BibTeX records: Mercy Shalinie Selvaraj

download as .bib file

@inproceedings{DBLP:conf/icdcn/RajkumarSS24,
  author       = {K. Rajkumar and
                  Mercy Shalinie Selvaraj and
                  Hamil Stanly},
  title        = {{SDN} Defense: Detection and mitigation of DDoS attack via IoT Network},
  booktitle    = {Proceedings of the 25th International Conference on Distributed Computing
                  and Networking, {ICDCN} 2024, Chennai, India, January 4-7, 2024},
  pages        = {371--376},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3631461.3631467},
  doi          = {10.1145/3631461.3631467},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/RajkumarSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RajashreeSSS23,
  author       = {Harine Rajashree and
                  K. Sundarakantham and
                  E. Sivasankar and
                  Mercy Shalinie Selvaraj},
  title        = {A hybrid deep learning framework for privacy preservation in edge
                  computing},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103209},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103209},
  doi          = {10.1016/J.COSE.2023.103209},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RajashreeSSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/AnitaVS23,
  author       = {N. Anita and
                  M. Vijayalakshmi and
                  S. Mercy Shalinie},
  title        = {Proof-of-Improved-Participation: {A} New Consensus Protocol for Blockchain
                  Technology},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {44},
  number       = {3},
  pages        = {2007--2018},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.025516},
  doi          = {10.32604/CSSE.2023.025516},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/AnitaVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/StanlySP23,
  author       = {Hamil Stanly and
                  S. Mercy Shalinie and
                  Riji Paul},
  title        = {A review of generative and non-generative adversarial attack on context-rich
                  images},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {124},
  pages        = {106595},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.engappai.2023.106595},
  doi          = {10.1016/J.ENGAPPAI.2023.106595},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/StanlySP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/YangCLVS23,
  author       = {Ming{-}Hour Yang and
                  Chien{-}Hung Chen and
                  Jia{-}Ning Luo and
                  M. Vijayalakshmi and
                  S. Mercy Shalinie},
  title        = {An Efficient and Secure Method for Simultaneous Ownership Transfer
                  of Multiple Mobile Readers},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {3},
  pages        = {3611--3622},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3251970},
  doi          = {10.1109/JSYST.2023.3251970},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/YangCLVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DharaniSSS22,
  author       = {J. Dharani and
                  K. Sundarakantham and
                  Kunwar Singh and
                  S. Mercy Shalinie},
  title        = {A Privacy-Preserving Framework for Endorsement Process in Hyperledger
                  Fabric},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102637},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102637},
  doi          = {10.1016/J.COSE.2022.102637},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DharaniSSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/LavanyaSS22,
  author       = {Raja Lavanya and
                  K. Sundarakantham and
                  S. Mercy Shalinie},
  title        = {Cost Effective Decentralized Key Management Framework for IoT},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {41},
  number       = {3},
  pages        = {1057--1070},
  year         = {2022},
  url          = {https://doi.org/10.32604/csse.2022.021052},
  doi          = {10.32604/CSSE.2022.021052},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/LavanyaSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MurugesanSYLL22,
  author       = {Vijayalakshmi Murugesan and
                  S. Mercy Shalinie and
                  Ming{-}Hour Yang and
                  Shou{-}Chuan Lai and
                  Jia{-}Ning Luo},
  title        = {A Blockchain-Based Secure Radio Frequency Identification Ownership
                  Transfer Protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {2022},
  pages        = {9377818:1--9377818:12},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/9377818},
  doi          = {10.1155/2022/9377818},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MurugesanSYLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/YangLMS22,
  author       = {Ming{-}Hour Yang and
                  Jia{-}Ning Luo and
                  Vijayalakshmi Murugesan and
                  Mercy Shalinie Selvaraj},
  title        = {Contactless Credit Cards Payment Fraud Protection by Ambient Authentication},
  journal      = {Sensors},
  volume       = {22},
  number       = {5},
