Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mercy Shalinie Selvaraj
@inproceedings{DBLP:conf/icdcn/RajkumarSS24, author = {K. Rajkumar and Mercy Shalinie Selvaraj and Hamil Stanly}, title = {{SDN} Defense: Detection and mitigation of DDoS attack via IoT Network}, booktitle = {Proceedings of the 25th International Conference on Distributed Computing and Networking, {ICDCN} 2024, Chennai, India, January 4-7, 2024}, pages = {371--376}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3631461.3631467}, doi = {10.1145/3631461.3631467}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/RajkumarSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RajashreeSSS23, author = {Harine Rajashree and K. Sundarakantham and E. Sivasankar and Mercy Shalinie Selvaraj}, title = {A hybrid deep learning framework for privacy preservation in edge computing}, journal = {Comput. Secur.}, volume = {129}, pages = {103209}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103209}, doi = {10.1016/J.COSE.2023.103209}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RajashreeSSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/AnitaVS23, author = {N. Anita and M. Vijayalakshmi and S. Mercy Shalinie}, title = {Proof-of-Improved-Participation: {A} New Consensus Protocol for Blockchain Technology}, journal = {Comput. Syst. Sci. Eng.}, volume = {44}, number = {3}, pages = {2007--2018}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.025516}, doi = {10.32604/CSSE.2023.025516}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/AnitaVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/StanlySP23, author = {Hamil Stanly and S. Mercy Shalinie and Riji Paul}, title = {A review of generative and non-generative adversarial attack on context-rich images}, journal = {Eng. Appl. Artif. Intell.}, volume = {124}, pages = {106595}, year = {2023}, url = {https://doi.org/10.1016/j.engappai.2023.106595}, doi = {10.1016/J.ENGAPPAI.2023.106595}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/StanlySP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/YangCLVS23, author = {Ming{-}Hour Yang and Chien{-}Hung Chen and Jia{-}Ning Luo and M. Vijayalakshmi and S. Mercy Shalinie}, title = {An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {3}, pages = {3611--3622}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3251970}, doi = {10.1109/JSYST.2023.3251970}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/YangCLVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DharaniSSS22, author = {J. Dharani and K. Sundarakantham and Kunwar Singh and S. Mercy Shalinie}, title = {A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric}, journal = {Comput. Secur.}, volume = {116}, pages = {102637}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102637}, doi = {10.1016/J.COSE.2022.102637}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DharaniSSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/LavanyaSS22, author = {Raja Lavanya and K. Sundarakantham and S. Mercy Shalinie}, title = {Cost Effective Decentralized Key Management Framework for IoT}, journal = {Comput. Syst. Sci. Eng.}, volume = {41}, number = {3}, pages = {1057--1070}, year = {2022}, url = {https://doi.org/10.32604/csse.2022.021052}, doi = {10.32604/CSSE.2022.021052}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/LavanyaSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MurugesanSYLL22, author = {Vijayalakshmi Murugesan and S. Mercy Shalinie and Ming{-}Hour Yang and Shou{-}Chuan Lai and Jia{-}Ning Luo}, title = {A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol}, journal = {Secur. Commun. Networks}, volume = {2022}, pages = {9377818:1--9377818:12}, year = {2022}, url = {https://doi.org/10.1155/2022/9377818}, doi = {10.1155/2022/9377818}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MurugesanSYLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YangLMS22, author = {Ming{-}Hour Yang and Jia{-}Ning Luo and Vijayalakshmi Murugesan and Mercy Shalinie Selvaraj}, title = {Contactless Credit Cards Payment Fraud Protection by Ambient Authentication}, journal = {Sensors}, volume = {22}, number = {5}, pages = {1989}, year = {2022}, url = {https://doi.org/10.3390/s22051989}, doi = {10.3390/S22051989}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/YangLMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/NMS22, author = {Anita N and Vijayalakshmi Murugesan and S. Mercy Shalinie}, title = {A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic}, journal = {Wirel. Pers. Commun.}, volume = {125}, number = {3}, pages = {2129--2146}, year = {2022}, url = {https://doi.org/10.1007/s11277-022-09648-4}, doi = {10.1007/S11277-022-09648-4}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/NMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/RaviS21, author = {Nagarathna Ravi and S. Mercy Shalinie}, title = {BlackNurse-SC: {A} Novel Attack on {SDN} Controller}, journal = {{IEEE} Commun. Lett.