BBAAS: blockchain‐based anonymous authentication scheme for providing secure communication in VANETs A Maria, V Pandi, JD Lazarus, M Karuppiah, MS Christo Security and Communication Networks 2021 (1), 6679882, 2021 | 95 | 2021 |
A decision based asymmetrically trimmed modified winsorized median filter for the removal of salt and pepper noise in images and videos MS Christo, K Vasanth, R Varatharajan Multimedia tools and applications 79 (1), 415-432, 2020 | 68 | 2020 |
Ensuring improved security in medical data using ecc and blockchain technology with edge devices MS Christo, VE Jesi, U Priyadarsini, V Anbarasu, H Venugopal, ... Security and Communication Networks 2021 (1), 6966206, 2021 | 59 | 2021 |
WITHDRAWN: A comparative analysis on plant pathology classification using deep learning architecture–Resnet and VGG19 T Subetha, R Khilar, MS Christo Materials today: proceedings, 2021 | 51 | 2021 |
An efficient data security in medical report using block chain technology MS Christo, P Sarathy, C Priyanka 2019 International Conference on Communication and Signal Processing (ICCSP …, 2019 | 33 | 2019 |
Artificial Intelligence‐Based Security Protocols to Resist Attacks in Internet of Things R Khilar, K Mariyappan, MS Christo, J Amutharaj, T Anitha, T Rajendran, ... Wireless Communications and Mobile Computing 2022 (1), 1440538, 2022 | 31 | 2022 |
WITHDRAWN: Implementation of FANET energy efficient AODV routing protocols for flying ad hoc networks [FEEAODV] K Mariyappan, MS Christo, R Khilar Materials Today: Proceedings, 2021 | 21 | 2021 |
Secure and energy concise route revamp technique in wireless sensor networks SMU Sankar, MS Christo, PSU Priyadarsini Intelligent Automation and Soft Computing 35 (2), 2337-2351, 2023 | 20 | 2023 |
Modelling the mechanical properties of concrete produced with polycarbonate waste ash by machine learning S Sathvik, R Kumar, N Ulloa, P Shakor, MS Ujwal, K Onyelowe, GS Kumar, ... Scientific Reports 14 (1), 11552, 2024 | 11 | 2024 |
Enhancing Rumor Riding protocol in P2P network with Cryptographic puzzle through challenge question method MS Christo, S Meenakshi Computers & Electrical Engineering 65, 122-138, 2018 | 9 | 2018 |
Cloud‐Assisted Privacy‐Preserving Method for Healthcare Using Adaptive Fractional Brain Storm Integrated Whale Optimization Algorithm S Thanga Revathi, A Gayathri, J Kalaivani, MS Christo, D Pelusi, M Azees Security and Communication Networks 2021 (1), 6210054, 2021 | 8 | 2021 |
Predicting the fire-induced structural performance of steel tube columns filled with SFRC-enhanced concrete: using artificial neural networks approach C George, E Zumba, MA Procel Silva, SS Selvan, MS Christo, R Kumar, ... Frontiers in Built Environment 10, 1403460, 2024 | 6 | 2024 |
Enhancing security properties of Rumor Riding protocol under various attacks scenario in P2P network MS Christo, S Meenakshi 2016 international conference on communication and signal processing (ICCSP …, 2016 | 6 | 2016 |
A hybrid network anomaly detection system using glowworm swarm optimization with principal component analysis R Khilar, K Mariyappan, MS Christo, J Amutharaj, T Anitha, ... | 5 | 2021 |
Reliable and authenticated rumor riding protocol for unstructured peer-to-peer network MS Christo, S Meenakshi Indian Journal of Science and Technology 9 (21), 1-9, 2016 | 5 | 2016 |
A Flexible and Verifiable Keyword PIR Scheme for Cloud-Edge-Terminal Collaboration in AIoT H Yang, W Zheng, T Zhang, P Vijayakumar, BB Gupta, V Arya, MS Christo IEEE Internet of Things Journal, 2024 | 4 | 2024 |
Any Bluetooth device can be hacked. Know how? P Muraleedhara, MS Christo, J Jaya, D Yuvasini Cyber Security and Applications 2, 100041, 2024 | 4 | 2024 |
DDoS Detection using Multilayer Perceptron MS Christo, JJ Menandas, M George, SV Nuna 2023 4th International Conference on Electronics and Sustainable …, 2023 | 4 | 2023 |
Android Malware Application Detection Method Based on RGB Image Features in E-Commerce X Li, Y Tang, MS Christo, Z Zhao, Y Li Journal of Internet Technology 23 (6), 1343-1352, 2022 | 4 | 2022 |
An intelligent fuzzy beta reputation model for securing information in P2P health care applications MS Christo, S Meenakshi, R Subhashini BIOMEDICAL RESEARCH-INDIA 28, 2017 | 4 | 2017 |