Mercy Shalinie Selvaraj

Orcid: 0000-0003-3542-1879

According to our database1, Mercy Shalinie Selvaraj authored at least 61 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RISE : Privacy preserved data analytics using Regularized Inference Specific autoEncoder.
Eng. Appl. Artif. Intell., 2024

SDN Defense: Detection and mitigation of DDoS attack via IoT Network.
Proceedings of the 25th International Conference on Distributed Computing and Networking, 2024

2023
An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers.
IEEE Syst. J., September, 2023

A hybrid deep learning framework for privacy preservation in edge computing.
Comput. Secur., June, 2023

A review of generative and non-generative adversarial attack on context-rich images.
Eng. Appl. Artif. Intell., 2023

Proof-of-Improved-Participation: A New Consensus Protocol for Blockchain Technology.
Comput. Syst. Sci. Eng., 2023

2022
A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic.
Wirel. Pers. Commun., 2022

Contactless Credit Cards Payment Fraud Protection by Ambient Authentication.
Sensors, 2022

A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol.
Secur. Commun. Networks, 2022

Cost Effective Decentralized Key Management Framework for IoT.
Comput. Syst. Sci. Eng., 2022

A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric.
Comput. Secur., 2022

2021
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.
IEEE Trans. Netw. Serv. Manag., 2021

Anti-negation method for handling negation words in question answering system.
J. Supercomput., 2021

BlackNurse-SC: A Novel Attack on SDN Controller.
IEEE Commun. Lett., 2021

Exploiting Queue-driven Cache Replacement Technique for Thwarting Pollution Attack in ICN.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2020
BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN.
IEEE Trans. Netw. Serv. Manag., 2020

Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network.
IEEE Internet Things J., 2020

Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture.
IEEE Internet Things J., 2020

Deep learning framework for early detection of intrusion in virtual environment.
Int. J. Bus. Intell. Data Min., 2020

Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions.
IET Networks, 2020

Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices.
IEEE Access, 2020

2019
Deep Learning-based Framework for Smart Sustainable Cities: A Case-study in Protection from Air Pollution.
Int. J. Intell. Inf. Technol., 2019

BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling.
Int. J. Bus. Intell. Data Min., 2019

Design and evaluation of a parallel document clustering algorithm based on hierarchical latent semantic analysis.
Concurr. Comput. Pract. Exp., 2019

Privacy preserving auditing protocol for remote data storage.
Clust. Comput., 2019

Secure Deep Neural (SeDeN) Framework for 5G Wireless Networks.
Proceedings of the 10th International Conference on Computing, 2019

SSE: Semantic Sentence Embedding for learning user interactions.
Proceedings of the 10th International Conference on Computing, 2019

2018
Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure.
J. Univers. Comput. Sci., 2018

Design of cognitive fog computing for intrusion detection in Internet of Things.
J. Commun. Networks, 2018

Design and analysis of hybrid single packet IP traceback scheme.
IET Networks, 2018

UDP based IP traceback for flooding DDoS attack.
Int. Arab J. Inf. Technol., 2018

A distributed parallel algorithm for inferring hierarchical groups from large-scale text corpuses.
Concurr. Comput. Pract. Exp., 2018

HPSIPT: A high-precision single-packet IP traceback scheme.
Comput. Networks, 2018

A Novel Data-Driven DSSE Method to Achieve Water Sustainability for Farmers in Madurai District, India.
Proceedings of the 9th International Conference on Computing, 2018

Fuzzy Based Congestion-Aware Secure (FuCaS) Route Selection in ICN.
Proceedings of the 9th International Conference on Computing, 2018

Detecting and Assuaging Against Interest flooding Attack using Statistical Hypothesis Testing in Next Generation ICN.
Proceedings of the 9th International Conference on Computing, 2018

TeFENS: Testbed For Experimenting Next-Generation-Network Security.
Proceedings of the IEEE 5G World Forum, 2018

2017
Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks.
Wirel. Networks, 2017

Restricted Boltzmann machine-based cognitive protocol for secure routing in software defined wireless networks.
IET Networks, 2017

2015
Design and evaluation of a parallel algorithm for inferring topic hierarchies.
Inf. Process. Manag., 2015

Alleviation of Binding Update Re-registration Handoff Latency at Home Agent Failure in MIPv6 Network.
Int. J. Comput. Commun. Control, 2015

Two layer defending mechanism against DDOS attacks.
Int. Arab J. Inf. Technol., 2015

Parallelization of a graph-cut based algorithm for hierarchical clustering of web documents.
Concurr. Comput. Pract. Exp., 2015

Restricted Boltzmann Machine Based Energy Efficient Cognitive Network.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2015

Parallel algorithms for merging topic trees and their application in meta search engines.
Proceedings of the Second ACM IKDD Conference on Data Sciences, 2015

2014
Single Packet ICMP Traceback Technique using Router Interface.
J. Inf. Sci. Eng., 2014

Trust Based Authentication and Key Establishment for Secure Routing in WMN.
KSII Trans. Internet Inf. Syst., 2014

Analytical model for Binding Refresh Request to reduce storage and communication overhead in MIPv6 network.
Int. J. Netw. Manag., 2014

Design of an Adaptive Distributed Critical-Care Extensive Response Network (AD-CERN) Using Cooperative Overlay Network.
Int. J. Distributed Sens. Networks, 2014

An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks.
Proceedings of the Security in Computing and Communications, 2014

2011
Combat model-based DDoS detection and defence using experimental testbed: a quantitative approach.
Int. J. Intell. Eng. Informatics, 2011

Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Application of IP Traceback Mechanism to OnlineVoting System.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

2010
SSGL: a semi-supervised grammar learner.
Int. J. Comput. Appl. Technol., 2010

Enhanced Memetic Algorithm for Task Scheduling.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2010

Masquerader Classification System with Linux Command Sequences Using Machine Learning Algorithms.
Proceedings of the Data Engineering and Management - Second International Conference, 2010

Detection and Classification of DDoS Attacks Using Fuzzy Inference System.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2008
A Customized Particle Swarm Optimization for Classification of Multispectral Imagery Based on Feature Fusion.
Int. Arab J. Inf. Technol., 2008

DAG Scheduling on Cluster of Workstations Using Hybrid Particle Swarm Optimization.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2006
Modeling parallel feed-forward based compression network.
Int. J. Parallel Emergent Distributed Syst., 2006

2005
Modeling Connectionist Neuro-Fuzzy network and Applications.
Neural Comput. Appl., 2005


  Loading...