value model for online auctions
E Sathiyamoorthy, N Iyenger, V Ramachandran
arXiv preprint arXiv:1004.0765, 2010
102010
Mobile agent based trust management framework using fuzzy logic in B2C e-business environment
E Sathiyamoorthy, N Iyengar, V Ramachandran
International Journal of Computer Theory and Engineering 2 (2), 308-312, 2010
102010
Agent based trust management framework in distributed e-business environment
E Sathiyamoorthy, NCSN Iyenger
AIRCC's International Journal of Computer Science and Information Technology …, 2010
102010
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system
K Anusha, E Sathiyamoorthy
International Journal of Internet Technology and Secured Transactions 6 (3 …, 2016
82016
A secured and time efficient electronic business framework based on public key cryptography
P Vincent, E Sathiyamoorthy
International Review on Computers and Software 9 (10), 1791-1798, 2014
62014
A novel and efficient key sharing technique for web applications
PMDR Vincent, E Sathiyamoorthy
2013 Fourth International Conference on Computing, Communications and …, 2013
62013
Privacy Preservation of a Group and Secure Data Storage in Cloud Environment
K Govinda, E Sathiyamoorthy
Cybernetics and Information Technologies 15 (1), 46-54, 2015
52015
Data Auditing in Cloud Environment using Message Authentication Code‖
K Govinda, E Sathiyamoorthy
International Conference on Emerging Trends on Advanced Engineering Research …, 2012
52012
A narrative review of medical image processing by deep learning models: origin to COVID-19
V Mareeswari, R Vijayan, E Sathiyamoorthy, EP Ephzibah
International Journal of Advanced Technology and Engineering Exploration 9 …, 2022
42022
Secure traffic management in cluster environment to handle ddos attack
K Govinda, E Sathiyamoorthy
World Applied Sciences Journal 32 (9), 1828-1834, 2014
42014
Intricacies of an Automatic Text Summarizer
LM Mathews, E Sathiyamoorthy
International Journal of Engineering and Technology (IJET) 5 (3), 2013
42013
An efficient and light weight secure framework for applications of cloud environment using identity encryption method
E Sathiyamoorthy, SS Manivannan
International Journal of Engineering and Technology (IJET) 5, 20932100, 2013
42013
LocPSORank-Prediction of Ranking of Web Services Using Location-Based Clustering and PSO Algorithm
V Mareeswari, E Sathiyamoorthy
International Journal of Web Services Research (IJWSR) 15 (3), 38-60, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20