-
A review on distributed cluster based routing approaches in mobile wireless sensor networks , J Sumathi, RL Velusamy,Journal of Ambient Intelligence and Humanized Computing 12, 835-849 2021
-
Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks , S Priya, S Selvakumar, RL Velusamy, Journal of Ambient Intelligence and Humanized Computing, 1-25 2 2021
-
SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection , NGB Amma, S Selvakumar, RL Velusamy, Intelligent Data Engineering and Analytics, 41-50 1 2021
-
Smart Traffic Navigation System (STNS) to Reduce Travel Time by Integrating Signals from Navigation and Traffic Systems , S Sripranav, A Ravi, K Gautham, RL Velusamy, Smart Trends in Computing and Communications: Proceedings of SmartCom 2020 … 1 2021
-
GSA-RPI: GSA based Rendezvous Point Identification in a two-level cluster based LR-WPAN for uncovering the optimal trajectory of Mobile Data Collection Agent ,S Jayalekshmi, RL Velusamy, Journal of Network and Computer Applications 183, 103048
-
A cluster-based routing strategy using gravitational search algorithm for wsn , A Kavitha, K Guravaiah, RL Velusamy, Journal of Computing Science and Engineering 14 (1), 26-39 2020
-
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism , E Elakkiya, S Selvakumar, RL Velusamy, Journal of Ambient Intelligence and Humanized Computing, 1-16 3 2020
-
SQL injection detection using REGEX classifier , B Kranthikumar, RL Velusamy, Journal of Xi'an University of Architecture & Technology 12 (6), 800-809 3 2020
-
Data collection protocols in wireless sensor networks , K Guravaiah, A Kavitha, RL Velusamy, Wireless Sensor Networks-Design, Deployment and Applications 2 2020
-
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks , NGB Amma, S Selvakumar, RL Velusamy, IEEE Transactions on Network and Service Management 17 (4), 2511-2522 2 2020
-
Detection of phishing attacks using radial basis function network trained for categorical attributes , S Priya, S Selvakumar, RL Velusamy, 2020 11th International Conference on Computing, Communication and … 2 2020
-
CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection , E Elakkiya, S Selvakumar, RL Velusamy, 2020 11th International Conference on Computing, Communication and … 1 2020
-
Simulated annealing and genetic algorithm-based hybrid approach for energy-aware clustered routing in large-range multi-sink wireless sensor networks , A Kavitha, RL Velusamy, International Journal of Ad Hoc and Ubiquitous Computing 35 (2), 96-116 1 2020
-
Internet of things for smart gardening and securing home from fire accidents , K Guravaiah, RL Velusamy, Safety, Security, and Reliability of Robotic Systems, 93-106
-
Correction to: CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks , A Kavitha, K Guravaiah, RL Velusamy, Wireless Personal Communications 115 (2), 1385-1385 2020
-
CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks , A Kavitha, K Guravaiah, RL Velusamy, Wireless Personal Communications 115 (2), 1363-1384 2020
-
Gravitational Search Based Feature Selection for Enhanced Phishing Websites Detection , S Priya, S Selvakumar, RL Velusamy, 2020 2nd International Conference on Innovative Mechanisms for Industry … 2020
-
TEA-CBRP: Distributed cluster head election in MANET by using AHP ,U Venkanna, RL Velusamy, Peer-to-Peer Networking and Applications 9 (1), 159-170
-
Kernel approach for similarity measure in latent fingerprint recognition , S Kumar, RL Velusamy, 2016 International Conference on Emerging Trends in Electrical Electronics …
-
R-salsa: A spam filtering technique for social networking sites , M Agrawal, RL Velusamy, 2016 IEEE Students' Conference on Electrical, Electronics and Computer … 6 2016
-
Unsupervised spam detection in hyves using SALSA , M Agrawal, RL Velusamy, Proceedings of the 4th International Conference on Frontiers in Intelligent … 6 2016
-
Performance Analysis of RFDMRP: River Formation Dynamics based Multi-Hop Routing Protocol in WSNs , K Guravaiah, RL Velusamy, arXiv preprint arXiv:1602.04980 3 2016
-
A cooperative routing for MANET based on distributed trust and energy management , U Venkanna, JK Agarwal, RL Velusamy, Wireless Personal Communications 81 (3), 961-979 2015
-
Identification of influential nodes from social networks based on enhanced degree centrality measure , A Srinivas, RL Velusamy, 2015 IEEE International Advance Computing Conference (IACC), 1179-1184
-
RFDMRP: River formation dynamics based multi-hop routing protocol for data collection in wireless sensor networks , K Guravaiah, RL Velusamy, Procedia Computer Science 54, 31-36 17 2015
-
Optimized local route repair and congestion control in Mobile Ad hoc Network , P Ranjan, RL Velusamy, 2015 International Conference on Computing and Communications Technologies … 9 2015
-
Latent fingerprint preprocessing: Orientation field correction using region wise dictionary , S Kumar, RL Velusamy , 2015 International Conference on Advances in Computing, Communications and …
-
Authentication of Digital Documents Using Secret Key Biometric Watermarking ,V Anita, RL Velusamy, International Journal of Communication Network Security 1 (4), 5-11 2012
-
Information Retrieval from Internet Applications for Digital Forensic , I Mohanty, RL Velusamy, International Journal of Security, Privacy and Trust Management (IJSPTM)
-
Iris recognition systems with reduced storage and high accuracy using Majority Voting and Haar Transform , V Anitha, RL Velusamy,Advances in Computer Science, Engineering and Applications, 813—822
-
Recovery of Live Evidence from Internet Applications , I Mohanty, RL Velusamy, Advances in Computer Science, Engineering and applications 167, 823-834