D. Shalini Punithavathani

According to our database1, D. Shalini Punithavathani authored at least 14 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Enhancing Detection of R2L Attacks by Multistage Clustering Based Outlier Detection.
Wirel. Pers. Commun., 2022

Composite analysis of web pages in adaptive environment through Modified Salp Swarm algorithm to rank the web pages.
J. Ambient Intell. Humaniz. Comput., 2022

2020
Designing a New Scalable Autoconfiguration Protocol with Optimal Header Selection for Large Scale MANETs.
J. Circuits Syst. Comput., 2020

An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions.
Int. J. Inf. Secur. Priv., 2020

Grey wolf optimiser-based feature selection for feature-level multi-focus image fusion.
Int. J. Bus. Intell. Data Min., 2020

Online products recommendation system using genetic kernel fuzzy C-means and probabilistic neural network.
Int. J. Bus. Intell. Data Min., 2020

2018
A Hybrid Feature Selection Method for Improved Detection of Wired/Wireless Network Intrusions.
Wirel. Pers. Commun., 2018

Optimized ensemble decision-based multi-focus imagefusion using binary genetic Grey-Wolf optimizer in camera sensor networks.
Multim. Tools Appl., 2018

Implementation of memory-efficient linear pipelined IPv6 lookup and its significance in smart cities.
Comput. Electr. Eng., 2018

2017
Hybrid Data Aggregation Technique to Categorize the Web Users to Discover Knowledge About the Web Users.
Wirel. Pers. Commun., 2017

Performance Improvement of Proxy Mobile IPv6 for the Support of Multi-homing.
Wirel. Pers. Commun., 2017

Potential position node placement approach via oppositional gravitational search for fulfill coverage and connectivity in target based wireless sensor networks.
Wirel. Networks, 2017

2016
Green Computing in WAN Through Intensified Teredo IPv6 Tunneling to Route Multifarious Symmetric NAT.
Wirel. Pers. Commun., 2016

2015
Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence.
Clust. Comput., 2015


  Loading...