  pages        = {1989},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22051989},
  doi          = {10.3390/S22051989},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/YangLMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/NMS22,
  author       = {Anita N and
                  Vijayalakshmi Murugesan and
                  S. Mercy Shalinie},
  title        = {A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy
                  Logic},
  journal      = {Wirel. Pers. Commun.},
  volume       = {125},
  number       = {3},
  pages        = {2129--2146},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-022-09648-4},
  doi          = {10.1007/S11277-022-09648-4},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/NMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/RaviS21,
  author       = {Nagarathna Ravi and
                  S. Mercy Shalinie},
  title        = {BlackNurse-SC: {A} Novel Attack on {SDN} Controller},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {25},
  number       = {7},
  pages        = {2146--2150},
  year         = {2021},
  url          = {https://doi.org/10.1109/LCOMM.2021.3075898},
  doi          = {10.1109/LCOMM.2021.3075898},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/RaviS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LilianSS21,
  author       = {J. Felicia Lilian and
                  K. Sundarakantham and
                  S. Mercy Shalinie},
  title        = {Anti-negation method for handling negation words in question answering
                  system},
  journal      = {J. Supercomput.},
  volume       = {77},
  number       = {5},
  pages        = {4244--4266},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11227-020-03437-1},
  doi          = {10.1007/S11227-020-03437-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LilianSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/RaviSLC21,
  author       = {Nagarathna Ravi and
                  S. Mercy Shalinie and
                  Chhagan Lal and
                  Mauro Conti},
  title        = {{AEGIS:} Detection and Mitigation of {TCP} {SYN} Flood on {SDN} Controller},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {1},
  pages        = {745--759},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2020.3037124},
  doi          = {10.1109/TNSM.2020.3037124},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/RaviSLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/pTMRDS21,
  author       = {Vimala Rani P and
                  Abishek Joshua T and
                  K. Narasimma Mallikaarjunan and
                  Rajesh Alias Harinarayan R and
                  J. Dharani and
                  Mercy Shalinie Selvaraj},
  title        = {Exploiting Queue-driven Cache Replacement Technique for Thwarting
                  Pollution Attack in {ICN}},
  booktitle    = {12th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCNT51525.2021.9579599},
  doi          = {10.1109/ICCCNT51525.2021.9579599},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/pTMRDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangLMS20,
  author       = {Ming{-}Hour Yang and
                  Jia{-}Ning Luo and
                  Vijayalakshmi Murugesan and
                  S. Mercy Shalinie},
  title        = {Hybrid Multilayer Network Traceback to the Real Sources of Attack
                  Devices},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {201087--201097},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3034226},
  doi          = {10.1109/ACCESS.2020.3034226},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YangLMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/MurugesanSYU20,
  author       = {Vijayalakshmi Murugesan and
                  S. Mercy Shalinie and
                  Ming{-}Hour Yang and
                  Raja Meenakshi U.},
  title        = {Web phishing detection techniques: a survey on the state-of-the-art,
                  taxonomy and future directions},
  journal      = {{IET} Networks},
  volume       = {9},
  number       = {5},
  pages        = {235--246},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-net.2020.0078},
  doi          = {10.1049/IET-NET.2020.0078},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/MurugesanSYU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbidm/PriyaSP20,
  author       = {G. Madhu Priya and
                  S. Mercy Shalinie and
                  P. Mohana Priya},
  title        = {Deep learning framework for early detection of intrusion in virtual
                  environment},
  journal      = {Int. J. Bus. Intell. Data Min.},
  volume       = {17},
  number       = {3},
  pages        = {393--411},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJBIDM.2020.109296},
  doi          = {10.1504/IJBIDM.2020.109296},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbidm/PriyaSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RaviS20,
  author       = {Nagarathna Ravi and
                  S. Mercy Shalinie},
  title        = {Learning-Driven Detection and Mitigation of DDoS Attack in IoT via
                  SDN-Cloud Architecture},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {3559--3570},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2973176},
  doi          = {10.1109/JIOT.2020.2973176},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/RaviS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RaviS20a,
  author       = {Nagarathna Ravi and
                  S. Mercy Shalinie},
  title        = {Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions
                  in IoT Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {11},
  pages        = {11041--11052},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2993410},
  doi          = {10.1109/JIOT.2020.2993410},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/RaviS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/RaviST20,
  author       = {Nagarathna Ravi and
                  S. Mercy Shalinie and
                  D. Danyson Jose Theres},
  title        = {{BALANCE:} Link Flooding Attack Detection and Mitigation via Hybrid-SDN},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {17},
  number       = {3},
  pages        = {1715--1729},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSM.2020.2997734},
  doi          = {10.1109/TNSM.2020.2997734},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/RaviST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SugunaS19,
  author       = {M. Suguna and
                  S. Mercy Shalinie},
  title        = {Privacy preserving auditing protocol for remote data storage},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Supplement},
  pages        = {6891--6898},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-1701-6},
  doi          = {10.1007/S10586-018-1701-6},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/SugunaS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SeshadriIS19,
  author       = {Karthick Seshadri and
                  K. Viswanathan Iyer and
                  Mercy Shalinie Selvaraj},
  title        = {Design and evaluation of a parallel document clustering algorithm
                  based on hierarchical latent semantic analysis},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {13},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.5094},
  doi          = {10.1002/CPE.5094},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/SeshadriIS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbidm/MallikarjunanSB19,
  author       = {K. Narasimha Mallikarjunan and
                  S. Mercy Shalinie and
                  A. Bhuvaneshwaran},
  title        = {{BAIT:} behaviour aided intruder testimony technique for attacker
                  intention prediction in business data handling},
  journal      = {Int. J. Bus. Intell. Data Min.},
  volume       = {14},
  number       = {1/2},
  pages        = {177--198},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJBIDM.2019.096835},
  doi          = {10.1504/IJBIDM.2019.096835},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbidm/MallikarjunanSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiit/RaviPRSSP19,
  author       = {Nagarathna Ravi and
                  Vimala Rani P and
                  Rajesh Alias Harinarayan R and
                  Mercy Shalinie Selvaraj and
                  Karthick Seshadri and
                  Pariventhan P},
  title        = {Deep Learning-based Framework for Smart Sustainable Cities: {A} Case-study
                  in Protection from Air Pollution},
  journal      = {Int. J. Intell. Inf. Technol.},
  volume       = {15},
  number       = {4},
  pages        = {76--107},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJIIT.2019100105},
  doi          = {10.4018/IJIIT.2019100105},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijiit/RaviPRSSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/LilianSRS19,
  author       = {J. Felicia Lilian and
                  K. Sundarakantham and
                  Harine Rajashree and
                  S. Mercy Shalinie},
  title        = {{SSE:} Semantic Sentence Embedding for learning user interactions},
  booktitle    = {10th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCCNT45670.2019.8944630},
  doi          = {10.1109/ICCCNT45670.2019.8944630},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/LilianSRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/RaviPS19,
  author       = {Nagarathna Ravi and
                  Vimala Rani P and
                  S. Mercy Shalinie},
  title        = {Secure Deep Neural (SeDeN) Framework for 5G Wireless Networks},
  booktitle    = {10th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCCNT45670.2019.8944654},
  doi          = {10.1109/ICCCNT45670.2019.8944654},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/RaviPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MurugesanSY18,
  author       = {Vijayalakshmi Murugesan and
                  Mercy Shalinie Selvaraj and
                  Ming{-}Hour Yang},
  title        = {{HPSIPT:} {A} high-precision single-packet {IP} traceback scheme},
  journal      = {Comput. Networks},
  volume       = {143},
  pages        = {275--288},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.07.013},
  doi          = {10.1016/J.COMNET.2018.07.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MurugesanSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SeshadriSM18,
  author       = {Karthick Seshadri and
