Securing smart cities using blockchain technology K Biswas, V Muthukkumarasamy 2016 IEEE 18th international conference on high performance computing and …, 2016 | 706 | 2016 |
Security of self-organizing networks: MANET, WSN, WMN, VANET ASK Pathan CRC press, 2016 | 348 | 2016 |
Blockchain based wine supply chain traceability system K Biswas, V Muthukkumarasamy, WL Tan Future Technologies Conference (FTC) 2017, 56-62, 2017 | 216 | 2017 |
On the security of permutation-only image encryption schemes A Jolfaei, XW Wu, V Muthukkumarasamy IEEE transactions on information forensics and security 11 (2), 235-246, 2015 | 187 | 2015 |
A survey on data leakage prevention systems S Alneyadi, E Sithirasenan, V Muthukkumarasamy Journal of Network and Computer Applications 62, 137-152, 2016 | 181 | 2016 |
The state of the art in intrusion prevention and detection ASK Pathan CRC press, 2014 | 158 | 2014 |
Off-line signature verification using enhanced modified direction features in conjunction with neural classifiers and support vector machines V Nguyen, M Blumenstein, V Muthukkumarasamy, G Leedham Ninth International Conference on Document Analysis and Recognition (ICDAR …, 2007 | 105 | 2007 |
Flow-based anomaly detection using neural network optimized with GSA algorithm Z Jadidi, V Muthukkumarasamy, E Sithirasenan, M Sheikhan 2013 IEEE 33rd international conference on distributed computing systems …, 2013 | 92 | 2013 |
Off-line signature verification based on the modified direction feature S Armand, M Blumenstein, V Muthukkumarasamy 18th International Conference on Pattern Recognition (ICPR'06) 4, 509-512, 2006 | 86 | 2006 |
Securing wireless mesh networks S Glass, M Portmann, V Muthukkumarasamy IEEE Internet Computing 12 (4), 30-36, 2008 | 67 | 2008 |
Healthcare sensor networks: challenges toward practical implementation DTH Lai, M Palaniswami, R Begg CRC press, 2011 | 64 | 2011 |
Cross-chain interoperability among blockchain-based systems using transactions B Pillai, K Biswas, V Muthukkumarasamy The Knowledge Engineering Review 35, e23, 2020 | 62 | 2020 |
An encryption scheme using chaotic map and genetic operations for wireless sensor networks K Biswas, V Muthukkumarasamy, K Singh IEEE Sensors Journal 15 (5), 2801-2809, 2014 | 62 | 2014 |
COVID-19 contact tracing: challenges and future directions MJM Chowdhury, MS Ferdous, K Biswas, N Chowdhury, ... Ieee Access 8, 225703-225729, 2020 | 59 | 2020 |
GAME: A generic automated marking environment for programming assessment M Blumenstein, S Green, A Nguyen, V Muthukkumarasamy International Conference on Information Technology: Coding and Computing …, 2004 | 57 | 2004 |
Off-line signature verification using the enhanced modified direction feature and neural-based classification S Armand, M Blumenstein, V Muthukkumarasamy The 2006 IEEE International Joint Conference on Neural Network Proceedings …, 2006 | 54 | 2006 |
Trust-based cluster head selection algorithm for mobile ad hoc networks R Ferdous, V Muthukkumarasamy, E Sithirasenan 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 51 | 2011 |
Detecting man-in-the-middle and wormhole attacks in wireless mesh networks SM Glass, V Muthukkumarasamy, M Portmann 2009 International Conference on Advanced Information Networking and …, 2009 | 49 | 2009 |
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic M Usman, V Muthukkumarasamy, XW Wu IEEE Transactions on Consumer Electronics 61 (2), 197-205, 2015 | 48 | 2015 |
Off-line signature verification based on fusion of grid and global features using neural networks DR Shashi Kumar, KB Raja, RK Chhotaray, S Pattanaik International Journal of Engineering Science and Technology 2 (12), 7035-7044, 2010 | 48 | 2010 |