Managing DDoS attacks on virtual machines by segregated policy management ESP Krishna, E Sandhya, MG Karthik Global Journal of Computer Science and Technology 14 (6), 20-24, 2014 | 18 | 2014 |
Health monitoring system using IoT sensors C Silpa, SS Chakravarthi Journal of Algebraic Statistics 13 (3), 3051-3056, 2022 | 11 | 2022 |
A hybrid spider monkey and hierarchical particle swarm optimization approach for intrusion detection on Internet of Things S Ethala, A Kumarappan Sensors 22 (21), 8566, 2022 | 8 | 2022 |
Smart online examination monitoring system KK Baseer, MJ Pasha, AVRK Reddy, K Rekha, MS Begum Journal of Algebraic Statistics 13 (3), 559-570, 2022 | 7 | 2022 |
Enhancing the Performance of an Intrusion Detection System Using Spider Monkey Optimization in IoT DAK E.Sandhya International Journal of Intelligent Engineering and Systems 14 (6), 2021 | 7 | 2021 |
Investigating Student Learning Process and Predicting Student Performance Using Machine Learning Approaches. E Sandhya, RPR Arava, ES Krishna, KK Baseer International Journal of Early Childhood Special Education 14 (7), 2022 | 5 | 2022 |
Health Monitoring System Using Integration of Cloud and Data Mining Techniques KLP Asadi Srinivasulu, G.M.Chanakya, E Sandhya, A.Ramprakash Reddy HELIX 7 (5), 2047-2052, 2017 | 3 | 2017 |
Selection of Features Using Adaptive Tunicate Swarm Algorithm with Optimized Deep Learning Model for Thyroid Disease Classification SE Jakkulla Pradeep Kumar, Ganesh Karthik Muppagowni, Jayapal Praveen Kumar ... Ingenierie des Systemes d'Information, International Information and …, 2023 | 2 | 2023 |
Using Traditional Machine Learning Algorithms and SMOTE Technique to Estimate Student’s Academic Performance in Higher Education E Sandhya, SKAH Basha, ESP Krishna, V Jyothsna, C Silpa Journal of algebraic statistics 13 (3), 3031-3041, 2022 | 1 | 2022 |
Optimization of Security Policies on Virtual Machines using Flow Differentiator & Zone Manager J Madhulatha, ESP Krishna, E Sandhya (IJCSIT) International Journal of Computer Science and Information …, 2014 | 1 | 2014 |
AN INTEGRATED COMPREHENSIVE SECURITY FRAMEWORK FOR WIRELESS SENSOR NETWORKS V Jyothsna, P Bhasha, E Sandhya, KK Baseer Innovations in Computational Intelligence, Big Data Analytics and Internet …, 2024 | | 2024 |
Intrusion Detection using HRO with Ensemble Learning Models and Comparison B Pydala, NPR Reddy, CR Mohan, E Sandhya, V Jyothsna, KK Baseer 2023 1st International Conference on Optimization Techniques for Learning …, 2023 | | 2023 |
Intrusion Detection System for IoT Networks V Jyothsna, E Sandhya, R Roopa, BDD Nayomi, DK Shareef, P Bhasha 2023 1st International Conference on Optimization Techniques for Learning …, 2023 | | 2023 |
Deep Learning Model for Intrusion Detection in SDN Networks V Jyothsna, E Sandhya, T Swetha, PLK Reddy, B Jyothsna, P Bhasha 2023 1st International Conference on Optimization Techniques for Learning …, 2023 | | 2023 |
Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network R Vatambeti, NC Pradhan, E Sandhya, SR Vinta, V Anbarasu, KV Rao | | 2023 |
Internet of Things DGT Ms. E.Sandhya, Dr. Gowtham Mamidisetti Publisher : Book Rivers ISBN-10 : 9355157487, ISBN-13 : 978-9355157485, 2023 | | 2023 |
Popular Attacks on IoT Layers and its Countermeasures, Security Requirements and Open Issues DA Ms.E.Sandhya International Journal of Advanced Science and Technology 29 (No. 7s), 5191 …, 2020 | | 2020 |
Study On Program Verification Using EFSBI Approach TL P.Joshna , E.Sandhya International Journal of Advanced Research in Computer and Communication …, 2013 | | 2013 |