                  Mercy Shalinie Selvaraj and
                  Sidharth Manohar},
  title        = {A distributed parallel algorithm for inferring hierarchical groups
                  from large-scale text corpuses},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {30},
  number       = {11},
  year         = {2018},
  url          = {https://doi.org/10.1002/cpe.4404},
  doi          = {10.1002/CPE.4404},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/SeshadriSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/MurugesanS18,
  author       = {Vijayalakshmi Murugesan and
                  Mercy Shalinie Selvaraj},
  title        = {{UDP} based {IP} traceback for flooding DDoS attack},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {15},
  number       = {1},
  pages        = {103--111},
  year         = {2018},
  url          = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=126\&\#38;Itemid=451},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/MurugesanS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/MurugesanSY18,
  author       = {Vijayalakshmi Murugesan and
                  Mercy Shalinie and
                  Ming{-}Hour Yang},
  title        = {Design and analysis of hybrid single packet {IP} traceback scheme},
  journal      = {{IET} Networks},
  volume       = {7},
  number       = {3},
  pages        = {141--151},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-net.2017.0115},
  doi          = {10.1049/IET-NET.2017.0115},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-net/MurugesanSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/PrabavathySS18,
  author       = {S. Prabavathy and
                  K. Sundarakantham and
                  S. Mercy Shalinie},
  title        = {Design of cognitive fog computing for intrusion detection in Internet
                  of Things},
  journal      = {J. Commun. Networks},
  volume       = {20},
  number       = {3},
  pages        = {291--298},
  year         = {2018},
  url          = {https://doi.org/10.1109/JCN.2018.000041},
  doi          = {10.1109/JCN.2018.000041},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/PrabavathySS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/PrabavathySS18,
  author       = {S. Prabavathy and
                  K. Sundarakantham and
                  S. Mercy Shalinie},
  title        = {Design of Cognitive Fog Computing for Autonomic Security System in
                  Critical Infrastructure},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {24},
  number       = {5},
  pages        = {577--602},
  year         = {2018},
  url          = {http://www.jucs.org/jucs\_24\_5/design\_of\_cognitive\_fog},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/PrabavathySS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/5gwf/RaviS18,
  author       = {Nagarathna Ravi and
                  Mercy Shalinie Selvaraj},
  title        = {TeFENS: Testbed For Experimenting Next-Generation-Network Security},
  booktitle    = {{IEEE} 5G World Forum, 5GWF 2018, Silicon Valley, CA, USA, July 9-11,
                  2018},
  pages        = {204--209},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/5GWF.2018.8516708},
  doi          = {10.1109/5GWF.2018.8516708},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/5gwf/RaviS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/PRSPR18,
  author       = {Vimala Rani P and
                  Nagarathna Ravi and
                  S. Mercy Shalinie and
                  Pariventhan P and
                  K. Rajkumar},
  title        = {Detecting and Assuaging Against Interest flooding Attack using Statistical
                  Hypothesis Testing in Next Generation {ICN}},
  booktitle    = {9th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCNT.2018.8494079},
  doi          = {10.1109/ICCCNT.2018.8494079},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/PRSPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/PRSPR18a,
  author       = {Vimala Rani P and
                  Nagarathna Ravi and
                  S. Mercy Shalinie and
                  Pariventhan P and
                  K. Rajkumar},
  title        = {Fuzzy Based Congestion-Aware Secure (FuCaS) Route Selection in {ICN}},
  booktitle    = {9th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCNT.2018.8494121},
  doi          = {10.1109/ICCCNT.2018.8494121},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/PRSPR18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/RajasekaranSR18,
  author       = {Rajesh Harinarayan Rajasekaran and
                  Mercy Shalinie Selvaraj and
                  Jay Ramanathan},
  title        = {A Novel Data-Driven {DSSE} Method to Achieve Water Sustainability
                  for Farmers in Madurai District, India},
  booktitle    = {9th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCNT.2018.8493694},
  doi          = {10.1109/ICCCNT.2018.8493694},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/RajasekaranSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/MohanaPriyaS17,
  author       = {Pitchai MohanaPriya and
                  S. Mercy Shalinie},
  title        = {Restricted Boltzmann machine-based cognitive protocol for secure routing