}, volume = {25}, number = {7}, pages = {2146--2150}, year = {2021}, url = {https://doi.org/10.1109/LCOMM.2021.3075898}, doi = {10.1109/LCOMM.2021.3075898}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/RaviS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LilianSS21, author = {J. Felicia Lilian and K. Sundarakantham and S. Mercy Shalinie}, title = {Anti-negation method for handling negation words in question answering system}, journal = {J. Supercomput.}, volume = {77}, number = {5}, pages = {4244--4266}, year = {2021}, url = {https://doi.org/10.1007/s11227-020-03437-1}, doi = {10.1007/S11227-020-03437-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LilianSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/RaviSLC21, author = {Nagarathna Ravi and S. Mercy Shalinie and Chhagan Lal and Mauro Conti}, title = {{AEGIS:} Detection and Mitigation of {TCP} {SYN} Flood on {SDN} Controller}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {1}, pages = {745--759}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2020.3037124}, doi = {10.1109/TNSM.2020.3037124}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/RaviSLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/pTMRDS21, author = {Vimala Rani P and Abishek Joshua T and K. Narasimma Mallikaarjunan and Rajesh Alias Harinarayan R and J. Dharani and Mercy Shalinie Selvaraj}, title = {Exploiting Queue-driven Cache Replacement Technique for Thwarting Pollution Attack in {ICN}}, booktitle = {12th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCNT51525.2021.9579599}, doi = {10.1109/ICCCNT51525.2021.9579599}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/pTMRDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangLMS20, author = {Ming{-}Hour Yang and Jia{-}Ning Luo and Vijayalakshmi Murugesan and S. Mercy Shalinie}, title = {Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices}, journal = {{IEEE} Access}, volume = {8}, pages = {201087--201097}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3034226}, doi = {10.1109/ACCESS.2020.3034226}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YangLMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/MurugesanSYU20, author = {Vijayalakshmi Murugesan and S. Mercy Shalinie and Ming{-}Hour Yang and Raja Meenakshi U.}, title = {Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions}, journal = {{IET} Networks}, volume = {9}, number = {5}, pages = {235--246}, year = {2020}, url = {https://doi.org/10.1049/iet-net.2020.0078}, doi = {10.1049/IET-NET.2020.0078}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/MurugesanSYU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbidm/PriyaSP20, author = {G. Madhu Priya and S. Mercy Shalinie and P. Mohana Priya}, title = {Deep learning framework for early detection of intrusion in virtual environment}, journal = {Int. J. Bus. Intell. Data Min.}, volume = {17}, number = {3}, pages = {393--411}, year = {2020}, url = {https://doi.org/10.1504/IJBIDM.2020.109296}, doi = {10.1504/IJBIDM.2020.109296}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbidm/PriyaSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RaviS20, author = {Nagarathna Ravi and S. Mercy Shalinie}, title = {Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {3559--3570}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2973176}, doi = {10.1109/JIOT.2020.2973176}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/RaviS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RaviS20a, author = {Nagarathna Ravi and S. Mercy Shalinie}, title = {Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {11}, pages = {11041--11052}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2993410}, doi = {10.1109/JIOT.2020.2993410}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/RaviS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/RaviST20, author = {Nagarathna Ravi and S. Mercy Shalinie and D. Danyson Jose Theres}, title = {{BALANCE:} Link Flooding Attack Detection and Mitigation via Hybrid-SDN}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {17}, number = {3}, pages = {1715--1729}, year = {2020}, url = {https://doi.org/10.1109/TNSM.2020.2997734}, doi = {10.1109/TNSM.2020.2997734}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/RaviST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SugunaS19, author = {M. Suguna and S. Mercy Shalinie}, title = {Privacy preserving auditing protocol for remote data storage}, journal = {Clust. Comput.