default search action
Mercy Shalinie Selvaraj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]K. Narasimha Mallikarjunan, Harine Rajashree, K. Sundarakantham, Mercy Shalinie Selvaraj:
RISE : Privacy preserved data analytics using Regularized Inference Specific autoEncoder. Eng. Appl. Artif. Intell. 133: 108384 (2024) - [c17]K. Rajkumar, Mercy Shalinie Selvaraj, Hamil Stanly:
SDN Defense: Detection and mitigation of DDoS attack via IoT Network. ICDCN 2024: 371-376 - 2023
- [j43]Harine Rajashree, K. Sundarakantham, E. Sivasankar, Mercy Shalinie Selvaraj:
A hybrid deep learning framework for privacy preservation in edge computing. Comput. Secur. 129: 103209 (2023) - [j42]N. Anita, M. Vijayalakshmi, S. Mercy Shalinie:
Proof-of-Improved-Participation: A New Consensus Protocol for Blockchain Technology. Comput. Syst. Sci. Eng. 44(3): 2007-2018 (2023) - [j41]Hamil Stanly, S. Mercy Shalinie, Riji Paul:
A review of generative and non-generative adversarial attack on context-rich images. Eng. Appl. Artif. Intell. 124: 106595 (2023) - [j40]Ming-Hour Yang, Chien-Hung Chen, Jia-Ning Luo, M. Vijayalakshmi, S. Mercy Shalinie:
An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers. IEEE Syst. J. 17(3): 3611-3622 (2023) - 2022
- [j39]J. Dharani, K. Sundarakantham, Kunwar Singh, S. Mercy Shalinie:
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric. Comput. Secur. 116: 102637 (2022) - [j38]Raja Lavanya, K. Sundarakantham, S. Mercy Shalinie:
Cost Effective Decentralized Key Management Framework for IoT. Comput. Syst. Sci. Eng. 41(3): 1057-1070 (2022) - [j37]Vijayalakshmi Murugesan, S. Mercy Shalinie, Ming-Hour Yang, Shou-Chuan Lai, Jia-Ning Luo:
A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol. Secur. Commun. Networks 2022: 9377818:1-9377818:12 (2022) - [j36]Ming-Hour Yang, Jia-Ning Luo, Vijayalakshmi Murugesan, Mercy Shalinie Selvaraj:
Contactless Credit Cards Payment Fraud Protection by Ambient Authentication. Sensors 22(5): 1989 (2022) - [j35]Anita N, Vijayalakshmi Murugesan, S. Mercy Shalinie:
A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic. Wirel. Pers. Commun. 125(3): 2129-2146 (2022) - 2021
- [j34]Nagarathna Ravi, S. Mercy Shalinie:
BlackNurse-SC: A Novel Attack on SDN Controller. IEEE Commun. Lett. 25(7): 2146-2150 (2021) - [j33]J. Felicia Lilian, K. Sundarakantham, S. Mercy Shalinie:
Anti-negation method for handling negation words in question answering system. J. Supercomput. 77(5): 4244-4266 (2021) - [j32]Nagarathna Ravi, S. Mercy Shalinie, Chhagan Lal, Mauro Conti:
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller. IEEE Trans. Netw. Serv. Manag. 18(1): 745-759 (2021) - [c16]Vimala Rani P, Abishek Joshua T, K. Narasimma Mallikaarjunan, Rajesh Alias Harinarayan R, J. Dharani, Mercy Shalinie Selvaraj:
Exploiting Queue-driven Cache Replacement Technique for Thwarting Pollution Attack in ICN. ICCCNT 2021: 1-7 - 2020
- [j31]Ming-Hour Yang, Jia-Ning Luo, Vijayalakshmi Murugesan, S. Mercy Shalinie:
Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices. IEEE Access 8: 201087-201097 (2020) - [j30]Vijayalakshmi Murugesan, S. Mercy Shalinie, Ming-Hour Yang, Raja Meenakshi U.:
Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions. IET Networks 9(5): 235-246 (2020) - [j29]G. Madhu Priya, S. Mercy Shalinie, P. Mohana Priya:
Deep learning framework for early detection of intrusion in virtual environment. Int. J. Bus. Intell. Data Min. 17(3): 393-411 (2020) - [j28]Nagarathna Ravi, S. Mercy Shalinie:
Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture. IEEE Internet Things J. 7(4): 3559-3570 (2020) - [j27]Nagarathna Ravi, S. Mercy Shalinie:
Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network. IEEE Internet Things J. 7(11): 11041-11052 (2020) - [j26]Nagarathna Ravi, S. Mercy Shalinie, D. Danyson Jose Theres:
BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN. IEEE Trans. Netw. Serv. Manag. 17(3): 1715-1729 (2020)
2010 – 2019
- 2019
- [j25]M. Suguna, S. Mercy Shalinie:
Privacy preserving auditing protocol for remote data storage. Clust. Comput. 22(Supplement): 6891-6898 (2019) - [j24]Karthick Seshadri, K. Viswanathan Iyer, Mercy Shalinie Selvaraj:
Design and evaluation of a parallel document clustering algorithm based on hierarchical latent semantic analysis. Concurr. Comput. Pract. Exp. 31(13) (2019) - [j23]K. Narasimha Mallikarjunan, S. Mercy Shalinie, A. Bhuvaneshwaran:
BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling. Int. J. Bus. Intell. Data Min. 14(1/2): 177-198 (2019) - [j22]Nagarathna Ravi, Vimala Rani P, Rajesh Alias Harinarayan R, Mercy Shalinie Selvaraj, Karthick Seshadri, Pariventhan P:
Deep Learning-based Framework for Smart Sustainable Cities: A Case-study in Protection from Air Pollution. Int. J. Intell. Inf. Technol. 15(4): 76-107 (2019) - [c15]J. Felicia Lilian, K. Sundarakantham, Harine Rajashree, S. Mercy Shalinie:
SSE: Semantic Sentence Embedding for learning user interactions. ICCCNT 2019: 1-5 - [c14]Nagarathna Ravi, Vimala Rani P, S. Mercy Shalinie:
Secure Deep Neural (SeDeN) Framework for 5G Wireless Networks. ICCCNT 2019: 1-6 - 2018
- [j21]Vijayalakshmi Murugesan, Mercy Shalinie Selvaraj, Ming-Hour Yang:
HPSIPT: A high-precision single-packet IP traceback scheme. Comput. Networks 143: 275-288 (2018) - [j20]Karthick Seshadri, Mercy Shalinie Selvaraj, Sidharth Manohar:
A distributed parallel algorithm for inferring hierarchical groups from large-scale text corpuses. Concurr. Comput. Pract. Exp. 30(11) (2018) - [j19]Vijayalakshmi Murugesan, Mercy Shalinie Selvaraj:
UDP based IP traceback for flooding DDoS attack. Int. Arab J. Inf. Technol. 15(1): 103-111 (2018) - [j18]Vijayalakshmi Murugesan, Mercy Shalinie, Ming-Hour Yang:
Design and analysis of hybrid single packet IP traceback scheme. IET Networks 7(3): 141-151 (2018) - [j17]S. Prabavathy, K. Sundarakantham, S. Mercy Shalinie:
Design of cognitive fog computing for intrusion detection in Internet of Things. J. Commun. Networks 20(3): 291-298 (2018) - [j16]S. Prabavathy, K. Sundarakantham, S. Mercy Shalinie:
Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure. J. Univers. Comput. Sci. 24(5): 577-602 (2018) - [c13]Nagarathna Ravi, Mercy Shalinie Selvaraj:
TeFENS: Testbed For Experimenting Next-Generation-Network Security. 5G World Forum 2018: 204-209 - [c12]Vimala Rani P, Nagarathna Ravi, S. Mercy Shalinie, Pariventhan P, K. Rajkumar:
Detecting and Assuaging Against Interest flooding Attack using Statistical Hypothesis Testing in Next Generation ICN. ICCCNT 2018: 1-7 - [c11]Vimala Rani P, Nagarathna Ravi, S. Mercy Shalinie, Pariventhan P, K. Rajkumar:
Fuzzy Based Congestion-Aware Secure (FuCaS) Route Selection in ICN. ICCCNT 2018: 1-7 - [c10]Rajesh Harinarayan Rajasekaran, Mercy Shalinie Selvaraj, Jay Ramanathan:
A Novel Data-Driven DSSE Method to Achieve Water Sustainability for Farmers in Madurai District, India. ICCCNT 2018: 1-7 - 2017
- [j15]Pitchai MohanaPriya, S. Mercy Shalinie:
Restricted Boltzmann machine-based cognitive protocol for secure routing in software defined wireless networks. IET Networks 6(6): 162-168 (2017) - [j14]G. Akilarasu, S. Mercy Shalinie:
Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks. Wirel. Networks 23(6): 1709-1718 (2017) - 2015
- [j13]Karthick Seshadri, S. Mercy Shalinie:
Parallelization of a graph-cut based algorithm for hierarchical clustering of web documents. Concurr. Comput. Pract. Exp. 27(17): 5156-5176 (2015) - [j12]Kiruthika Subramanian, Preetha Gunasekaran, Mercy Selvaraj:
