| Investigating the efficiency of Blowfish and Rejindael (AES) algorithms MA Kumar, S Karthikeyan International Journal of Computer Network and Information Security 4 (2), 22, 2012 | 83 | 2012 |
| A sequence labeling approach to morphological analyzer for tamil language M Anand Kumar, V Dhanalakshmi, KP Soman, S Rajendran International Journal on Computer Science and Engineering 2 (06), 1944-1951, 2010 | 81 | 2010 |
| A security policy protocol for detection and prevention of internet control message protocol attacks in software defined networks EM Onyema, MA Kumar, S Balasubaramanian, S Bharany, AU Rehman, ... Sustainability 14 (19), 11950, 2022 | 49 | 2022 |
| Stroke disease prediction based on ECG signals using deep learning techniques MA Kumar, N Abirami, MSG Prasad, M Mohankumar 2022 International Conference on Computational Intelligence and Sustainable …, 2022 | 48 | 2022 |
| Effect of fibre loading and successive alkali treatments on tensile properties of short jute fibre reinforced polypropylene composites G Prasad, M Kumar, G Rajesh International Journal of Engineering Science Invention 3 (3), 30-34, 2014 | 38 | 2014 |
| Machine learning application for news text classification J Agarwal, S Christa, A Pai, MA Kumar, G Prasad 2023 13th International Conference on Cloud Computing, Data Science …, 2023 | 34 | 2023 |
| An improved water body segmentation from satellite images using msaa-net MSG Prasad, J Agarwal, S Christa, HA Pai, MA Kumar, A Kukreti 2023 International Conference on Machine Intelligence for GeoAnalytics and …, 2023 | 26 | 2023 |
| A GREEN IT STAR MODEL APPROACH FOR SOFTWARE DEVELOPMENT LIFE CYCLE DMA Kumar International Journal of Advanced Technology in Engineering and Science 3 (1 …, 2015 | 23 | 2015 |
| Effect of irrigation and integrated nutrient management on growth and yield of chickpea (Cicer arietinum L.) R Singh, S Kumar, H Kumar, M Kumar, A Kumar, D Kumar Plant Archives 17 (2), 1319-1323, 2017 | 22 | 2017 |
| Security model for TCP/IP protocol suite MA Kumar, S Karthikeyan Journal of Advances in Information Technology 2 (2), 87-91, 2011 | 22 | 2011 |
| Enhanced ant colony optimization for vehicular ad hoc networks using fittest node clustering A Bijalwan, I Hussain, KC Purohit, MA Kumar Sustainability 15 (22), 15903, 2023 | 21 | 2023 |
| Detection and mitigation of few control plane attacks in software defined network environments using deep learning algorithm MA Kumar, EM Onyema, B Sundaravadivazhagan, M Gupta, A Shankar, ... Concurrency and Computation: Practice and Experience 36 (26), e8256, 2024 | 20 | 2024 |
| Deep learning model to defend against covert channel attacks in the SDN networks MA Kumar, AH Pai, J Agarwal, S Christa, GMS Prasad, S Saifi 2023 Advanced Computing and Communication Technologies for High Performance …, 2023 | 19 | 2023 |
| Empirical Study on Green and Sustainable Software Engineering DMAK M. MohanKumar IEEE International Conference on Engineering and Technology 27 (1), 95-107, 2015 | 19 | 2015 |
| METRICS FOR PERFORMANCE EVALUATION OF ENCRYPTION ALGORITHMS MAK B.Bharathi , G.Manivasagam International Journal of Advance Research in Science and Engineering 6 (3 …, 2017 | 17 | 2017 |
| Enhanced fuzzy K-NN approach for handling missing values in medical data mining RN Kumar, MA Kumar Indian Journal of Science and Technology 9 (S1), 1-6, 2016 | 17 | 2016 |
| Designing a secure audio/text based captcha using neural network A Pai, M Anandkumar, G Prasad, J Agarwal, S Christa 2023 13th International Conference on Cloud Computing, Data Science …, 2023 | 16 | 2023 |
| A survey on semantic similarity measures A Gupta, A Kumar, J Gautam, A Gupta, MA Kumar, J Gautam IJIRST-International Journal for Innovative Research in Science & Technology …, 2017 | 16 | 2017 |
| Green based software development life cycle model for software engineering M Mohankumar, MA Kumar Indian Journal of Science and Technology 9 (32), 1-8, 2016 | 16 | 2016 |
| Advances of cyber security in the healthcare domain for analyzing data G Prasad, P Gujjar, HNN Kumar, MA Kumar, S Chandrappa Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for …, 2023 | 15 | 2023 |