fbpx

M.Tech CSE (5 Years integrated – After +2)

Dr. S. Umarani – List of Publications
S.No.Name of the articleName of the journalVolume/IssueYear of PublicationLinks
1Cancer cell identification based on Oncology image classification using parallel transfer learning algorithmsFrontiers in Health InformaticsVol 13, Issue 3, ISSN-Online: 2676-7104, pp 10930 to 109482024View
2Binary northern goshawk optimization for feature selection on micro array cancer datasetsSpringer Evolving Systems Volume 15, Issue 2, Pp :1551–15652024View
3Enhancing ATM Accessibility with Voice AssistantInternational Journal of Novel Research and Development (IJNRD)Volume 9, Issue 4, Pp. c343 to 348 ISSN: 2456-41842024View
4Efficient Packet Flow Path Allocation Using Node Proclivity Tracing AlgorithmLecture Notes in Networks and Systems book series Proceedings of International Conference on Recent Trends in Computing LNNS, volume 600, Pp: 603-614, Electronic ISSN 2367-3389, Print ISSN 2367-33702023View
5Predicting Distributed Denial of Service Attacks in Machine Learning FieldIEEEVol 8, No.10, pp.1769 – 1774, (Annexure-II) (WoS)2022View
6Biosec - Predicting Distributed Denial of Service Attack in Biological Sciences ApplicationsResearch Journal of BiotechnologySpecial Issue, pp. 132-1412017View
7Heuristics for Distributed Denial of ServicesAsian Journal of Research in Social Science and HumanitiesVolume 7, Issue 3, pp. 1289- 1309
ISSN (online): 2249-7315
2017View
8Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune SystemInternational Journal of Inventions in Computer Science and Engineering (IJICSE)Volume 2, Issue 6,
ISSN (Online): 2348 – 3539,
ISSN (Print): 2348 – 3431, pp. 29- 37
2015View
9A State-Space Exploration Mechanism in Revocable Rule-Based Access Control Administrative PoliciesInternational Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)Volume 5, Issue 5, pp.262-268
ISSN: 2277 128X.
2015View
10FAC-MACS: Fortified and Revocable Access Control for Multi-Authority Cloud Storage Using CPABEInternational Journal of Emerging Trends & Technology in Computer Science (IJETTCS)Volume 4, Issue 2, pp. 126-132, ISSN 2278-68562015View
11Predicting Application Layer DDoS Attacks Using Machine Learning AlgorithmsInternational Journal of Computer, Information, Systems and Control Engineering, World Academy of Science, Engineering and Technology, International Science Index 94Vol 8, No.10, pp.1769 – 1774 (Annexure-II) (WoS)2014View
12Detecting and Preventing the Packet for Trace Back DDoS Attack in Mobile Ad-Hoc NetworkJournal of Recent Research in Engineering and TechnologyVol 1, Issue 6, ISSN (Online): 2349 –22522014View
13A Survey on Administrative Policies in Rule- Based Access ControlInternational Journal of Computer Science & Engineering Technology (IJCSET)Vol 5, Issue 11,pp 1071- 1075, ISSN: 2229-33452014View
14Location Based Mobile Secure Social NetworksInternational Journal of Innovative Research in Computer and Communication EngineeringVol 2, Issue 1,
ISSN(Online): 2320- 9801, pp 4061-4066,
2014View
× Admission 2025-26