Skip to main content


Journal Issues

Detection of Fraudulent data in IOT devices using Machine Learning framework
Ms. P. Ramya Sri
Pages: 1-9 | First Published: 04 Jul 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
The Internet of Things (IoT) refers to a network of physical objects, or "things," that are based in software and other technologies in order to communicate and exchange data with other devices and systems over the internet. These gadgets range from common domestic items to high-tech industrial instruments. Currently more than 7 millions users are connected today. Experts predict that by 2023, there will be more than 10 billion connected IoT devices, and by 2026, there will be 23 billion. IoT devices generate a vast volume of data in a variety of modalities, with differing data quality characterised by their speed in terms of time and location reliance. In such a scenario, machine learning algorithms can play a critical role in providing biotechnology-based security and permission, as well as anomaly detection to improve the usability and security of internet-of-things (IoT) platforms The detection of IoT devices using the Machine Learning framework is offered to achieve this goal. Five machine learning models are evaluated using various metrics with a vast collection of input feature sets in this ML framework. Each model calculates a spam score based on the input attributes that have been adjusted. This score represents the IoT device's dependability under various conditions. The proposed technique is validated using certain common appliances. The acquired findings support the suggested scheme's effectiveness in comparison to other current schemes.
Keywords—IoT, detection, Security, machine learning

References 
1. N. G. Rupp, "Further Investigation into the Causes of Flight Delays," in Department of Economics, East Carolina University, 2007.
2. "Bureau of Transportation Statistics (BTS) Databases and Statistics," [Online]. Available: http://www.transtats.bts.gov.
3. "Airports Council International, World Airport .
4. E. Cinar, F. Aybek, A. Caycar, C. Cetek, "Capacity and delay analysis for airport manoeuvring areas using simulation," Aircraft Engineering and Aerospace Technology, vol. 86, no. No. 1,pp. 43-55, 2013.
5. Navoneel, et al., Chakrabarty, "Flight Arrival Delay Prediction Using Gradient Boosting Classifier," in Emerging Technologies in Data Mining and Information Security, Singapore, 2019.
6. Y. J. Kim, S. Briceno, D. Mavris, Sun Choi, "Prediction of weatherinduced airline delays based on machine learning algorithms," in 35th Digital Avionics Systems Conference (DASC), 2016.
7. W.-d. Cao. a. X.-y. Lin, "Flight turnaround time analysis and delay prediction based on Bayesian Network," Computer Engineering and Design, vol. 5, pp. 1770-1772, 2011.
8. J. J. Robollo, Hamsa, Balakrishnan, "Characterization and Predictionof Air Traffic Delays".
9. S. Sharma, H. Sangoi, R. Raut, V. C. Kotak, S. Oza, "Flight Delay Prediction System Using Weighted Multiple Linear Regression,"International Journal of Engineering and Computer Science, vol. 4, no. 4, pp. 11668 - 11677, April 2015.
10. A. M. Kalliguddi, Area K., Leboulluec, "Predictive Modelling of Aircraft Flight Delay," Universal Journal of Management, pp. 485 - 491, 2017.
11. Noriko, Etani, "Development of a predictive model for on-time arrival fight of airliner by discovering correlation between fight and weather data," 2019.
12. [Online].Available:https://towards datascienc.com/metrics-toevaluate your-machine-learning-algorithm-f10ba6e38 234.
13. Viswanathan A, Arunachalam VP, Karthik S. Geographical division traceback for distributed denial of service. Journal of Computer Science. 2012;8(2):216..
14. Dr. V. Senthil kumar, Mr. P. Jeevanantham, Dr. A. Viswanathan, Dr. Vignesh Janarthanan, Dr. M. Umamaheswari, Dr. S. Sivaprakash Emperor Journal of Applied Scientific Research “Improve Design and Analysis of Friend-to-Friend Content Dissemination System ”Volume - 3 Issue - 3 2021
15. Sowmitha, V., and Mr V. Senthilkumar. "A Cluster Based Weighted Rendezvous Planning for Efficient Mobile-Sink Path Selection in WSN." International Journal for Scientific Research & Development Vol 2 Issue 11 2015
16. Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division traceback for distributed denial of service. Journal of Computer Science, 8(2), 216.
17. Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
18. Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294.
19. Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
20. Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
21. Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
22. Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6).
23. Senthil kumar, V., Prasanth, K. Weighted Rendezvous Planning on Q-Learning Based Adaptive Zone Partition with PSO Based Optimal Path Selection. Wireless Personal Communications 110, 153–167 (2020). https://doi-org.libproxy.viko.lt /10.1007/s11277-019-06717-z

