- Enhanced subtraction-average-based optimizer and blockchain for security and load balancing in fog computing
N Premkumar, S Sridharan, RV Viswanathan, N Magendiran
Wireless Networks, 1-13 2024
- Lightweight Secure Authentication Scheme to thwart Unauthorized Edge Datacenters in Fog Computing
N Premkumar, BS Kumar
Wireless Personal Communications 139 (1), 167-181 2024
- Secure authentication scheme with Archimedes optimization algorithm for load balancing technique in fog computing
N Premkumar, R Santhosh
International Journal of Information Technology 16 (6), 3861-3869 2024
- Snake swarm optimization-based deep reinforcement learning for resource allocation in edge computing environment
SV S. Kaliraj, V. Sivakumar, N. Premkumar
Concurrency and Computation: Practice and Experience 8, 1-15 2024
- Secure Load Balancing in Fog Computing Using improved Tasmanian Devil Optimization Algorithm with Blockchain
N Premkumar, R Santhosh
Wireless Personal Communications 136 (1), 547-565 2024
- Pelican optimization algorithm with blockchain for secure load balancing in fog computing
N Premkumar, R Santhosh
Multimedia Tools and Applications 83 (18), 53417-53439 2024
- Automatic software bug prediction using adaptive golden eagle optimizer with deep learning
R Siva, K S, B Hariharan, N Premkumar
Multimedia Tools and Applications 83 (1), 1261-1281 2024
- Automatic Software Bug Prediction Using Adaptive Artificial Jelly Optimization With Long Short-Term Memory
R Siva, B Hariharan, N Premkumar
Wireless Personal Communications, 1-24 2023
- Picture Of Data Warehouse Portrayed With Thought For Challenges, Modernization, And Improvement Of A Conventional Data Warehouse, As Well As Its Possible Future Perspectives
GD Saxena, DNRE Parmod, DS David, ST Kumbhar, N Premkumar
Journal of Pharmaceutical Negative Results, 8244-8254 2022
- Challenges and issues of E-health applications in cloud and fog computing environment
N Premkumar, R Santhosh
Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2021 2022
- Secured and Efficient Data Transmission in Manets Against Malicious Attack using DSR Routing and BCS Clustering with Hybrid AES-ECC Cryptanalysis
G Murugesan, M Padmaa, K Nagarajan, N Premkumar
International Journal of Innovative Technology and Exploring Engineering 8 2019
- Maximizing the Network Lifetime by using Mobile Data Gathering in Wireless Sensor Networks
MK S.Vanitha, N.PremKumar, A.Kanimozhi
SSRG International Journal of Computer Science and Engineering 4 (10), 15 2017
- Reality Exposure of Package Reducing Attacks in Networks
NP E.Vinodha
International Journal of Innovative Research in Computer and Communication 2016
- Public auditing and user revocation in dynamic cloud environment
RC Nandhini S, Premkumar N
Discovery Engineering 4 (14), 500 2016
- The Novel Life Cycle Model for Component Based Software System Based on Architecture Quality Using KCW Framework
S Kaliraj, N Premkumar, A Bharathi
International Journal of Information Technology and Computer Science (IJITCS 2014
- MANETs Using Advance DSR Algorithm and Improve the Secure Transmission
PN Sivasakthi. S, Seramannan. S, Rajesh. S, Thamilselvan. S
International Journal of Emerging Technology and Advanced Engineering 3 (7), 213 2013
- REALITY COVERAGE OF PACKET DROPPING ATTACKS IN NETWORKS
E Vinodha, N Premkumar