A survey on security issues in service delivery models of cloud computing S Subashini, V Kavitha Journal of network and computer applications 34 (1), 1-11, 2010 | 4015 | 2010 |
Efficient technique for color image noise reduction C Mythili, V Kavitha The research bulletin of Jordan ACM 2 (3), 41-44, 2011 | 93 | 2011 |
Privacy and Utility Preserving Data Clustering for Data Anonymization and Distribution on Hadoop VK J.Jesu Vedha Nayahi Future Generation Computer Systems, 2017 | 78 | 2017 |
Optimization enabled deep learning‐based ddos attack detection in cloud computing S Balasubramaniam, C Vijesh Joe, TA Sivakumar, A Prasanth, ... International Journal of Intelligent Systems 2023 (1), 2039217, 2023 | 69 | 2023 |
A survey on congestion control techniques in wireless sensor networks DFJ Flora, V Kavitha, M Muthuselvi 2011 international conference on emerging trends in electrical and computer …, 2011 | 64 | 2011 |
Churn prediction of customer in telecom industry using machine learning algorithms V Kavitha, GH Kumar, SM Kumar, M Harish International Journal of Engineering Research & Technology (IJERT) 9 (5 …, 2020 | 62 | 2020 |
A comprehensive survey on approaches to intrusion detection system AJ Deepa, V Kavitha Procedia Engineering 38, 2063-2069, 2012 | 60 | 2012 |
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment V Kavitha Peer-to-Peer Networking and Applications 14 (2), 821-836, 2021 | 49 | 2021 |
Color image segmentation using ERKFCM C Mythili, V Kavitha International Journal of Computer Applications 41 (20), 2012 | 40 | 2012 |
A metadata based storage model for securing data in cloud environment S Subashini, V Kavitha 2011 International Conference on Cyber-Enabled Distributed Computing and …, 2011 | 40 | 2011 |
Feature selection and dwarf mongoose optimization enabled deep learning for heart disease detection S Balasubramaniam, K Satheesh Kumar, V Kavitha, A Prasanth, ... Computational intelligence and neuroscience 2022 (1), 2819378, 2022 | 35 | 2022 |
Morphology based text detection and extraction from complex video scene T Pratheeba, V Kavitha, SR Rajeswari International Journal of Engineering and technology 2 (3), 200-206, 2010 | 33 | 2010 |
A hybrid data anonymization integrated with suppression for preserving privacy in mining multi party data P Deivanai, JJV Nayahi, V Kavitha 2011 International Conference on Recent Trends in Information Technology …, 2011 | 32 | 2011 |
Energy conservation in Cloud data centres by minimizing virtual machines migration through artificial neural network VK A. Radhakrishnan Computing, 1-18., 2016 | 31 | 2016 |
Galactic swarm optimized convolute network and cluster head elected energy-efficient routing protocol in WSN V Kavitha, K Ganapathy Sustainable Energy Technologies and Assessments 52, 102154, 2022 | 25 | 2022 |
Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment KL Neela, V Kavitha Applied Intelligence 53 (4), 4733-4747, 2023 | 24 | 2023 |
Automatic skin tumor detection using online tiger claw region based segmentation–a novel comparative technique A Ashwini, V Kavitha IETE Journal of Research 69 (6), 3095-3103, 2023 | 21 | 2023 |
Rapid background subtraction from video sequences RAT Jenifa, C Akila, V Kavitha 2012 International Conference on Computing, Electronics and Electrical …, 2012 | 21 | 2012 |
A survey on security Issues and vulnerabilities on cloud computing KL Neela, V Kavitha Int. J. Comput. Sci. Eng. Technol 4 (7), 855-860, 2013 | 20 | 2013 |
Neural based steganography V Kavitha, KS Easwarakumar Pacific Rim International Conference on Artificial Intelligence, 429-435, 2004 | 20 | 2004 |