}, volume = {22}, number = {Supplement}, pages = {6891--6898}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-1701-6}, doi = {10.1007/S10586-018-1701-6}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/SugunaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SeshadriIS19, author = {Karthick Seshadri and K. Viswanathan Iyer and Mercy Shalinie Selvaraj}, title = {Design and evaluation of a parallel document clustering algorithm based on hierarchical latent semantic analysis}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {13}, year = {2019}, url = {https://doi.org/10.1002/cpe.5094}, doi = {10.1002/CPE.5094}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/SeshadriIS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbidm/MallikarjunanSB19, author = {K. Narasimha Mallikarjunan and S. Mercy Shalinie and A. Bhuvaneshwaran}, title = {{BAIT:} behaviour aided intruder testimony technique for attacker intention prediction in business data handling}, journal = {Int. J. Bus. Intell. Data Min.}, volume = {14}, number = {1/2}, pages = {177--198}, year = {2019}, url = {https://doi.org/10.1504/IJBIDM.2019.096835}, doi = {10.1504/IJBIDM.2019.096835}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbidm/MallikarjunanSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiit/RaviPRSSP19, author = {Nagarathna Ravi and Vimala Rani P and Rajesh Alias Harinarayan R and Mercy Shalinie Selvaraj and Karthick Seshadri and Pariventhan P}, title = {Deep Learning-based Framework for Smart Sustainable Cities: {A} Case-study in Protection from Air Pollution}, journal = {Int. J. Intell. Inf. Technol.}, volume = {15}, number = {4}, pages = {76--107}, year = {2019}, url = {https://doi.org/10.4018/IJIIT.2019100105}, doi = {10.4018/IJIIT.2019100105}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijiit/RaviPRSSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/LilianSRS19, author = {J. Felicia Lilian and K. Sundarakantham and Harine Rajashree and S. Mercy Shalinie}, title = {{SSE:} Semantic Sentence Embedding for learning user interactions}, booktitle = {10th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCCNT45670.2019.8944630}, doi = {10.1109/ICCCNT45670.2019.8944630}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/LilianSRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/RaviPS19, author = {Nagarathna Ravi and Vimala Rani P and S. Mercy Shalinie}, title = {Secure Deep Neural (SeDeN) Framework for 5G Wireless Networks}, booktitle = {10th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCCNT45670.2019.8944654}, doi = {10.1109/ICCCNT45670.2019.8944654}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/RaviPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MurugesanSY18, author = {Vijayalakshmi Murugesan and Mercy Shalinie Selvaraj and Ming{-}Hour Yang}, title = {{HPSIPT:} {A} high-precision single-packet {IP} traceback scheme}, journal = {Comput. Networks}, volume = {143}, pages = {275--288}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.07.013}, doi = {10.1016/J.COMNET.2018.07.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MurugesanSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SeshadriSM18, author = {Karthick Seshadri and Mercy Shalinie Selvaraj and Sidharth Manohar}, title = {A distributed parallel algorithm for inferring hierarchical groups from large-scale text corpuses}, journal = {Concurr. Comput. Pract. Exp.}, volume = {30}, number = {11}, year = {2018}, url = {https://doi.org/10.1002/cpe.4404}, doi = {10.1002/CPE.4404}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/SeshadriSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/MurugesanS18, author = {Vijayalakshmi Murugesan and Mercy Shalinie Selvaraj}, title = {{UDP} based {IP} traceback for flooding DDoS attack}, journal = {Int. Arab J. Inf. Technol.}, volume = {15}, number = {1}, pages = {103--111}, year = {2018}, url = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=126\&\#38;Itemid=451}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/MurugesanS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/MurugesanSY18, author = {Vijayalakshmi Murugesan and Mercy Shalinie and Ming{-}Hour Yang}, title = {Design and analysis of hybrid single packet {IP} traceback scheme}, journal = {{IET} Networks}, volume = {7}, number = {3}, pages = {141--151}, year = {2018}, url = {https://doi.org/10.1049/iet-net.2017.0115}, doi = {10.1049/IET-NET.2017.0115}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-net/MurugesanSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/PrabavathySS18, author = {S. Prabavathy and K. Sundarakantham and S. Mercy Shalinie}, title = {Design of cognitive fog computing for intrusion detection in Internet of Things}, journal = {J. Commun. Networks}, volume = {20}, number = {3}, pages = {291--298}, year = {2018}, url = {https://doi.org/10.1109/JCN.2018.000041}, doi = {10.1109/JCN.2018.000041}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/PrabavathySS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/PrabavathySS18, author = {S. Prabavathy and K. Sundarakantham and S. Mercy Shalinie}, title = {Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure}, journal = {J. Univers. Comput. Sci.