A secure triple level encryption method using cryptography and steganography S Usha, GAS Kumar, K Boopathybagan Proceedings of 2011 International Conference on Computer Science and Network …, 2011 | 65 | 2011 |
A security model to protect the isolation of medical data in the cloud using hybrid cryptography S Gadde, J Amutharaj, S Usha Journal of Information Security and Applications 73, 103412, 2023 | 40 | 2023 |
Prevention Of Cross-Site Scripting Attacks (XSS) On Web Applications In The Client Side S Shalini, S Usha International Journal of Computer Science 8, 2011 | 35 | 2011 |
Impact of cloud security in digital twin N Susila, A Sruthi, S Usha Advances in Computers 117 (1), 247-263, 2020 | 27 | 2020 |
Co operative Approach to detect misbehaving nodes in MANET using multi hop acknowledgement scheme RS Usha S. International Conference on Advances in Computing, Control and …, 2009 | 25 | 2009 |
Selection mechanism of micro-services orchestration vs. choreography N Singhal, U Sakthivel, P Raj International Journal of Web & Semantic Technology (IJWesT) 10 (1), 25, 2019 | 22 | 2019 |
MSoC: Multi-scale optimized clustering for energy preservation in wireless sensor network AP Jyothi, S Usha Wireless Personal Communications 105 (4), 1309-1328, 2019 | 16 | 2019 |
Chronic liver disease prediction analysis based on the impact of life quality attributes D Sivakumar, M Varchagall, LG Ambika, S Usha International Journal of Recent Technology and Engineering (IJRTE) 7 (6S5 …, 2019 | 16 | 2019 |
Trends and technologies used for mitigating energy efficiency issues in wireless sensor network AP Jyothi, U Sakthivel International Journal of Computer Applications 111 (3), 32-40, 2015 | 15 | 2015 |
Human activity recognition using android smartphone J Usharani, U Sakthivel Proceedings of the 1st International Conference on Innovations in Computing …, 2016 | 12 | 2016 |
Multi Hop Acknowledgement Scheme based Selfish Node Detection in Mobile Ad hoc Networks S Usha, S Radha | 10 | 2011 |
A collective network arbitration protocol to detect MAC misbehavior in MANETS S Usha, S Radha 2010 International Conference on Wireless Communication and Sensor Computing …, 2010 | 10 | 2010 |
Eigenvalues of centrosymmetric matrices N Muthiyalu, S Usha Computing (Wien. Print) 48 (2), 213-218, 1992 | 10 | 1992 |
Interstellar‐based topology control scheme for optimal clustering performance in WSN AP Jyothi, S Usha International Journal of Communication Systems 33 (8), e4350, 2020 | 9 | 2020 |
Vehicular ad hoc network based pollution monitoring in urban areas RS Mohan, R Sachin, U Sakthivel 2012 Fourth International Conference on Computational Intelligence and …, 2012 | 9 | 2012 |
Cloud multimedia data security by optimization-assisted cryptographic technique S Gadde, J Amutharaj, S Usha International Journal of Image and Graphics 24 (01), 2450010, 2024 | 8 | 2024 |
RESTful web services composition & performance evaluation with different databases U Sakthivel, N Singhal, P Raj 2017 International Conference on Electrical, Electronics, Communication …, 2017 | 8 | 2017 |
CFCLP-a novel Clustering Framework based on Combinatorial approach and Linear Programming in Wireless Sensor Network AP Jyothi, U Sakthivel 2017 2nd International Conference on Computing and Communications …, 2017 | 7 | 2017 |
Misbehaving node detection in MANETs using multi hop acknowledgement scheme radha usha Journal of computer science 3, 723-730, 2011 | 7* | 2011 |
E Eyanthra perspiration based drunken driving prevention system’ s.usha and aravind an International Conference on New Trends in Information Science and Service …, 2010 | 7 | 2010 |