2021
A review on distributed cluster based routing approaches in mobile wireless sensor networks , J Sumathi, RL Velusamy,Journal of Ambient Intelligence and Humanized Computing 12, 835-849 2021
Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks , S Priya, S Selvakumar, RL Velusamy, Journal of Ambient Intelligence and Humanized Computing, 1-25 2 2021
SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection , NGB Amma, S Selvakumar, RL Velusamy, Intelligent Data Engineering and Analytics, 41-50 1 2021
Smart Traffic Navigation System (STNS) to Reduce Travel Time by Integrating Signals from Navigation and Traffic Systems , S Sripranav, A Ravi, K Gautham, RL Velusamy, Smart Trends in Computing and Communications: Proceedings of SmartCom 2020 … 1 2021
GSA-RPI: GSA based Rendezvous Point Identification in a two-level cluster based LR-WPAN for uncovering the optimal trajectory of Mobile Data Collection Agent ,S Jayalekshmi, RL Velusamy, Journal of Network and Computer Applications 183, 103048
2020
A cluster-based routing strategy using gravitational search algorithm for wsn , A Kavitha, K Guravaiah, RL Velusamy, Journal of Computing Science and Engineering 14 (1), 26-39 2020
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism , E Elakkiya, S Selvakumar, RL Velusamy, Journal of Ambient Intelligence and Humanized Computing, 1-16 3 2020
SQL injection detection using REGEX classifier , B Kranthikumar, RL Velusamy, Journal of Xi'an University of Architecture & Technology 12 (6), 800-809 3 2020
Data collection protocols in wireless sensor networks , K Guravaiah, A Kavitha, RL Velusamy, Wireless Sensor Networks-Design, Deployment and Applications 2 2020
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks , NGB Amma, S Selvakumar, RL Velusamy, IEEE Transactions on Network and Service Management 17 (4), 2511-2522 2 2020
Detection of phishing attacks using radial basis function network trained for categorical attributes , S Priya, S Selvakumar, RL Velusamy, 2020 11th International Conference on Computing, Communication and … 2 2020
CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection , E Elakkiya, S Selvakumar, RL Velusamy, 2020 11th International Conference on Computing, Communication and … 1 2020
Simulated annealing and genetic algorithm-based hybrid approach for energy-aware clustered routing in large-range multi-sink wireless sensor networks , A Kavitha, RL Velusamy, International Journal of Ad Hoc and Ubiquitous Computing 35 (2), 96-116 1 2020
Internet of things for smart gardening and securing home from fire accidents , K Guravaiah, RL Velusamy, Safety, Security, and Reliability of Robotic Systems, 93-106
Correction to: CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks , A Kavitha, K Guravaiah, RL Velusamy, Wireless Personal Communications 115 (2), 1385-1385 2020
CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks , A Kavitha, K Guravaiah, RL Velusamy, Wireless Personal Communications 115 (2), 1363-1384 2020
Gravitational Search Based Feature Selection for Enhanced Phishing Websites Detection , S Priya, S Selvakumar, RL Velusamy, 2020 2nd International Conference on Innovative Mechanisms for Industry … 2020
2019
Prototype of home monitoring device using Internet of Things and river formation dynamics-based multi-hop routing protocol (RFDHM) , K Guravaiah, RL Velusamy, IEEE Transactions on Consumer Electronics 65 (3), 329-338
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN) , SK Yadav, P Suguna, RL Velusamy, 2019 10th International Conference on Computing, Communication and … 5 2019
2018
BEACH: Balanced Energy and Adaptive Cluster Head Selection Algorithm for Wireless Sensor Networks. , K Guravaiah, RL Velusamy, Adhoc & Sensor Wireless Networks 42 2018
PRISMO: Priority Based Spam Detection Using Multi Optimization , M Agrawal, RL Velusamy, International Conference on Big Data Analytics, 392-401 2
2017
Energy-efficient clustering algorithm using RFD based multi-hop communication in wireless sensor networks , K Guravaiah, RL Velusamy, Wireless Personal Communications 95 (4), 3557-3584 24 2017
Vehicle monitoring using internet of things , K Guravaiah, RG Thivyavignesh, RL Velusamy, Proceedings of the 1st International Conference on Internet of Things and … 2017
Cooperative routing in mobile ad hoc networks using fuzzy logic , U Venkanna, RL Velusamy, International Journal of Ad Hoc and Ubiquitous Computing 25 (3), 147-162 3
2016
TEA-CBRP: Distributed cluster head election in MANET by using AHP ,U Venkanna, RL Velusamy, Peer-to-Peer Networking and Applications 9 (1), 159-170