                  in software defined wireless networks},
  journal      = {{IET} Networks},
  volume       = {6},
  number       = {6},
  pages        = {162--168},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-net.2017.0054},
  doi          = {10.1049/IET-NET.2017.0054},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/MohanaPriyaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/AkilarasuS17,
  author       = {G. Akilarasu and
                  S. Mercy Shalinie},
  title        = {Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks},
  journal      = {Wirel. Networks},
  volume       = {23},
  number       = {6},
  pages        = {1709--1718},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11276-016-1240-0},
  doi          = {10.1007/S11276-016-1240-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/AkilarasuS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SeshadriS15,
  author       = {Karthick Seshadri and
                  S. Mercy Shalinie},
  title        = {Parallelization of a graph-cut based algorithm for hierarchical clustering
                  of web documents},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {17},
  pages        = {5156--5176},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3545},
  doi          = {10.1002/CPE.3545},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/SeshadriS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/SubramanianGS15,
  author       = {Kiruthika Subramanian and
                  Preetha Gunasekaran and
                  Mercy Selvaraj},
  title        = {Two layer defending mechanism against {DDOS} attacks},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {12},
  number       = {4},
  pages        = {317--324},
  year         = {2015},
  url          = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=99\&\#38;Itemid=376},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/SubramanianGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccc/ASS15,
  author       = {Avelin Diana A. and
                  K. Sundarakantham and
                  S. Mercy Shalinie},
  title        = {Alleviation of Binding Update Re-registration Handoff Latency at Home
                  Agent Failure in MIPv6 Network},
  journal      = {Int. J. Comput. Commun. Control},
  volume       = {10},
  number       = {4},
  pages        = {463--470},
  year         = {2015},
  url          = {https://doi.org/10.15837/ijccc.2015.4.584},
  doi          = {10.15837/IJCCC.2015.4.584},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijccc/ASS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/SeshadriSK15,
  author       = {Karthick Seshadri and
                  S. Mercy Shalinie and
                  Chidambaram Kollengode},
  title        = {Design and evaluation of a parallel algorithm for inferring topic
                  hierarchies},
  journal      = {Inf. Process. Manag.},
  volume       = {51},
  number       = {5},
  pages        = {662--676},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ipm.2015.06.006},
  doi          = {10.1016/J.IPM.2015.06.006},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/SeshadriSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cods/SeshadriS15,
  author       = {Karthick Seshadri and
                  S. Mercy Shalinie},
  editor       = {Manish Gupta and
                  Y. Narahari and
                  V. S. Subrahmanian and
                  Indrajit Bhattacharya},
  title        = {Parallel algorithms for merging topic trees and their application
                  in meta search engines},
  booktitle    = {Proceedings of the Second {ACM} {IKDD} Conference on Data Sciences,
                  Bangalore, CoDS 2015, India, March 18-21, 2015},
  pages        = {114--115},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732587.2732605},
  doi          = {10.1145/2732587.2732605},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cods/SeshadriS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ibica/MohanaPriyaSP15,
  author       = {Pitchai MohanaPriya and
                  S. Mercy Shalinie and
                  Tulika Pandey},
  editor       = {V{\'{a}}clav Sn{\'{a}}sel and
                  Ajith Abraham and
                  Pavel Kr{\"{o}}mer and
                  Millie Pant and
                  Azah Kamilah Muda},
  title        = {Restricted Boltzmann Machine Based Energy Efficient Cognitive Network},
  booktitle    = {Innovations in Bio-Inspired Computing and Applications - Proceedings
                  of the 6th International Conference on Innovations in Bio-Inspired
                  Computing and Applications {(IBICA} 2015) held in Kochi, India during
                  December 16-18, 2015},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {424},
  pages        = {463--472},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28031-8\_40},
  doi          = {10.1007/978-3-319-28031-8\_40},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ibica/MohanaPriyaSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/AkilandeswariS14,
  author       = {V. Akilandeswari and
                  S. Mercy Shalinie},
  title        = {Design of an Adaptive Distributed Critical-Care Extensive Response