Human Activity Recognition using CNN and Pretrained Machine Learning Models.
Dr. N Vinaya Kumari
Pages: 10-16 | First Published: 05 Jul 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
People's lives are enriched by human activity recognition (HAR), which extracts action-level details about human behaviour from raw input data. There are a variety of uses for Human Activity Recognition, including elderly surveillance systems, abnormal behaviour, and so forth. However, deep learning models such as Convolutional Neural Networks have outperformed traditional machine learning methods. As a result of CNN, it is possible to extract features and reduce computational costs. Transfer Learning, on the other hand, refers to the use of pre-trained machine learning models that can be used to detect human activity using a special type of Artificial Neural Network known as Leveraging CNN. Resnet-34 Use of a CNN model can provide detection accuracy up to 96.95 percent for human activity recognition Numerous studies and research have been conducted on HAR. There are only a few models in the majority of the paper, however What we know is that the more data we have, the better the model and the more accurate the model will be.
Keywords—HAR, CNN, KNN, CCTV, ROC, SGD, RELU.

References
1. A.Wang, S.Zhao, C.Zheng, H.Chen, L.Liu and G.Chen,"HierHAR:Sensor-Based Data-Driven Hierarchical Human Activity Recognition, in IEEE Sensors Journal, vol.21, no.3,pp.3353-3365, Sensors Journal,vol.21,no.3,pp.3353-3365,1Feb.1,2021,doi:10.1109/JSEN.2020.3023860.
2. M.A.Gul, M.H.Yousaf, S.Nawaz, Z.U.Rehman, and H.W. Kim, “Patient Monitoring by Abnormal HumanActivityRecognitionBasedonCNNArchitecture”.Electronics9:1993(2020).doi:10.3390/electronics9121993
3. F. Cruciani, A. Vafeiadis, C. Nugent, et. al., “Feature learning for Human Activity Recognition using Convolutional Neural Networks”. CCF Trans. Pervasive Comp. Interact. 2,18–32(2020). https://doi.org/10.1007/s42486-020-00026-2 Indoor Localization for Ambient Assisted LivingSystems,"2020IEEE16thInternationalConference

4. A. V. Vesa et al., "Human Activity Recognition using Smart phone Sensors and Beacon-based on Intelligent Computer Communication and Processing (ICCP), 2020, pp. 205-212,doi:10.1109/ICCP51029.2020.926615
5. Z. Zhang, Y. Yang, Z. Lv, C. Gan and Q. Zhu, "LMFNet: Human Activity Recognition Using Attentive 3-D Residual Network and Multistage Fusion Strategy,"in IEEE Internet of Things Journal, vol. 8, no.7, pp. 6012-6023,1April1,2021,doi:10.1109/JIOT.2020.3033449.
6. J.Deng, W.Dong, R.Socher, L.Li,KaiLi, and LiFei-Fei,“Image Net:A large-scale hierarchical image database,” in Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, June 2009, pp.248–255.
A. Jalal, N. Sarif, J. T. Kim, and T.-S. Kim, “Human activity recognition via recognized body parts of human depths ilhouettes for residents monitoring services at smart home, ”Indoor and built environment, vol. 22, no. 1, pp. 271–279,2013.
7. K.SimonyanandA. Zisserman,“Two-stream convolutional networks for action recognition in videos,” in Advances in neural information processing systems, 2014, pp.568–576.
8. G.Gkioxari, R.Girshick, and J.Malik, “Contextual action recognition with r*cnn,” in Proceedings of the IEEE international conference on computer vision, 2015, pp. 1080–1088.
9. L. Wang, Y. Xiong, Z. Wang, and Y. Qiao, “Towards good practices for very deep two-stream convnets,” arXivpreprintarXiv:1507.02159, 2015.
10. D. Tran, L. Bourdev, R. Fergus, L. Torresani, and M.Paluri, “Deepend2endvoxel2voxelprediction,”in the Preceeding of the IEEE conference on computer vision and pattern recognitionworkshops,2016, pp. 17–24.
11. P. Wang, W. Li, J. Wan, P. Ogunbona, and X. Liu,“Cooperative training of deep aggregation networks forrgb-dactionrecognition,”in Thirty Second AAAI Conference on ArtificialIntelligence,2018.
12. S.Ji,W.Xu,M.Yang,andK.Yu,“3dconvolutionalneuralnetworksforhumanactionrecognition,” IEEE transactions on pattern analysis and machine intelligence,vol.35,no.1,pp.221–231,2013.
13. P. Khaire, P. Kumar, and J. Imran, “Combining cnnstreams of rgb-d and skeletal data for human activity recognition,” Pattern Recognition Letters, vol. 115, pp.107–116,2018.[15]A.Karpathy, G.Roderick, S.Shetty,
14. T. Leung, R. Sukthankar, and L. Fei-Fei, “Large-scalevideo classificationwith convolutional neural networks,”in Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, 2014,pp.1725–17.
15. Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division trace back for distributed denial of service. Journal of Computer Science, 8(2), 216.
16. Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
17. Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294.
18. Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
19. Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
20. Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
21. Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6). 22. S.B. Jayabharathi, S. Manjula, E. Tamil Selvan, P. Vengatesh and V. Senthil Kumar “Semantic Risk Analysis Model Cancer Data Prediction”, Journal on Science Engineering and Technology, Vol 5 Issue No 2 2018

