Showing
1 - 7
results of
7
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Priyan, M.K.
Search Results - Priyan, M.K.
Showing
1 - 7
results of
7
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
A bonded channel in cognitive wireless body area network based on IEEE 802.15.6 and internet of things
by
Niaz, Fahim
,
Khalid, Muhammad
,
Ullah, Zahid
,
Aslam, Nauman
,
Raza, Mohsin
,
Priyan, M.K.
Published in
Computer communications
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis
by
Varatharajan, R.
,
Manogaran, Gunasekaran
,
Priyan, M. K.
,
Balaş, Valentina E.
,
Barna, Cornel
Published in
Multimedia tools and applications
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
3
Loading…
Fuzzy Based Intrusion Detection Systems in MANET
by
Balan, E. Vishnu
,
Priyan, M.K.
,
Gokulnath, C.
,
Devi, G. Usha
Get full text
Items that this one cites
Items that cite this one
Conference Proceeding
Save to List
Saved in:
4
Loading…
WITHDRAWN: Artificial intelligence email automater and insights generator of credit card customers based on unsupervised learning
by
Sivabalakrishnan, M.
,
Boopesh, S.
,
Priyan, M.K.
,
Jeeva, S.
,
Vigneshwaran, P.
,
Islabudeen, M.
Published in
Materials today : proceedings
Get full text
Items that this one cites
Article
Save to List
Saved in:
5
Loading…
Preservation of privacy in data mining by using PCA based perturbation technique
by
Gokulnath, C.
,
Priyan, M.K.
,
Balan, E. Vishnu
,
Rama Prabha, K. P.
,
Jeyanthi, R.
Request full text
Conference Proceeding
Save to List
Saved in:
6
Loading…
Hybrid architecture with misuse and anomaly detection techniques for wireless networks
by
Balan, E.Vishnu
,
Priyan, M.K.
,
Gokulnath, C.
,
Usha Devi, G.
Request full text
Items that cite this one
Conference Proceeding
Save to List
Saved in:
7
Loading…
Desktop phishing attack detection and elimination using TSO program
by
Priyan, M.K.
,
Nath, C. Gokul
,
Balan, E. Vishnu
,
Jeyanthi, R.
,
Rama Prabha, K. P.
Request full text
Conference Proceeding
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
4 results
4
Full Text
7 results
7
Format
Conference Proceedings
4 results
4
Articles
3 results
3
Journal Title
Computer Communications
1 results
1
Materials Today : Proceedings
1 results
1
Multimedia Tools And Applications
1 results
1
Subjects
Science & Technology
4 results
4
Technology
4 results
4
Computer Information Security
3 results
3
Computer Science
3 results
3
Engineering
3 results
3
Engineering, Electrical & Electronic
3 results
3
Computer Science, Information Systems
2 results
2
Computer Science, Theory & Methods
2 results
2
Internet
2 results
2
Mathematical Models
2 results
2
Telecommunications
2 results
2
Accuracy
1 results
1
Ad Hoc Networks
1 results
1
Anomalies
1 results
1
Anomaly Detection
1 results
1
Antivirus
1 results
1
Black Hole Attack
1 results
1
Buildings
1 results
1
Channel Allocation
1 results
1
Climate Models
1 results
1
Year of Publication
From:
To:
Source
Ieee Electronic Library (Iel) Conference Proceedings
3 results
3
Sciencedirect
3 results
3
Sciencedirect Freedom Collection
2 results
2
Bacon - Elsevier - Global Sciencedirect-Openaccess
1 results
1
Springer Link
1 results
1
Science Citation Index Expanded (Web Of Science)
1 results
1
Abi/Inform Global
1 results
1
Road: Directory Of Open Access Scholarly Resources
1 results
1
Ezb Free E-Journals
1 results
1
Springer Online Journal Archives (Through 1996)
1 results
1
Springerlink Contemporary
1 results
1
Sciencedirect: Computer Science Backfile
1 results
1