Two layer defending mechanism against DDOS attacks. Int. Arab J. Inf. Technol. 12(4): 317-324 (2015) - [j11]Avelin Diana A., K. Sundarakantham, S. Mercy Shalinie:
Alleviation of Binding Update Re-registration Handoff Latency at Home Agent Failure in MIPv6 Network. Int. J. Comput. Commun. Control 10(4): 463-470 (2015) - [j10]Karthick Seshadri, S. Mercy Shalinie, Chidambaram Kollengode:
Design and evaluation of a parallel algorithm for inferring topic hierarchies. Inf. Process. Manag. 51(5): 662-676 (2015) - [c9]Karthick Seshadri, S. Mercy Shalinie:
Parallel algorithms for merging topic trees and their application in meta search engines. CODS 2015: 114-115 - [c8]Pitchai MohanaPriya, S. Mercy Shalinie, Tulika Pandey:
Restricted Boltzmann Machine Based Energy Efficient Cognitive Network. IBICA 2015: 463-472 - 2014
- [j9]V. Akilandeswari, S. Mercy Shalinie:
Design of an Adaptive Distributed Critical-Care Extensive Response Network (AD-CERN) Using Cooperative Overlay Network. Int. J. Distributed Sens. Networks 10 (2014) - [j8]Avelin Diana A., K. Sundarakantham, S. Mercy Shalinie, Rajendran L.:
Analytical model for Binding Refresh Request to reduce storage and communication overhead in MIPv6 network. Int. J. Netw. Manag. 24(5): 402-414 (2014) - [j7]G. Akilarasu, S. Mercy Shalinie:
Trust Based Authentication and Key Establishment for Secure Routing in WMN. KSII Trans. Internet Inf. Syst. 8(12): 4661-4676 (2014) - [j6]Vijayalakshmi Murugesan, S. Mercy Shalinie:
Single Packet ICMP Traceback Technique using Router Interface. J. Inf. Sci. Eng. 30(6): 1673-1694 (2014) - [c7]Pitchai MohanaPriya, V. Akilandeswari, G. Akilarasu, S. Mercy Shalinie:
An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks. SSCC 2014: 304-312 - 2011
- [j5]G. Preetha, B. S. Kiruthika Devi, S. Mercy Shalinie:
Combat model-based DDoS detection and defence using experimental testbed: a quantitative approach. Int. J. Intell. Eng. Informatics 1(3/4): 261-279 (2011) - [c6]D. Tamilselvi, S. Mercy Shalinie, A. Fathima Thasneem, S. Gomathi Sundari:
Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment. ADCONS 2011: 263-269 - [c5]V. K. Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie, Tulika Pandey:
Application of IP Traceback Mechanism to OnlineVoting System. ADCONS 2011: 621-630 - 2010
- [j4]K. Sundarakantham, N. Sheena, S. Mercy Shalinie:
SSGL: a semi-supervised grammar learner. Int. J. Comput. Appl. Technol. 38(4): 259-263 (2010) - [c4]T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi:
Detection and Classification of DDoS Attacks Using Fuzzy Inference System. CNSA 2010: 242-252 - [c3]T. Subbulakshmi, S. Mercy Shalinie, A. Ramamoorthi:
Masquerader Classification System with Linux Command Sequences Using Machine Learning Algorithms. ICDEM 2010: 296-302 - [c2]S. Padmavathi, S. Mercy Shalinie, B. C. Someshwar, T. Sasikumar:
Enhanced Memetic Algorithm for Task Scheduling. SEMCCO 2010: 448-459
2000 – 2009
- 2008
- [j3]Venkatalakshmi Krishnan, Anisha Praisy, Mercy Shalinie:
A Customized Particle Swarm Optimization for Classification of Multispectral Imagery Based on Feature Fusion. Int. Arab J. Inf. Technol. 5(4): 327-333 (2008) - [c1]S. Padmavathi, M. Suguna, S. Mercy Shalinie:
DAG Scheduling on Cluster of Workstations Using Hybrid Particle Swarm Optimization. ICETET 2008: 384-389 - 2006
- [j2]S. Mercy Shalinie:
Modeling parallel feed-forward based compression network. Int. J. Parallel Emergent Distributed Syst. 21(4): 227-237 (2006) - 2005
- [j1]S. Mercy Shalinie:
Modeling Connectionist Neuro-Fuzzy network and Applications. Neural Comput. Appl. 14(1): 88-93 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint