Shishir K. Shandilya

Orcid: 0000-0002-3308-4445

According to our database1, Shishir K. Shandilya authored at least 38 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-Step Dynamic Ensemble Selection to Estimate Software Effort.
Appl. Artif. Intell., December, 2024

Towards effective feature selection in estimating software effort using machine learning.
J. Softw. Evol. Process., May, 2024

Nature-inspired adaptive decision support system for secured clustering in cyber networks.
Multim. Tools Appl., January, 2024

Quality and Security of Critical Infrastructure Systems.
Big Data Cogn. Comput., January, 2024

A trusted and adaptive security mechanism for wearable e-healthcare systems.
Int. J. Ad Hoc Ubiquitous Comput., 2024

Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security.
Comput. Syst. Sci. Eng., 2024

2023
A Nature-Inspired Approach to Cryptology
Studies in Computational Intelligence 1122, Springer, ISBN: 978-981-99-7080-3, 2023

Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments.
Wirel. Pers. Commun., 2023

Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense.
Syst., 2023

Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms.
Concurr. Comput. Pract. Exp., 2023

Effective Software Effort Estimation Leveraging Machine Learning for Digital Transformation.
IEEE Access, 2023

2022
SGD-Based Cascade Scheme for Higher Degrees Wiener Polynomial Approximation of Large Biomedical Datasets.
Mach. Learn. Knowl. Extr., December, 2022

Cyber Attack Evaluation Dataset for Deep Packet Inspection and Analysis.
Dataset, September, 2022

Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN.
Wirel. Pers. Commun., 2022

Adaptive Congestion Prediction in Vehicular Ad-hoc Networks (VANET) Using Type-2 Fuzzy Model to Establish Reliable Routes.
Wirel. Pers. Commun., 2022

A Cybertwin-Based 6G Cooperative IoE Communication Network: Secrecy Outage Analysis.
IEEE Trans. Ind. Informatics, 2022

Stochastic modelling and analysis of mobility models for intelligent software defined internet of vehicles.
Phys. Commun., 2022

Paradigm Shift in Adaptive Cyber Defense for Securing the Web Data: The Future Ahead.
J. Web Eng., 2022

Federated Learning-Based Privacy Preservation with Blockchain Assistance in IoT 5G Heterogeneous Networks.
J. Web Eng., 2022

Design and Deployment of Network Testbed for Web Data Security.
J. Cyber Secur. Mobil., 2022

AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis.
Future Gener. Comput. Syst., 2022

An efficient cyber-physical system using hybridized enhanced support-vector machine with Ada-Boost classification algorithm.
Concurr. Comput. Pract. Exp., 2022

Applications of cognitive internet of medical things in modern healthcare.
Comput. Electr. Eng., 2022

Mathematical Simulation of Behavior of Female Breast Consisting Malignant Tumor During Hormonal Changes.
IEEE Access, 2022

Improvised Model for Blockchain in Distributed Cloud Environment.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

Sandbox Environment for Real Time Malware Analysis of IoT Devices.
Proceedings of the Computing Science, Communication and Security, 2022

2021
Novel hybridized crow whale optimization and QoS based bipartite coverage routing for secure data transmission in wireless sensor networks.
J. Intell. Fuzzy Syst., 2021

A Cognitive Personal Assistant System to Enhance the Individual-Centric Research Capabilities.
Int. J. Web Based Learn. Teach. Technol., 2021

Future Applications of Blockchain in Education Sector: A Semantic Review.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Design and Analysis of NICS Based Web Attack Detection for Advanced Intrusion Detection System.
Proceedings of the Knowledge Graphs and Semantic Web, 2021

2020
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting.
Future Internet, 2020

A Machine Learning Method for Recognizing Invasive Content in Memes.
Proceedings of the Knowledge Graphs and Semantic Web, 2020

A Comprehensive Review on Cyber Physical System and Its Applications in Robotic Process Automation.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2020

2019
Data of SemanticWeb as Unit of Knowledge.
J. Web Eng., 2019

Advances in Cyber Security Paradigm: A Review.
Proceedings of the Hybrid Intelligent Systems, 2019

Congestion Control in Vehicular Ad-Hoc Networks (VANET's): A Review.
Proceedings of the Hybrid Intelligent Systems, 2019

PACE: Platform for Android Malware Classification and Performance Evaluation.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2010
A Novel J2ME Service for Mining Incremental Patterns in Mobile Computing.
Proceedings of the Information and Communication Technologies - International Conference, 2010


  Loading...