}, volume = {24}, number = {5}, pages = {577--602}, year = {2018}, url = {http://www.jucs.org/jucs\_24\_5/design\_of\_cognitive\_fog}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/PrabavathySS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/5gwf/RaviS18, author = {Nagarathna Ravi and Mercy Shalinie Selvaraj}, title = {TeFENS: Testbed For Experimenting Next-Generation-Network Security}, booktitle = {{IEEE} 5G World Forum, 5GWF 2018, Silicon Valley, CA, USA, July 9-11, 2018}, pages = {204--209}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/5GWF.2018.8516708}, doi = {10.1109/5GWF.2018.8516708}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/5gwf/RaviS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/PRSPR18, author = {Vimala Rani P and Nagarathna Ravi and S. Mercy Shalinie and Pariventhan P and K. Rajkumar}, title = {Detecting and Assuaging Against Interest flooding Attack using Statistical Hypothesis Testing in Next Generation {ICN}}, booktitle = {9th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCNT.2018.8494079}, doi = {10.1109/ICCCNT.2018.8494079}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/PRSPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/PRSPR18a, author = {Vimala Rani P and Nagarathna Ravi and S. Mercy Shalinie and Pariventhan P and K. Rajkumar}, title = {Fuzzy Based Congestion-Aware Secure (FuCaS) Route Selection in {ICN}}, booktitle = {9th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCNT.2018.8494121}, doi = {10.1109/ICCCNT.2018.8494121}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/PRSPR18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/RajasekaranSR18, author = {Rajesh Harinarayan Rajasekaran and Mercy Shalinie Selvaraj and Jay Ramanathan}, title = {A Novel Data-Driven {DSSE} Method to Achieve Water Sustainability for Farmers in Madurai District, India}, booktitle = {9th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCNT.2018.8493694}, doi = {10.1109/ICCCNT.2018.8493694}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/RajasekaranSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/MohanaPriyaS17, author = {Pitchai MohanaPriya and S. Mercy Shalinie}, title = {Restricted Boltzmann machine-based cognitive protocol for secure routing in software defined wireless networks}, journal = {{IET} Networks}, volume = {6}, number = {6}, pages = {162--168}, year = {2017}, url = {https://doi.org/10.1049/iet-net.2017.0054}, doi = {10.1049/IET-NET.2017.0054}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/MohanaPriyaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AkilarasuS17, author = {G. Akilarasu and S. Mercy Shalinie}, title = {Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks}, journal = {Wirel. Networks}, volume = {23}, number = {6}, pages = {1709--1718}, year = {2017}, url = {https://doi.org/10.1007/s11276-016-1240-0}, doi = {10.1007/S11276-016-1240-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/AkilarasuS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SeshadriS15, author = {Karthick Seshadri and S. Mercy Shalinie}, title = {Parallelization of a graph-cut based algorithm for hierarchical clustering of web documents}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {17}, pages = {5156--5176}, year = {2015}, url = {https://doi.org/10.1002/cpe.3545}, doi = {10.1002/CPE.3545}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/SeshadriS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/SubramanianGS15, author = {Kiruthika Subramanian and Preetha Gunasekaran and Mercy Selvaraj}, title = {Two layer defending mechanism against {DDOS} attacks}, journal = {Int. Arab J. Inf. Technol.}, volume = {12}, number = {4}, pages = {317--324}, year = {2015}, url = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=99\&\#38;Itemid=376}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/SubramanianGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccc/ASS15, author = {Avelin Diana A. and K. Sundarakantham and S. Mercy Shalinie}, title = {Alleviation of Binding Update Re-registration Handoff Latency at Home Agent Failure in MIPv6 Network}, journal = {Int. J. Comput. Commun. Control}, volume = {10}, number = {4}, pages = {463--470}, year = {2015}, url = {https://doi.org/10.15837/ijccc.2015.4.584}, doi = {10.15837/IJCCC.2015.4.584}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccc/ASS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/SeshadriSK15, author = {Karthick Seshadri and S. Mercy Shalinie and Chidambaram Kollengode}, title = {Design and evaluation of a parallel algorithm for inferring topic hierarchies}, journal = {Inf. Process. Manag.