Minimizing the Misinformation in Social Networksusing Heuristic Greedy Algorithm
Dr. M. Jaganathan
Pages: 17-23 | First Published: 05 Jul 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
In recent years, online social media has grown in popularity, and a vast volume of information has circulated over social media platforms, altering people's access to information. The credibility of information material is being questioned, and various types of misinformation are using social media to propagate quickly. The importance of network space administration and maintaining a trusted network environment cannot be overstated. In this paper, we look at a new challenge termed the activity minimization of misinformation influence (AMMI) problem, which involves removing a group of nodes from the network in order to reduce the total amount of misinformation interaction between nodes (TAMIN). To put it another way, the AMMI challenge is to choose K nodes from a given social network G to block in order to minimize the TAMIN.We demonstrate that the objective function is neither submodular nor supermodular, and we suggest a heuristic greedy algorithm (HGA) for removing the top K nodes.
Keywords: Comment Filtering, Common Interests,misinformation blocking,social network.

References 
1. E. Morozov, “Swine flu: Twitter’s power to misinform,” Foreign Policy,2009.
2. R. Yan, Y. Li, W. Wu, D. Li, and Y. Wang, “Rumor blocking throughonline link deletion on social networks,” ACM Trans. Knowl. Discoveryfrom Data, vol. 13, no. 2, pp. 1–26, Jun. 2019.
3. L. Fan, Z. Lu, W. Wu, B. Thuraisingham, H. Ma, and Y. Bi, “Leastcost rumor blocking in social networks,” presented at the IEEE 33rd Int. Conf. Distrib. Comput. Syst., Jul. 2013
4. L. Wu, F. Morstatter, X. Hu, and H. Liu, Big Data in Complex and SocialNetworks. Boca Raton, FL, USA: CRC Press, 2016, pp. 125–152.
5. H. Zhang, H. Zhang, X. Li, and M. T. Thai, “Limiting the spread ofmisinformationwhile effectively raising awareness in social networks,”in Computational Social Networks. Cham, Switzerland: Springer, 2015,pp. 35–47.
6. D. Ferraioli, D. Ferraioli, D. Ferraioli, and D. Ferraioli, “Contrastingthe spread of misinformation in online social networks,” in Proc. Conf.Auton. Agents Multiagent Syst., 2017, pp. 1323–1331.
7. Senthil kumar, V., Prasanth, K. Weighted Rendezvous Planning on Q-Learning Based Adaptive Zone Partition with PSO Based Optimal Path Selection. Wireless Personal Communications 110, 153–167 (2020). https://doi-org.libproxy.viko.lt /10.1007/s11277-019-06717-z.
8. T. Chen, W. Liu, Q. Fang, J. Guo, and D.-Z. Du, “Minimizing misinformation profit in social networks,” IEEE Trans. Comput. Social Syst.,vol. 6, no. 6, pp. 1206–1218, Dec. 2019.
9. J. Leskovec, L. Backstrom, and J. Kleinberg, “Meme-tracking and thedynamics of the news cycle,” in Proc. 15th ACM SIGKDD Int. Conf.Knowl. Discovery Data Mining, 2009, pp. 497–506.
10. Jaganathan, M., Sabari, A. An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy. Cluster Computing Vol 22, PP 12767–12776(2019).