                  Network {(AD-CERN)} Using Cooperative Overlay Network},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/754898},
  doi          = {10.1155/2014/754898},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/AkilandeswariS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ASSL14,
  author       = {Avelin Diana A. and
                  K. Sundarakantham and
                  S. Mercy Shalinie and
                  Rajendran L.},
  title        = {Analytical model for Binding Refresh Request to reduce storage and
                  communication overhead in MIPv6 network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {5},
  pages        = {402--414},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1871},
  doi          = {10.1002/NEM.1871},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ASSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/AkilarasuS14,
  author       = {G. Akilarasu and
                  S. Mercy Shalinie},
  title        = {Trust Based Authentication and Key Establishment for Secure Routing
                  in {WMN}},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {12},
  pages        = {4661--4676},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.12.024},
  doi          = {10.3837/TIIS.2014.12.024},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/AkilarasuS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/VijayalakshmiS14,
  author       = {Vijayalakshmi Murugesan and
                  S. Mercy Shalinie},
  title        = {Single Packet {ICMP} Traceback Technique using Router Interface},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {30},
  number       = {6},
  pages        = {1673--1694},
  year         = {2014},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2014/201411\_01.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/VijayalakshmiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sscc/MohanaPriyaAAS14,
  author       = {Pitchai MohanaPriya and
                  V. Akilandeswari and
                  G. Akilarasu and
                  S. Mercy Shalinie},
  editor       = {Jaime Lloret Mauri and
                  Sabu M. Thampi and
                  Danda B. Rawat and
                  Di Jin},
  title        = {An Integrated Approach of {E-RED} and {ANT} Classification Methods
                  for DRDoS Attacks},
  booktitle    = {Security in Computing and Communications - Second International Symposium,
                  {SSCC} 2014, Delhi, India, September 24-27, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {467},
  pages        = {304--312},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44966-0\_29},
  doi          = {10.1007/978-3-662-44966-0\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sscc/MohanaPriyaAAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiei/PreethaDS11,
  author       = {G. Preetha and
                  B. S. Kiruthika Devi and
                  S. Mercy Shalinie},
  title        = {Combat model-based DDoS detection and defence using experimental testbed:
                  a quantitative approach},
  journal      = {Int. J. Intell. Eng. Informatics},
  volume       = {1},
  number       = {3/4},
  pages        = {261--279},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIEI.2011.044097},
  doi          = {10.1504/IJIEI.2011.044097},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiei/PreethaDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adcons/TamilselviSTS11,
  author       = {D. Tamilselvi and
                  S. Mercy Shalinie and
                  A. Fathima Thasneem and
                  S. Gomathi Sundari},
  editor       = {P. Santhi Thilagam and
                  Alwyn Roshan Pais and
                  K. Chandrasekaran and
                  N. Balakrishnan},
  title        = {Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm
                  in an Indoor Environment},
  booktitle    = {Advanced Computing, Networking and Security - International Conference,
                  {ADCONS} 2011, Surathkal, India, December 16-18, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7135},
  pages        = {263--269},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29280-4\_31},
  doi          = {10.1007/978-3-642-29280-4\_31},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adcons/TamilselviSTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adcons/RajamPSP11,
  author       = {V. K. Soundar Rajam and
                  B. Sundaresa Pandian and
                  S. Mercy Shalinie and
                  Tulika Pandey},
  editor       = {P. Santhi Thilagam and
                  Alwyn Roshan Pais and
                  K. Chandrasekaran and
                  N. Balakrishnan},
  title        = {Application of {IP} Traceback Mechanism to OnlineVoting System},
  booktitle    = {Advanced Computing, Networking and Security - International Conference,
                  {ADCONS} 2011, Surathkal, India, December 16-18, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7135},
  pages        = {621--630},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29280-4\_72},
  doi          = {10.1007/978-3-642-29280-4\_72},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adcons/RajamPSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcat/SundarakanthamSS10,
