Balamurugan Balusamy

According to our database1, Balamurugan Balusamy authored at least 32 papers between 2015 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks.
IEEE Trans. Engineering Management, 2021

Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions.
Math. Comput. Simul., 2021

2020
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Improving End-Users Utility in Software-Defined Wide Area Network Systems.
IEEE Trans. Netw. Serv. Manag., 2020

Securing e-health records using keyless signature infrastructure blockchain technology in the cloud.
Neural Comput. Appl., 2020

Artificial intelligence inspired energy and spectrum aware cluster based routing protocol for cognitive radio sensor networks.
J. Parallel Distributed Comput., 2020

Energy-aware multipath routing protocol for internet of things using network coding techniques.
Int. J. Grid Util. Comput., 2020

Analysing control plane scalability issue of software defined wide area network using simulated annealing technique.
Int. J. Grid Util. Comput., 2020

An intrusion detection scheme based on the ensemble of discriminant classifiers.
Comput. Electr. Eng., 2020

An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks.
IEEE Access, 2020

Chapter Seven - The growing role of integrated and insightful big and real-time data analytics platforms.
Adv. Comput., 2020

2019
A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT).
Neural Comput. Appl., 2019

An optimized hierarchical encryption technique for tamper recognition.
Multim. Tools Appl., 2019

A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment.
Int. J. E Health Medical Commun., 2019

Hybrid model for security-aware cluster head selection in wireless sensor networks.
IET Wirel. Sens. Syst., 2019

Students university healthy lifestyle practice: quantitative analysis.
Health Inf. Sci. Syst., 2019

Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks.
IEEE Access, 2019

2018
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018

Survey of energy drink consumption and adverse health effects in Lebanon.
Health Inf. Sci. Syst., 2018

Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2018

Analysis of performance measures to improve the quality of service in cloud based e-government web portal.
Electron. Gov. an Int. J., 2018

A framework for smart traffic management using hybrid clustering techniques.
Clust. Comput., 2018

2017
A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System.
Int. J. Netw. Secur., 2017

Providing efficient user management for large-scale enterprise by achieving high scalability over cloud.
Int. J. Internet Protoc. Technol., 2017

Achieving fine-grained access control and mitigating role explosion by utilising ABE with RBAC.
Int. J. High Perform. Comput. Netw., 2017

Simplified and efficient framework for managing roles in cloud-based transaction processing systems using attribute-based encryption.
Int. J. Comput. Sci. Eng., 2017

Ant colony-based load balancing and fault recovery for cloud computing environment.
Int. J. Adv. Intell. Paradigms, 2017

Availability modeling for multi-tier cloud environment.
Intell. Autom. Soft Comput., 2017

Time efficient secure DNA based access control model for cloud computing environment.
Future Gener. Comput. Syst., 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Clust. Comput., 2017

Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service .
Proceedings of the 2nd International Conference on Internet of Things, 2017

2015
Collective advancements on access control scheme for multi-authority cloud storage system.
Int. J. Grid Util. Comput., 2015


  Loading...