https://doi.org/10.1007/s10586-018-1757-3
11. H. W. Hethcote, “The mathematics of infectious diseases,” SIAM Rev.,vol. 42, no. 4, pp. 599–653, 2000.
12. J. Medlock and A. P. Galvani, “Optimizing influenza vaccine distribution,” Science, vol. 325, no. 5948, pp. 1705–1708, Sep. 2009.
13. K. Kawachi, M. Seki, H. Yoshida, Y. Otake, K. Warashina, and H. Ueda,“A rumor transmission model with various contact interactions,” J.Theor. Biol., vol. 253, no. 1, pp. 55–60, Jul. 2008.
14. P. Basaras, D. Katsaros, and L. Tassiulas, “Dynamically blockingcontagions in complex networks by cutting vital connections,” in Proc.IEEE Int. Conf. Commun. (ICC), Jun. 2015, pp. 1170–1175.
15. W. Li et al., “The rumor diffusion process with emerging independentspreaders in complex networks,” Phys. A, Stat. Mech. Appl., vol. 397,pp. 121–128, Mar. 2014.
16. Z. He, Z. Cai, J. Yu, X. Wang, Y. Sun, and Y. Li, “Cost-efficientstrategies for restraining rumor spreading in mobile social networks,”IEEE Trans. Veh. Technol., vol. 66, no. 3, pp. 2789–2800, Mar. 2017.
17. F. Jin, E. Dougherty, P. Saraf, Y. Cao, and N. Ramakrishnan, “Epidemiological modeling of news and rumors on Twitter,” in Proc. 7th WorkshopSocial Netw. Mining Anal. SNAKDD, 2013, pp. 1–9.
18. X. Wang, Y. Lin, Y. Zhao, L. Zhang, J. Liang, and Z. Cai, “Anovel approach for inhibiting misinformation propagation in humanmobile opportunistic networks,” Peer-to-Peer Netw. Appl., vol. 10, no. 2,pp. 377–394, Mar. 2017.
19. S. Wang, X. Zhao, Y. Chen, Z. Li, K. Zhang, and J. Xia, “Negativeinfluence minimizing by blocking nodes in social networks,” in Proc.Workshops 27th AAAI Conf. Artif. Intell., 2013, pp. 134–136.
20. M. Kimura, K. Saito, and H. Motoda, “Minimizing the spread of contamination by blocking links in a network,” presented at the Proc. 23rdNat. Conf.Artif. Intell, vol. 2, Chicago, IL, USA, 2008, pp. 1175–1180.
21. C. Budak, D. Agrawal, and A. El Abbadi, “Limiting the spread ofmisinformation in social networks,” in Proc. 20th Int. Conf. World WideWeb WWW, 2011, pp. 665–674.
22. Y. Wang, G. Cong, G. Song, and K. Xie, “Community-based greedyalgorithm for mining top-K influential nodes in mobile social networks,”presented at the Proc. 16th ACM SIGKDD Int. Conf. Knowl. DiscoveryData Mining, Washington, DC, USA, Jul. 2010.
23. X. He, G. Song, W. Chen, and Q. Jiang, “Influence blocking maximization in social networks under the competitive linear threshold model,”in Proc. SIAM Int. Conf. Data Mining. Philadelphia, PA, USA: SIAM,2012, pp. 463–474.
24. N. P. Nguyen, G. Yan, M. T. Thai, and S. Eidenbenz, “Containment ofmisinformation spread in online social networks,” in Proc. 3rd Annu.ACM Web Sci. Conf. WebSci, 2012, pp. 213–222.
25. P. Domingos and M. Richardson, “Mining the network value of customers,” in Proc. 7th ACM SIGKDD Int. Conf. Knowl. Discovery DataMining KDD, 2001, pp. 57–66.
26. D. Kempe, J. Kleinberg, and É. Tardos, “Maximizing the spread ofinfluence through a social network,” in Proc. 9th ACM SIGKDD Int.Conf. Knowl. Discovery Data Mining KDD, 2003, pp. 137–146.
27. D. Kempe, J. Kleinberg, and É. Tardos, “Influential nodes in a diffusionmodel for social networks,” in Automata, Languages and Programming.Berlin, Germany: Springer, 2005, pp. 1127–1138.
28. M. Kimura and K. Saito, “Tractable models for information diffusion insocial networks,” in Knowledge Discovery in Databases, PKDD. Berlin,Germany: Springer, 2006, pp. 259–271.
29. N. R. Suri and Y. Narahari, “Determining the top-k nodes in socialnetworks using the Shapley value,” presented at the Proc. the 7th Int.Joint Conf. Auton. Agents Multiagent Syst., vol. 3, Estoril, Portugal,May 2008.
30. R. Yan, D. Li, W. Wu, D.-Z. Du, and Y. Wang, “Minimizing influenceofrumors by blockers on social networks: Algorithms and analysis,”IEEE Trans. Netw. Sci. Eng., early access, Mar. 6, 2019, doi: 10.1109/TNSE.2019.2903272.
31. C. J. Kuhlman, G. Tuli, S. Swarup, M. V. Marathe, and S. S. Ravi,“Blocking simple and complex contagion by edge removal,” in Proc.IEEE 13th Int. Conf. Data Mining, Dec. 2013, pp. 399–408.
32. H. Kaur, M. Talluri, and J. S. He, “Blocking negative influential nodeset in social networks: From host perspective,” in Proc. Int. Conf.Collaboration Technol. Syst. (CTS), Jun. 2015, pp. 472–473.
33. G. Tong, W. Wu, and D.-Z. Du, “Distributed rumor blocking withmultiple positive cascades,” IEEE Trans. Comput. Social Syst., vol. 5,no. 2, pp. 468–480, Jun. 2018.
34. B. Wang, G. Chen, L. Fu, L. Song, and X. Wang, “DRIMUX: Dynamicrumor influence minimization with user experience in social networks,”IEEE Trans. Knowl. Data Eng., vol. 29, no. 10, pp. 2168–2181,Oct. 2017.
35. Dr. V. Senthil kumar, Mr. P. Jeevanantham, Dr. A. Viswanathan, Dr. Vignesh Janarthanan, Dr. M. Umamaheswari, Dr. S. Sivaprakash Emperor Journal of Applied Scientific Research “Improve Design and Analysis of Friend-to-Friend Content Dissemination System ”Volume - 3 Issue - 3 2021
36. Vignesh Janarthanan, A.Viswanathan, M. Umamaheswari, “Neural Network and Cuckoo Optimization Algorithm for Remote Sensing Image Classification ", International Journal of Recent Technology and Engineering., vol. 8, no. 4, pp. 1630-1634, Jun. 2019.

