Machine learning in automatic speech recognition: A survey J Padmanabhan, MJ Johnson Premkumar IETE Technical Review 32 (4), 240-251, 2015 | 180 | 2015 |
Leveraging SDN to Conserve Energy in WSN-An Analysis F Jayashree, P. and Infant Princy 3rd International Conference on Signal Processing, Communication and …, 2015 | 48* | 2015 |
Using random forests for network-based anomaly detection at active routers G Prashanth, V Prashanth, P Jayashree, N Srinivasan 2008 International Conference on Signal Processing, Communications and …, 2008 | 39 | 2008 |
An improved database synchronization mechanism for mobile data using software-defined networking control K Kottursamy, G Raja, J Padmanabhan, V Srinivasan Computers & Electrical Engineering 57, 93-103, 2017 | 27 | 2017 |
Scalable and distributed detection analysis on wormhole links in wireless sensor networks for networked systems J Padmanabhan, V Manickavasagam IEEE Access 6, 1753-1763, 2017 | 19 | 2017 |
A mobility optimized SPRT based distributed security solution for replica node detection in mobile sensor networks V Manickavasagam, J Padmanabhan Ad hoc networks 37, 140-152, 2016 | 14 | 2016 |
Reduced overhead frequent user authentication in EAP-dependent broadband wireless networks G Raja, SB Mary Baskaran, D Ghosal, J Padmanabhan Mobile Networks and Applications 21, 523-538, 2016 | 11 | 2016 |
Distributed Trust Node Selection for Secure Group Communication in MANET T Jenitha, P Jayashree Fourth International Conference on Advances in Computing and Communications …, 2014 | 10 | 2014 |
A proactive statistical defense solution for DDoS attacks in active networks P Jayashree, KS Easwarakumar, V Anandharaman, K Aswin 2008 First International Conference on Emerging Trends in Engineering and …, 2008 | 10 | 2008 |
A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs Jayashree Padmanabhan,Tamil Selvan R S, Kumaresh P, Vigneswaran P Communications in Computer and Information Science 193, 541-548, 2011 | 8* | 2011 |
A Payload driven Security model for flooding attacks in Active networks P Jayashree, KS Easwarakumar, D Radhakrishnan, N Lakshmanan, ... 2009 IEEE International Advance Computing Conference, 934-939, 2009 | 6 | 2009 |
Social network mining for predicting users’ credibility with optimal feature selection P Jayashree, K Laila, K Santhosh Kumar, A Udayavannan Intelligent Sustainable Systems: Proceedings of ICISS 2021, 361-373, 2022 | 5 | 2022 |
Fusion of radiological images of Glioblastoma Multiforme using weighted average and maximum selection method V Brindha, P Jayashree 2019 11th international conference on advanced computing (ICoAC), 328-332, 2019 | 5 | 2019 |
Trust based traffic monitoring approach for preventing denial of service attacks J Padmanabhan, KS Easwarakumar, H S Proceedings of the 2nd international conference on Security of information …, 2009 | 5 | 2009 |
An effective defense cum prevention of ddos attacks in active networks using attribute trees P Jayashree, KS Easwarakumar Ubiquitous Computing and Communication Journal (UCCJ), 2008 | 5 | 2008 |
Smart assistive technologies for aging society: Requirements, response and reality P Jayashree, S Shrinidhi, V Aishwarya, A Sravanthi 2016 Eighth International Conference on Advanced Computing (ICoAC), 111-116, 2017 | 4 | 2017 |
Effective ensemble dimensionality reduction approach using denoising autoencoder for intrusion detection system S Prabu, J Padmanabhan, G Bala Intelligent Sustainable Systems: Proceedings of ICISS 2021, 273-285, 2022 | 3 | 2022 |
DoS Attack Inference Using Traffic Wave Analysis P Jayashree, T Aravinth, SA Kumar, SKR Manikandan CCIS, 171-179, 2010 | 3 | 2010 |
User behaviour trust model to defend denial of service attacks in distributed computational environments P Jayashree, KS Easwarakumar International Journal of Communication Networks and Distributed Systems 5 (3 …, 2010 | 3 | 2010 |
Network anomaly detector system for active networks P Jayashree, KS Easwarakumar international journal of imaging science and engineering (ijise), 2008 | 3 | 2008 |