}, volume = {51}, number = {5}, pages = {662--676}, year = {2015}, url = {https://doi.org/10.1016/j.ipm.2015.06.006}, doi = {10.1016/J.IPM.2015.06.006}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/SeshadriSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cods/SeshadriS15, author = {Karthick Seshadri and S. Mercy Shalinie}, editor = {Manish Gupta and Y. Narahari and V. S. Subrahmanian and Indrajit Bhattacharya}, title = {Parallel algorithms for merging topic trees and their application in meta search engines}, booktitle = {Proceedings of the Second {ACM} {IKDD} Conference on Data Sciences, Bangalore, CoDS 2015, India, March 18-21, 2015}, pages = {114--115}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732587.2732605}, doi = {10.1145/2732587.2732605}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cods/SeshadriS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ibica/MohanaPriyaSP15, author = {Pitchai MohanaPriya and S. Mercy Shalinie and Tulika Pandey}, editor = {V{\'{a}}clav Sn{\'{a}}sel and Ajith Abraham and Pavel Kr{\"{o}}mer and Millie Pant and Azah Kamilah Muda}, title = {Restricted Boltzmann Machine Based Energy Efficient Cognitive Network}, booktitle = {Innovations in Bio-Inspired Computing and Applications - Proceedings of the 6th International Conference on Innovations in Bio-Inspired Computing and Applications {(IBICA} 2015) held in Kochi, India during December 16-18, 2015}, series = {Advances in Intelligent Systems and Computing}, volume = {424}, pages = {463--472}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28031-8\_40}, doi = {10.1007/978-3-319-28031-8\_40}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ibica/MohanaPriyaSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/AkilandeswariS14, author = {V. Akilandeswari and S. Mercy Shalinie}, title = {Design of an Adaptive Distributed Critical-Care Extensive Response Network {(AD-CERN)} Using Cooperative Overlay Network}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/754898}, doi = {10.1155/2014/754898}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/AkilandeswariS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ASSL14, author = {Avelin Diana A. and K. Sundarakantham and S. Mercy Shalinie and Rajendran L.}, title = {Analytical model for Binding Refresh Request to reduce storage and communication overhead in MIPv6 network}, journal = {Int. J. Netw. Manag.}, volume = {24}, number = {5}, pages = {402--414}, year = {2014}, url = {https://doi.org/10.1002/nem.1871}, doi = {10.1002/NEM.1871}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ASSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AkilarasuS14, author = {G. Akilarasu and S. Mercy Shalinie}, title = {Trust Based Authentication and Key Establishment for Secure Routing in {WMN}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {12}, pages = {4661--4676}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.12.024}, doi = {10.3837/TIIS.2014.12.024}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/AkilarasuS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/VijayalakshmiS14, author = {Vijayalakshmi Murugesan and S. Mercy Shalinie}, title = {Single Packet {ICMP} Traceback Technique using Router Interface}, journal = {J. Inf. Sci. Eng.}, volume = {30}, number = {6}, pages = {1673--1694}, year = {2014}, url = {http://www.iis.sinica.edu.tw/page/jise/2014/201411\_01.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/VijayalakshmiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sscc/MohanaPriyaAAS14, author = {Pitchai MohanaPriya and V. Akilandeswari and G. Akilarasu and S. Mercy Shalinie}, editor = {Jaime Lloret Mauri and Sabu M. Thampi and Danda B. Rawat and Di Jin}, title = {An Integrated Approach of {E-RED} and {ANT} Classification Methods for DRDoS Attacks}, booktitle = {Security in Computing and Communications - Second International Symposium, {SSCC} 2014, Delhi, India, September 24-27, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {467}, pages = {304--312}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44966-0\_29}, doi = {10.1007/978-3-662-44966-0\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sscc/MohanaPriyaAAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiei/PreethaDS11, author = {G. Preetha and B. S. Kiruthika Devi and S. Mercy Shalinie}, title = {Combat model-based DDoS detection and defence using experimental testbed: a quantitative approach}, journal = {Int. J. Intell. Eng. Informatics}, volume = {1}, number = {3/4}, pages = {261--279}, year = {2011}, url = {https://doi.org/10.1504/IJIEI.2011.044097}, doi = {10.1504/IJIEI.2011.044097}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiei/PreethaDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adcons/TamilselviSTS11, author = {D. Tamilselvi and S. Mercy Shalinie and A. Fathima Thasneem and S. Gomathi Sundari}, editor = {P. Santhi Thilagam and Alwyn Roshan Pais and K. Chandrasekaran and N. Balakrishnan}, title = {Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment}, booktitle = {Advanced Computing, Networking and Security - International Conference, {ADCONS} 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7135}, pages = {263--269}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29280-4\_31}, doi = {10.1007/978-3-642-29280-4\_31}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adcons/TamilselviSTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adcons/RajamPSP11, author = {V. K. Soundar Rajam and B. Sundaresa Pandian and S. Mercy