Stock Price Prediction Using Machine Learning
Dr. N. Vinaya Kumari
Pages: 24-29 | First Published: 05 Jul 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
Shares in publicly traded companies, or equity shares, can be purchased and sold on the stock market. There are three basic types of stock market investors. All three types of investors: FII (foreign institutional investors), DII (domestic investors), and retail investors. Foreign Institutional Investors, such as mutual funds and banks, who have the experience and knowledge necessary to make their investment. Non-professional investors are known as retail investors. Machine learning is used to make an accurate prediction with less risk management in the stock market because there is a lot of uncertainty there. Through forecasting and LSTM (Long/Short Term Memory), we can theoretically predict stock prices through the use of machine learning. Effective stock market prediction gives us some suggestions on trading strategies, which is why stock market prediction is so important when it comes to investments. There is, however, no way to guarantee that the data will be 100% accurate because of future uncertainty in the field of study. For stock price prediction, this paper reviews studies on machine learning techniques and algorithms.

References 
1. Stock Market Investing for Beginners: Essentials to Start Investing Successfully
2. Stock Price Prediction Using Machine Learning | Deep Learning (analyticsvidhya.com)
3. An Easy Guide to Stock Price Prediction Using Machine Learning [Updated] (simplilearn.com)
4. An Easy Guide to Stock Price Prediction Using Machine Learning [Updated] (simplilearn.com)
5. Stock Market Prediction Using Machine Learning | Machine Learning Tutorial | Simplilearn - YouTube
6. Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division traceback for distributed denial of service. Journal of Computer Science, 8(2), 216.
7. Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
8. Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294.
9. Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
10. Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
11. Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
12. Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6).
13. Dr. V. Senthil kumar, Mr. P. Jeevanantham, Dr. A. Viswanathan, Dr. Vignesh Janarthanan, Dr. M. Umamaheswari, Dr. S. Sivaprakash Emperor Journal of Applied Scientific Research “Improve Design and Analysis of Friend-to-Friend Content Dissemination System ”Volume - 3 Issue - 3 2021