Cryptographic and Information Security Approaches for Images and Videos S Ramakrishnan CRC Press, 2018 | 57 | 2018 |
Variants of phishing attacks and their detection techniques GJW Kathrine, PM Praise, AA Rose, EC Kalaivani 2019 3rd International Conference on Trends in Electronics and Informatics …, 2019 | 48 | 2019 |
Internet of Things based pest management using natural pesticides for small scale organic gardens R Venkatesan, GJW Kathrine, K Ramalakshmi Journal of Computational and Theoretical Nanoscience 15 (9-10), 2742-2747, 2018 | 43 | 2018 |
Smart card based time efficient authentication scheme for global grid computing JWK Gnanaraj, K Ezra, EB Rajsingh Human-centric Computing and Information Sciences 3, 1-14, 2013 | 37 | 2013 |
Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud AAR Melvin, GJW Kathrine, SS Ilango, S Vimal, S Rho, NN Xiong, Y Nam Transactions on Emerging Telecommunications Technologies 33 (4), e4287, 2022 | 26 | 2022 |
Smart card based remote user authentication schemes:A survey PP G. Jaspher Willsie Kathrine, Dr. A. Kirubakaran International Conference on modelling, Optimisation and Computing 38, 1318-1326, 2012 | 25* | 2012 |
Cloud security mechanisms for data protection : A survey GJWK Allen oomen International Journal of Multimedia and Ubiquitous Engineering 9 (9), 81-90, 2014 | 23* | 2014 |
A quest for best: A detailed comparison between drakvuf-vmi-based and cuckoo sandbox-based technique for dynamic malware analysis AAR Melvin, GJW Kathrine Intelligence in Big Data Technologies—Beyond the Hype: Proceedings of …, 2021 | 16 | 2021 |
IOT based smart irrigation system for home based organic garden M Karunakanth, R Venkatesan, GJW Kathrine International Journal of Pure and Applied Mathematics 119 (12), 16193-16199, 2018 | 15 | 2018 |
Efficient deep learning-based cyber-attack detection for internet of medical things devices A Judith, GJW Kathrine, S Silas Engineering Proceedings 59 (1), 139, 2023 | 12 | 2023 |
Job scheduling algorithms in grid computing–survey GJW Kathrine, MU Ilaghi International Journal of Engineering Research & Technology 1 (7), 1-5, 2012 | 12 | 2012 |
Biometric authentication and authorization system for grid security GJW Kathrine, E Kirubakaran Int. J. Hybrid Inf. Technol 4, 16, 2011 | 11 | 2011 |
Support vector machine for classification of autism spectrum disorder based on abnormal structure of corpus callosum S Jebapriya, D Shibin, JW Kathrine, N Sundar International Journal of Advanced Computer Science and Applications 10 (9), 2019 | 10 | 2019 |
A study about detecting ransomware by using different algorithms A Bertia, SB Xavier, GJW Kathrine, GM Palmer 2022 International Conference on Applied Artificial Intelligence and …, 2022 | 9 | 2022 |
Comparative analysis of subdomain enumeration tools and static code analysis GJ Kathrine, RT Baby, V Ebenzer ISSN (Online), 2454-7190, 2020 | 9 | 2020 |
A secure framework for enhancing user authentication in cloud environment using biometrics GJW Kathrine 2017 International Conference on Signal Processing and Communication (ICSPC …, 2017 | 9 | 2017 |
Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security GJW Kathrine, E Kirubakaran International Journal of Computer Applications 30 (5), 13-20, 2011 | 9 | 2011 |
Smart Grid Protection with AI and Cryptographic Security DK Kumar, KK Reddy, GJW Kathrine 2024 3rd International Conference on Applied Artificial Intelligence and …, 2024 | 8 | 2024 |
Intrusion Detection and Prevention System to Analyse and Prevent Malware using Machine Learning V Ebenezer, R Devassy, GJW Kathrine 2023 7th International Conference on Trends in Electronics and Informatics …, 2023 | 8 | 2023 |
Hybrid cryptographic algorithm to secure internet of things GA Nikitha, GJW Kathrine, CR Duthie, V Ebenezer, S Silas 2023 7th International Conference on Intelligent Computing and Control …, 2023 | 7 | 2023 |