Identification of influential nodes from social networks based on Enhanced Degree Centrality Measure A Srinivas, RL Velusamy 2015 IEEE international advance computing conference (IACC), 1179-1184, 2015 | 59 | 2015 |
A cooperative routing for MANET based on distributed trust and energy management U Venkanna, JK Agarwal, RL Velusamy Wireless Personal Communications 81, 961-979, 2015 | 54 | 2015 |
Multi-constraint QoS Unicast Routing Using Genetic Algorithm (MURUGA) R Leela, S Selvakumar Applied Soft Computing Journal 11, 1753-1761, 2011 | 48 | 2011 |
A review on distributed cluster based routing approaches in mobile wireless sensor networks J Sumathi, RL Velusamy Journal of Ambient Intelligence and Humanized Computing 12 (1), 835-849, 2021 | 44 | 2021 |
Prototype of home monitoring device using Internet of Things and river formation dynamics-based multi-hop routing protocol (RFDHM) K Guravaiah, RL Velusamy IEEE Transactions on Consumer Electronics 65 (3), 329-338, 2019 | 43 | 2019 |
Black hole attack and their counter measure based on trust management in manet: A survey U Venkanna, RL Velusamy 3rd international conference on advances in recent technologies in …, 2011 | 35 | 2011 |
Energy efficient clustering algorithm using RFD based multi-hop communication in wireless sensor networks K Guravaiah, R Leela Velusamy Wireless Personal Communications 95, 3557-3584, 2017 | 30 | 2017 |
TEA-CBRP: Distributed cluster head election in MANET by using AHP U Venkanna, R Leela Velusamy Peer-to-Peer Networking and Applications 9, 159-170, 2016 | 22 | 2016 |
RFDMRP: River formation dynamics based multi-hop routing protocol for data collection in wireless sensor networks K Guravaiah, RL Velusamy Procedia Computer Science 54, 31-36, 2015 | 22 | 2015 |
A statistical approach for detection of denial of service attacks in computer networks NGB Amma, S Selvakumar, RL Velusamy IEEE Transactions on Network and Service Management 17 (4), 2511-2522, 2020 | 21 | 2020 |
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism E Elakkiya, S Selvakumar, R Leela Velusamy Journal of Ambient Intelligence and Humanized Computing 12 (10), 9287-9302, 2021 | 20 | 2021 |
A cluster-based routing strategy using gravitational search algorithm for wsn A Kavitha, K Guravaiah, RL Velusamy Journal of Computing Science and Engineering 14 (1), 26-39, 2020 | 16 | 2020 |
Vehicle monitoring using internet of things K Guravaiah, RG Thivyavignesh, RL Velusamy Proceedings of the 1st International Conference on Internet of Things and …, 2017 | 16 | 2017 |
SQL injection detection using REGEX classifier B Kranthikumar, RL Velusamy Journal of Xi'an University of Architecture & Technology 12 (6), 800-809, 2020 | 15 | 2020 |
BEACH: Balanced Energy and Adaptive Cluster Head Selection Algorithm for Wireless Sensor Networks. K Guravaiah, RL Velusamy Adhoc & Sensor Wireless Networks 42, 2018 | 15 | 2018 |
Simulated annealing and genetic algorithm-based hybrid approach for energy-aware clustered routing in large-range multi-sink wireless sensor networks A Kavitha, RL Velusamy International Journal of Ad Hoc and Ubiquitous Computing 35 (2), 96-116, 2020 | 13 | 2020 |
Entropy based mitigation of distributed-denial-of-service (ddos) attack on control plane in software-defined-network (sdn) SK Yadav, P Suguna, RL Velusamy 2019 10th International Conference on Computing, Communication and …, 2019 | 13 | 2019 |
Authentication of Digital Documents Using Secret Key Biometric Watermarking V Anita, RL Velusamy International Journal of Communication Network Security 1 (4), 5-11, 2012 | 13 | 2012 |
Kernel approach for similarity measure in latent fingerprint recognition S Kumar, RL Velusamy 2016 International Conference on Emerging Trends in Electrical Electronics …, 2016 | 11 | 2016 |
Optimized local route repair and congestion control in Mobile Ad hoc Network P Ranjan, RL Velusamy 2015 International Conference on Computing and Communications Technologies …, 2015 | 11 | 2015 |