Kernel approach for similarity measure in latent fingerprint recognition , S Kumar, RL Velusamy, 2016 International Conference on Emerging Trends in Electrical Electronics …
R-salsa: A spam filtering technique for social networking sites , M Agrawal, RL Velusamy, 2016 IEEE Students' Conference on Electrical, Electronics and Computer … 6 2016
Unsupervised spam detection in hyves using SALSA , M Agrawal, RL Velusamy, Proceedings of the 4th International Conference on Frontiers in Intelligent … 6 2016
Performance Analysis of RFDMRP: River Formation Dynamics based Multi-Hop Routing Protocol in WSNs , K Guravaiah, RL Velusamy, arXiv preprint arXiv:1602.04980 3 2016
2015
A cooperative routing for MANET based on distributed trust and energy management , U Venkanna, JK Agarwal, RL Velusamy, Wireless Personal Communications 81 (3), 961-979 2015
Identification of influential nodes from social networks based on enhanced degree centrality measure , A Srinivas, RL Velusamy, 2015 IEEE International Advance Computing Conference (IACC), 1179-1184
RFDMRP: River formation dynamics based multi-hop routing protocol for data collection in wireless sensor networks , K Guravaiah, RL Velusamy, Procedia Computer Science 54, 31-36 17 2015
Optimized local route repair and congestion control in Mobile Ad hoc Network , P Ranjan, RL Velusamy, 2015 International Conference on Computing and Communications Technologies … 9 2015
Latent fingerprint preprocessing: Orientation field correction using region wise dictionary , S Kumar, RL Velusamy , 2015 International Conference on Advances in Computing, Communications and …
2014
Route discovery in Mobile Ad hoc Network using an optimum angle selection based approach, P Ranjan, RL Velusamy, 2014 International Conference on Computer and Communication Technology … 2 2014
Reward based cooperative routing in Mobile Ad hoc Network by using Markov Decision Process , U Venkanna, RL Velusamy, 2014 Recent Advances in Engineering and Computational Sciences (RAECS), 1-6 2014
2013
Mitigating the attacks on recommendation trust model for mobile ad hoc networks , U Venkanna, RL Velusamy, Proc. ERCICA, 123-130 7 2013
Extraction of HTTP messages for retrieval of live evidence , I Mohanty, RL Velusamy, 2013 International Conference on Recent Trends in Information Technology … 2013
2012
Authentication of Digital Documents Using Secret Key Biometric Watermarking ,V Anita, RL Velusamy, International Journal of Communication Network Security 1 (4), 5-11 2012
Information Retrieval from Internet Applications for Digital Forensic , I Mohanty, RL Velusamy, International Journal of Security, Privacy and Trust Management (IJSPTM)
Iris recognition systems with reduced storage and high accuracy using Majority Voting and Haar Transform , V Anitha, RL Velusamy,Advances in Computer Science, Engineering and Applications, 813—822
Recovery of Live Evidence from Internet Applications , I Mohanty, RL Velusamy, Advances in Computer Science, Engineering and applications 167, 823-834
2011
Multi-constraint QoS Unicast Routing Using Genetic Algorithm (MURUGA) , R Leela, S Selvakumar, Applied Soft Computing Journal 11, 1753-1761 2011
Blackhole attack and their countermeasure based on trust management in manet: A survey , U Venkanna, RL Velusamy, third International Conference on Advances in Recent Technologies in 2011
2010
Genetic algorithm approach to dynamic multiconstraint multipath QoS routing algorithm for IP networks R Leela, S Selvakumar, International Journal of Communication Networks and Distributed Systems 2010
Dynamic multi constraint multi path QoS routing algorithm (DMCMPRA) R Leela, S Selvakumar, The International Journal of Computers and Applications 32 (3), 1206-1212
Dynamic multi constraint multi path QoS routing algorithm (DMCMPRA) R Leela, S Selvakumar, Proceedings of the Eighth IASTED International Conference 621, 135
2009
Qos Routing Using Genetic Algorithm (QoSGA) , R Leela, S Selvakumar, International Journal of Computer and Electrical Engineering (IJCEE) 1
Genetic algorithm approach to dynamic multi constraint multi path QoS routing algorithm for IP networks (GA-DMCMPRA) , R Leela, S Selvakumar, Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First … 2009
2008
Multi Constraint Routing for MANETs using Genetic Algorithm (MRMGA), L Velusamy R, S Selvakumar, International Conference on Communications Convergence and Broadband … 2008
A Call-Graph Profiler for GNU Octave M Annamalai, L Velusamy, arXiv preprint arXiv:0810.3468 2008
2006
Octave-GTK: A GTK binding for GNU Octave M Annamalai, H Kumar, L Velusamy, Journals of Software Maintenance and Evolution: Research and Practice 11, 1-11 3 2006