S. Maria Celestin Vigila

Orcid: 0000-0001-7196-4016

According to our database1, S. Maria Celestin Vigila authored at least 15 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Anomaly Detection in Cloud Using Hexabullus Optimisation-Enabled Fuzzy Classifier with Smart Contract-Enabled Secure Communication.
J. Inf. Knowl. Manag., February, 2024

2023
F-CAPSO: Fuzzy chaos adaptive particle swarm optimization for energy-efficient and secure data transmission in MANET.
Expert Syst. Appl., December, 2023

An investigation of machine learning-based intrusion detection system in mobile ad hoc network.
Int. J. Intell. Eng. Informatics, 2023

2022
Protection of encrypted medical image using consent based access control.
Int. J. Medical Eng. Informatics, 2022

Taylor-feedback deer hunting optimisation algorithm for intrusion detection in cloud using deep maxout network.
Int. J. Intell. Inf. Database Syst., 2022

Securing utility computing using enhanced elliptic curve cryptography and attribute-based access control policy.
Int. J. Grid Util. Comput., 2022

2021
Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network.
Int. J. Model. Simul. Sci. Comput., 2021

2020
A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications.
Int. J. Netw. Secur., 2020

Gene Expression Analysis to Mine Highly Relevant Gene Data in Chronic Diseases and Annotating its GO Terms.
EAI Endorsed Trans. Energy Web, 2020

2019
Medical image protection using diffusion, substitution and reversible data hiding based on prediction.
Int. J. Secur. Networks, 2019

2015
Hiding of Confidential Data in Spatial Domain Images using Image Interpolation.
Int. J. Netw. Secur., 2015

Biometric security system over finite field for mobile applications.
IET Inf. Secur., 2015

2013
A new elliptic curve cryptosystem for securing sensitive data applications.
Int. J. Electron. Secur. Digit. Forensics, 2013

2012
Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications.
Int. J. Netw. Secur., 2012

Key generation based on elliptic curve over finite prime field.
Int. J. Electron. Secur. Digit. Forensics, 2012


  Loading...