Shalinie and Tulika Pandey}, editor = {P. Santhi Thilagam and Alwyn Roshan Pais and K. Chandrasekaran and N. Balakrishnan}, title = {Application of {IP} Traceback Mechanism to OnlineVoting System}, booktitle = {Advanced Computing, Networking and Security - International Conference, {ADCONS} 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7135}, pages = {621--630}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29280-4\_72}, doi = {10.1007/978-3-642-29280-4\_72}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adcons/RajamPSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcat/SundarakanthamSS10, author = {K. Sundarakantham and N. Sheena and S. Mercy Shalinie}, title = {{SSGL:} a semi-supervised grammar learner}, journal = {Int. J. Comput. Appl. Technol.}, volume = {38}, number = {4}, pages = {259--263}, year = {2010}, url = {https://doi.org/10.1504/IJCAT.2010.034526}, doi = {10.1504/IJCAT.2010.034526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcat/SundarakanthamSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SubbulakshmiSRR10, author = {T. Subbulakshmi and S. Mercy Shalinie and C. Suneel Reddy and A. Ramamoorthi}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Detection and Classification of DDoS Attacks Using Fuzzy Inference System}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {242--252}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_25}, doi = {10.1007/978-3-642-14478-3\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/SubbulakshmiSRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdem/SubbulakshmiSR10, author = {T. Subbulakshmi and S. Mercy Shalinie and A. Ramamoorthi}, editor = {Rajkumar Kannan and Fr{\'{e}}d{\'{e}}ric Andr{\`{e}}s}, title = {Masquerader Classification System with Linux Command Sequences Using Machine Learning Algorithms}, booktitle = {Data Engineering and Management - Second International Conference, {ICDEM} 2010, Tiruchirappalli, India, July 29-31, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6411}, pages = {296--302}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27872-3\_44}, doi = {10.1007/978-3-642-27872-3\_44}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdem/SubbulakshmiSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semcco/PadmavathiSSS10, author = {S. Padmavathi and S. Mercy Shalinie and B. C. Someshwar and T. Sasikumar}, editor = {Bijaya K. Panigrahi and Swagatam Das and Ponnuthurai Nagaratnam Suganthan and Subhransu Sekhar Dash}, title = {Enhanced Memetic Algorithm for Task Scheduling}, booktitle = {Swarm, Evolutionary, and Memetic Computing - First International Conference on Swarm, Evolutionary, and Memetic Computing, {SEMCCO} 2010, Chennai, India, December 16-18, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6466}, pages = {448--459}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17563-3\_54}, doi = {10.1007/978-3-642-17563-3\_54}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/semcco/PadmavathiSSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/KrishnanPS08, author = {Venkatalakshmi Krishnan and Anisha Praisy and Mercy Shalinie}, title = {A Customized Particle Swarm Optimization for Classification of Multispectral Imagery Based on Feature Fusion}, journal = {Int. Arab J. Inf. Technol.}, volume = {5}, number = {4}, pages = {327--333}, year = {2008}, url = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=60\&\#38;Itemid=286}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/KrishnanPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icetet/PadmavathiSS08, author = {S. Padmavathi and M. Suguna and S. Mercy Shalinie}, title = {{DAG} Scheduling on Cluster of Workstations Using Hybrid Particle Swarm Optimization}, booktitle = {First International Conference on Emerging Trends in Engineering and Technology, {ICETET} '08, Nagpur, Maharashtra, India, July 16-18, 2008}, pages = {384--389}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICETET.2008.245}, doi = {10.1109/ICETET.2008.245}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icetet/PadmavathiSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/Shalinie06, author = {S. Mercy Shalinie}, title = {Modeling parallel feed-forward based compression network}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {21}, number = {4}, pages = {227--237}, year = {2006}, url = {https://doi.org/10.1080/17445760600567859}, doi = {10.1080/17445760600567859}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/paapp/Shalinie06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/Shalinie05, author = {S. Mercy Shalinie}, title = {Modeling Connectionist Neuro-Fuzzy network and Applications}, journal = {Neural Comput. Appl.}, volume = {14}, number = {1}, pages = {88--93}, year = {2005}, url = {https://doi.org/10.1007/s00521-004-0452-x}, doi = {10.1007/S00521-004-0452-X}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/Shalinie05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.