Segui
Dr. S Maria Celestin  Vigila
Dr. S Maria Celestin Vigila
Noorul Islam Center for Higher Education
Email verificata su niuniv.com
Titolo
Citata da
Citata da
Anno
Implementation of text based cryptosystem using elliptic curve cryptography
SMC Vigila, K Muneeswaran
2009 First international conference on advanced computing, 82-85, 2009
912009
Intrusion detection system: Classification and techniques
SS Soniya, SMC Vigila
2016 International Conference on Circuit, Power and Computing Technologies …, 2016
332016
Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications.
SMC Vigila, K Muneeswaran
Int. J. Netw. Secur. 14 (4), 236-242, 2012
252012
Cluster head selection algorithm for MANETs using hybrid particle swarm optimization-genetic algorithm
F Hamza, SMC Vigila
International Journal of Computer Networks and Applications 8 (2), 119-129, 2021
212021
Fuzzy based intrusion detection system in MANET
CE Singh, SMC Vigila
Measurement: Sensors 26, 100578, 2023
202023
A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network
S Soniya. S, MC Vigila. S
International Journal of Adaptive Control and Signal Processing 36 (5), 1060 …, 2022
202022
F-CAPSO: Fuzzy chaos adaptive particle swarm optimization for energy-efficient and secure data transmission in MANET
MR Jose, SMC Vigila
Expert Systems with Applications 234, 120944, 2023
182023
An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CP‐ABE Using ECC Scheme for Patient Health Record
F Sammy, SMC Vigila
Security and communication networks 2022 (1), 8685273, 2022
152022
Review of Machine Learning-Based Intrusion Detection Techniques for MANETs
F Hamza, S Maria Celestin Vigila
Computing and Network Sustainability: Proceedings of IRSCNS 2018, 367-374, 2019
132019
Hiding of Confidential Data in Spatial Domain Images using Image Interpolation.
SMC Vigila, K Muneeswaran
Int. J. Netw. Secur. 17 (6), 722-727, 2015
132015
Key generation based on elliptic curve over finite prime field
SMC Vigila, K Muneeswaran
International Journal of Electronic Security and Digital Forensics 4 (1), 65-81, 2012
132012
WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services.
C Edwin Singh, SM Celestin Vigila
Intelligent Automation & Soft Computing 35 (2), 2023
122023
Elliptic curve based key generation for symmetric encryption
SMC Vigila, K Muneeswaran
2011 International Conference on Signal Processing, Communication, Computing …, 2011
122011
A new elliptic curve cryptosystem for securing sensitive data applications
SMC Vigila, K Muneeswaran
International Journal of Electronic Security and Digital Forensics 5 (1), 11-24, 2013
112013
A new diffusion and substitution based cryptosystem for securing medical image applications
L Mancy, SMC Vigila
International Journal of Electronic Security and Digital Forensics, 2018
92018
Biometric security system over finite field for mobile applications
SAMC Vigila, K Muneeswaran, WTBA Antony
IET Information Security 9 (2), 119-126, 2015
92015
A comparative analysis on cloud data security
S Varghese, SMC Vigila
2015 Global Conference on Communication Technologies (GCCT), 507-510, 2015
82015
An investigation of machine learning-based intrusion detection system in mobile ad hoc network
CE Singh, SMC Vigila
International Journal of Intelligent Engineering Informatics 11 (1), 54-70, 2023
72023
A varied approach to attribute based access model for secure storage in cloud
S Varghese, SMC Vigila
2017 International Conference on Innovations in Information, Embedded and …, 2017
72017
An energy-efficient cluster head selection in MANETs using emperor penguin optimization fuzzy genetic algorithm
F Hamza, SMC Vigila
Proceedings of International Conference on Recent Trends in Computing: ICRTC …, 2023
62023
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20