  author       = {K. Sundarakantham and
                  N. Sheena and
                  S. Mercy Shalinie},
  title        = {{SSGL:} a semi-supervised grammar learner},
  journal      = {Int. J. Comput. Appl. Technol.},
  volume       = {38},
  number       = {4},
  pages        = {259--263},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJCAT.2010.034526},
  doi          = {10.1504/IJCAT.2010.034526},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcat/SundarakanthamSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SubbulakshmiSRR10,
  author       = {T. Subbulakshmi and
                  S. Mercy Shalinie and
                  C. Suneel Reddy and
                  A. Ramamoorthi},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Detection and Classification of DDoS Attacks Using Fuzzy Inference
                  System},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {242--252},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_25},
  doi          = {10.1007/978-3-642-14478-3\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/SubbulakshmiSRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdem/SubbulakshmiSR10,
  author       = {T. Subbulakshmi and
                  S. Mercy Shalinie and
                  A. Ramamoorthi},
  editor       = {Rajkumar Kannan and
                  Fr{\'{e}}d{\'{e}}ric Andr{\`{e}}s},
  title        = {Masquerader Classification System with Linux Command Sequences Using
                  Machine Learning Algorithms},
  booktitle    = {Data Engineering and Management - Second International Conference,
                  {ICDEM} 2010, Tiruchirappalli, India, July 29-31, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6411},
  pages        = {296--302},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27872-3\_44},
  doi          = {10.1007/978-3-642-27872-3\_44},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdem/SubbulakshmiSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semcco/PadmavathiSSS10,
  author       = {S. Padmavathi and
                  S. Mercy Shalinie and
                  B. C. Someshwar and
                  T. Sasikumar},
  editor       = {Bijaya K. Panigrahi and
                  Swagatam Das and
                  Ponnuthurai Nagaratnam Suganthan and
                  Subhransu Sekhar Dash},
  title        = {Enhanced Memetic Algorithm for Task Scheduling},
  booktitle    = {Swarm, Evolutionary, and Memetic Computing - First International Conference
                  on Swarm, Evolutionary, and Memetic Computing, {SEMCCO} 2010, Chennai,
                  India, December 16-18, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6466},
  pages        = {448--459},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17563-3\_54},
  doi          = {10.1007/978-3-642-17563-3\_54},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/semcco/PadmavathiSSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/KrishnanPS08,
  author       = {Venkatalakshmi Krishnan and
                  Anisha Praisy and
                  Mercy Shalinie},
  title        = {A Customized Particle Swarm Optimization for Classification of Multispectral
                  Imagery Based on Feature Fusion},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {5},
  number       = {4},
  pages        = {327--333},
  year         = {2008},
  url          = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=60\&\#38;Itemid=286},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/KrishnanPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icetet/PadmavathiSS08,
  author       = {S. Padmavathi and
                  M. Suguna and
                  S. Mercy Shalinie},
  title        = {{DAG} Scheduling on Cluster of Workstations Using Hybrid Particle
                  Swarm Optimization},
  booktitle    = {First International Conference on Emerging Trends in Engineering and
                  Technology, {ICETET} '08, Nagpur, Maharashtra, India, July 16-18,
                  2008},
  pages        = {384--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICETET.2008.245},
  doi          = {10.1109/ICETET.2008.245},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icetet/PadmavathiSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/Shalinie06,
  author       = {S. Mercy Shalinie},
  title        = {Modeling parallel feed-forward based compression network},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {21},
  number       = {4},
  pages        = {227--237},
  year         = {2006},
  url          = {https://doi.org/10.1080/17445760600567859},
  doi          = {10.1080/17445760600567859},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/paapp/Shalinie06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/Shalinie05,
  author       = {S. Mercy Shalinie},
  title        = {Modeling Connectionist Neuro-Fuzzy network and Applications},
  journal      = {Neural Comput. Appl.},
  volume       = {14},
  number       = {1},
  pages        = {88--93},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00521-004-0452-x},
  doi          = {10.1007/S00521-004-0452-X},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/Shalinie05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics