R. Suji Pramila

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
AdamW-RSO DBN: AdamW-Rat Swarm Optimized deep belief network for software vulnerability detection.
Multim. Tools Appl., July, 2025

2024
Meta-heuristic-based hybrid deep learning model for vulnerability detection and prevention in software system.
J. Comb. Optim., September, 2024

2023
Fractional IWSOA-LB: Fractional Improved Whale Social Optimization Based VM Migration Strategy for Load Balancing in Cloud Computing.
Int. J. Wirel. Inf. Networks, March, 2023

An efficient load balancing technique using CAViaR-HHO enabled VM migration and replica management in cloud computing.
Web Intell., 2023

Improved whale social optimisation algorithm and deep fuzzy clustering for optimal and QoS-aware load balancing in cloud computing.
Int. J. Bio Inspired Comput., 2023

Hybrid Optimization Algorithm for Resource Allocation in LTE-Based D2D燙ommunication.
Comput. Syst. Sci. Eng., 2023

Analysis and study of IDSs for cybersecurity vulnerability detection and prevention: A Comprehensive Review.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2021
Adaptable and Energy Efficacious Routing using Modified Emperor Penguin Colony Optimization Multi-faceted Metaheuristics Algorithm for MANETS.
Wirel. Pers. Commun., 2021

Secret Key Generation by Exploiting Traffic Load for Mobile Adhoc Networks.
Wirel. Pers. Commun., 2021

Load Based Key Generation for MANETs: A Comparative Study with DSR and AODV.
Wirel. Pers. Commun., 2021

2020
A New Mathematical and Correlation Coefficient Based Approach to Recognize and to Obstruct the Black Hole Attacks in Manets Using DSR Routing.
Wirel. Pers. Commun., 2020

Reliable and Hybridized Trust Based Algorithm to Thwart Blackhole Attacks in MANETs using Network Preponderant Determinants.
Int. J. Interact. Mob. Technol., 2020

A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks.
Int. J. Interact. Mob. Technol., 2020

2019
Random Bit Extraction for Secret Key Generation in MANETs.
Wirel. Pers. Commun., 2019


  Loading...