M.Tech CSE (5 Years integrated – After +2)
Dr. S. Umarani – List of Publications
S.No. | Name of the article | Name of the journal | Volume/Issue | Year of Publication | Links |
---|---|---|---|---|---|
1 | Cancer cell identification based on Oncology image classification using parallel transfer learning algorithms | Frontiers in Health Informatics | Vol 13, Issue 3, ISSN-Online: 2676-7104, pp 10930 to 10948 | 2024 | View |
2 | Binary northern goshawk optimization for feature selection on micro array cancer datasets | Springer Evolving Systems | Volume 15, Issue 2, Pp :1551–1565 | 2024 | View |
3 | Enhancing ATM Accessibility with Voice Assistant | International Journal of Novel Research and Development (IJNRD) | Volume 9, Issue 4, Pp. c343 to 348 ISSN: 2456-4184 | 2024 | View |
4 | Efficient Packet Flow Path Allocation Using Node Proclivity Tracing Algorithm | Lecture Notes in Networks and Systems book series Proceedings of International Conference on Recent Trends in Computing | LNNS, volume 600, Pp: 603-614, Electronic ISSN 2367-3389, Print ISSN 2367-3370 | 2023 | View |
5 | Predicting Distributed Denial of Service Attacks in Machine Learning Field | IEEE | Vol 8, No.10, pp.1769 – 1774, (Annexure-II) (WoS) | 2022 | View |
6 | Biosec - Predicting Distributed Denial of Service Attack in Biological Sciences Applications | Research Journal of Biotechnology | Special Issue, pp. 132-141 | 2017 | View |
7 | Heuristics for Distributed Denial of Services | Asian Journal of Research in Social Science and Humanities | Volume 7, Issue 3, pp. 1289- 1309 ISSN (online): 2249-7315 | 2017 | View |
8 | Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System | International Journal of Inventions in Computer Science and Engineering (IJICSE) | Volume 2, Issue 6, ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431, pp. 29- 37 | 2015 | View |
9 | A State-Space Exploration Mechanism in Revocable Rule-Based Access Control Administrative Policies | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) | Volume 5, Issue 5, pp.262-268 ISSN: 2277 128X. | 2015 | View |
10 | FAC-MACS: Fortified and Revocable Access Control for Multi-Authority Cloud Storage Using CPABE | International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) | Volume 4, Issue 2, pp. 126-132, ISSN 2278-6856 | 2015 | View |
11 | Predicting Application Layer DDoS Attacks Using Machine Learning Algorithms | International Journal of Computer, Information, Systems and Control Engineering, World Academy of Science, Engineering and Technology, International Science Index 94 | Vol 8, No.10, pp.1769 – 1774 (Annexure-II) (WoS) | 2014 | View |
12 | Detecting and Preventing the Packet for Trace Back DDoS Attack in Mobile Ad-Hoc Network | Journal of Recent Research in Engineering and Technology | Vol 1, Issue 6, ISSN (Online): 2349 –2252 | 2014 | View |
13 | A Survey on Administrative Policies in Rule- Based Access Control | International Journal of Computer Science & Engineering Technology (IJCSET) | Vol 5, Issue 11,pp 1071- 1075, ISSN: 2229-3345 | 2014 | View |
14 | Location Based Mobile Secure Social Networks | International Journal of Innovative Research in Computer and Communication Engineering | Vol 2, Issue 1, ISSN(Online): 2320- 9801, pp 4061-4066, | 2014 | View |