Educational data mining techniques and their applications J Jacob, K Jha, P Kotak, S Puthran 2015 International Conference on Green Computing and Internet of Things …, 2015 | 61 | 2015 |
Mobile attendance using near field communication and one-time password J Jacob, K Jha, P Kotak, S Puthran 2015 International Conference on Green Computing and Internet of Things …, 2015 | 30 | 2015 |
Intrusion detection using improved decision tree algorithm with binary and quad split S Puthran, K Shah Security in Computing and Communications: 4th International Symposium, SSCC …, 2016 | 25 | 2016 |
Intrusion detection system using data mining a review V Singh, S Puthran 2016 International Conference on Global Trends in Signal Processing …, 2016 | 16 | 2016 |
A novel approach for data clustering using improved Kmeans algorithm R Suryawanshi, S Puthran International Journal of Computer Applications 975, 8887, 2016 | 10 | 2016 |
Intrusion detection using data mining with correlation V Singh, S Puthran, A Tiwari 2017 2nd International Conference for Convergence in Technology (I2CT), 620-625, 2017 | 9 | 2017 |
Intrusion detection using data mining S Puthran, K Shah International Journal of Computational Intelligence Studies 9 (4), 292-306, 2020 | 5 | 2020 |
A novel approach of privacy-preserving data sharing system through data-tagging with role-based access control T Garg, N Kagalwalla, S Puthran, P Churi, A Pawar World Journal of Engineering 20 (1), 12-28, 2023 | 4 | 2023 |
Review of various enhancement for clustering algorithms in big data mining R Suryawanshi, S Puthran Int J Adv Res Comput Sci Softw Eng, 2016 | 3 | 2016 |
A Comprehensive Review of Fraudulent Email Detection Models HN Soneji, AS Soman, A Vyas, S Puthran Proceedings of the Seventh International Conference on Mathematics and …, 2022 | 1 | 2022 |
Effectiveness of online learning and the most preferred video conferencing software amid COVID-19: perception of Indian students using mixed methods N Doshi, A Jain, E Martis, S Rastogi, S Puthran, P Churi International Journal of Forensic Software Engineering 1 (4), 348-377, 2022 | 1 | 2022 |
Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings P Mueller, SM Thampi, MZA Bhuiyan, R Ko, R Doss, JMA Calero Springer, 2016 | | 2016 |
Efficient Accessing Methods of the Big Data in Cloud Environment SP Vamshi Krishna International Journal of Advanced Research in Computer Science and Software …, 2016 | | 2016 |
Efficient Accessing Methods of the Big Data in Cloud Environment: A Review SP Vamshi K, Dhirendra M International Conference on Telecommunication Technology and Management, 2015 | | 2015 |
Intrusion Detection using classification via clustering shubha puthran Divya Nimbalkar International Journal of Advanced Research in Computer and Communication …, 2015 | | 2015 |
Data Mining Classification and clustering Approaches for Intrusion Detection System KS Shubha Puthran National Conference in Information Science, 2013 | | 2013 |
Intrusion Detection using Data Mining, parallel approaches using weka tool KS Shubha Puthran LAP LAMBERT Academic Publishing, 76, 2012 | | 2012 |
Intrusion Detection system using Data Mining based classification via clustering KS shubha Puthran International Conference on Advanced Computing, Networking and Security …, 2012 | | 2012 |
Data Mining Classification Approaches for Intrusion Detection System KS Shubha Puthra International Journal of Computer Engineering and Software Technology 1, 2011 | | 2011 |
Review of Intrusion Detection with unsupervised Data using Data Mining Technology KS Shubha Puthran Technopath, MPSTME, 2011 | | 2011 |