default search action
A. Amuthan 0001
Person information
- affiliation: Pondicherry Engineering College, Department of Computer Science and Engineering, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j17]R. Sendhil, A. Amuthan:
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment. J. Inf. Secur. Appl. 71: 103383 (2022) - [j16]N. Arunachalam, A. Amuthan:
Improved Cosine Similarity-based Artificial Bee Colony Optimization scheme for reactive and dynamic service composition. J. King Saud Univ. Comput. Inf. Sci. 34(2): 270-281 (2022) - [j15]A. Amuthan, Ramu Kaviarasan:
Rank Criteria Improved Confidence-based centroid scheme for Non Line of Sight node localizations in vehicular networks. J. King Saud Univ. Comput. Inf. Sci. 34(5): 1836-1844 (2022) - 2021
- [j14]Arulmurugan A., A. Amuthan:
Markov Modulated Bernoulli Prediction Process-based Cluster Head Selection Mechanism for improving resilience in wireless sensor networks. Int. J. Commun. Syst. 34(8) (2021) - [j13]Amuthan Arjunan, Kaviarasan Ramu:
Weighted Distance Hyperbolic Prediction-Based Detection Scheme for Non Line Of Sight nodes in VANETs. J. King Saud Univ. Comput. Inf. Sci. 33(4): 489-496 (2021) - [j12]A. Amuthan, Arulmurugan A.:
Semi-Markov inspired hybrid trust prediction scheme for prolonging lifetime through reliable cluster head selection in WSNs. J. King Saud Univ. Comput. Inf. Sci. 33(8): 936-946 (2021) - [j11]Pillutla Harikrishna, A. Amuthan:
Rival-Model Penalized Self-Organizing Map enforced DDoS attack prevention mechanism for software defined network-based cloud computing environment. J. Parallel Distributed Comput. 154: 142-152 (2021) - [j10]N. Arunachalam, A. Amuthan:
Integrated probability multi-search and solution acceptance rule-based artificial bee colony optimization scheme for web service composition. Nat. Comput. 20(1): 23-38 (2021) - [j9]K. Deepa Thilak, A. Amuthan, S. Rajkamal:
Mitigating DDoS attacks in VANETs using a Variant Artificial Bee Colony Algorithm based on cellular automata. Soft Comput. 25(18): 12191-12201 (2021) - 2020
- [j8]A. Amuthan, Arulmurugan A.:
An availability predictive trust factor-based semi-Markov mechanism for effective cluster head selection in wireless sensor networks. Int. J. Commun. Syst. 33(6) (2020) - [j7]C. Kalaiarasy, N. Sreenath, A. Amuthan:
An effective variant ring signature-based pseudonym changing mechanism for privacy preservation in mixed zones of vehicular networks. J. Ambient Intell. Humaniz. Comput. 11(4): 1669-1681 (2020) - [j6]A. Amuthan, R. Sendhil:
Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing. J. Ambient Intell. Humaniz. Comput. 11(11): 5217-5231 (2020)
2010 – 2019
- 2019
- [j5]Harikrishna Pillutla, Amuthan Arjunan:
Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing. J. Ambient Intell. Humaniz. Comput. 10(4): 1547-1559 (2019) - [j4]Amuthan Arjunan, Kaviarasan Ramu:
Weighted inertia-based dynamic virtual bat algorithm to detect NLOS nodes for reliable data dissemination in VANETs. J. Ambient Intell. Humaniz. Comput. 10(11): 4603-4613 (2019) - [j3]Stephan Punitha, A. Amuthan, K. Suresh Joseph:
Enhanced Monarchy Butterfly Optimization Technique for effective breast cancer diagnosis. J. Medical Syst. 43(7): 206:1-206:14 (2019) - 2018
- [j2]K. Deepa Thilak, A. Amuthan:
Cellular Automata-based Improved Ant Colony-based Optimization Algorithm for mitigating DDoS attacks in VANETs. Future Gener. Comput. Syst. 82: 304-314 (2018) - 2016
- [j1]Amuthan Arjunan, Praveena Narayanan, Kaviarasan Ramu:
Securing RSA algorithm against timing attack. Int. Arab J. Inf. Technol. 13(4): 471-476 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint