Works by Kumar, S. V. N. Santhosh
Results: 23
Multi-tier block truncation coding model using genetic auto encoders for gray scale images.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 29, p. 42621, doi. 10.1007/s11042-022-13475-x
- By:
- Publication type:
- Article
Enriched energy optimized LEACH protocol for efficient data transmission in wireless sensor network.
- Published in:
- Wireless Networks (10220038), 2025, v. 31, n. 1, p. 825, doi. 10.1007/s11276-024-03802-5
- By:
- Publication type:
- Article
An efficient group signature based certificate less verification scheme for vehicular ad-hoc network.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 5, p. 3269, doi. 10.1007/s11276-024-03709-1
- By:
- Publication type:
- Article
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 3, p. 1493, doi. 10.1007/s11276-023-03603-2
- By:
- Publication type:
- Article
An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 1, p. 335, doi. 10.1007/s11276-023-03473-8
- By:
- Publication type:
- Article
Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 1, p. 209, doi. 10.1007/s11276-023-03470-x
- By:
- Publication type:
- Article
LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 1, p. 151, doi. 10.1007/s11276-023-03459-6
- By:
- Publication type:
- Article
A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs.
- Published in:
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-89208-5
- By:
- Publication type:
- Article
Smart Prediction and Monitoring of Waste Disposal System Using IoT and Cloud for IoT Based Smart Cities.
- Published in:
- Wireless Personal Communications, 2022, v. 122, n. 1, p. 243, doi. 10.1007/s11277-021-08897-z
- By:
- Publication type:
- Article
An Energy Efficient Clustered Gravitational and Fuzzy Based Routing Algorithm in WSNs.
- Published in:
- Wireless Personal Communications, 2021, v. 116, n. 1, p. 61, doi. 10.1007/s11277-020-07705-4
- By:
- Publication type:
- Article
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01867-9
- By:
- Publication type:
- Article
PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 5, p. 3049, doi. 10.1007/s12083-024-01726-7
- By:
- Publication type:
- Article
HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 5, p. 2609, doi. 10.1007/s12083-024-01708-9
- By:
- Publication type:
- Article
A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 3, p. 1442, doi. 10.1007/s12083-024-01636-8
- By:
- Publication type:
- Article
A comprehensive survey on communication techniques for the realization of intelligent transportation systems in IoT based smart cities.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 3, p. 1263, doi. 10.1007/s12083-024-01627-9
- By:
- Publication type:
- Article
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 1, p. 89, doi. 10.1007/s12083-023-01572-z
- By:
- Publication type:
- Article
Retraction Note: Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 21, p. 16483, doi. 10.1007/s00500-020-04955-z
- By:
- Publication type:
- Article
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 1, p. 199, doi. 10.1007/s10207-023-00737-4
- By:
- Publication type:
- Article
Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 7, p. 4513, doi. 10.1007/s11276-021-02748-2
- By:
- Publication type:
- Article
Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 6, p. 3873, doi. 10.1007/s11276-021-02660-9
- By:
- Publication type:
- Article
Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 4, p. 1343, doi. 10.1007/s11276-017-1549-3
- By:
- Publication type:
- Article
A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of Things.
- Published in:
- Computational Intelligence & Neuroscience, 2023, v. 2023, p. 1, doi. 10.1155/2023/8981988
- By:
- Publication type:
- Article