Sanjay Silakari

According to our database1, Sanjay Silakari authored at least 27 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Novel Approach to Hide Sensitive Association Rules by Introducing Transaction Affinity.
Comput. Informatics, 2023

2022
Distributed Multilevel k-Coverage Energy-Efficient Fault-Tolerant Scheduling for Wireless Sensor Networks.
Wirel. Pers. Commun., 2022

2021
Adaptive Neuro Fuzzy Interference and PNN Memory Based Grey Wolf Optimization Algorithm for Optimal Load Balancing.
Wirel. Pers. Commun., 2021

Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review.
Comput. Sci. Rev., 2021

2015
Recent Advancement in Machine Learning Based Internet Traffic Classification.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015

2014
FRPSO: Fletcher-Reeves based particle swarm optimization for multimodal function optimization.
Soft Comput., 2014

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework.
Int. J. Networked Distributed Comput., 2014

Teaching Learning Based Optimization (TLBO) Based Improved Iris Recognition System.
Proceedings of the Progress in Systems Engineering, 2014

2013
A Survey: Various Techniques of Image Compression.
CoRR, 2013

2012
Novel Approach for fast Compressed Hybrid color image Cryptosystem.
Adv. Eng. Softw., 2012

2011
New Approach for Fast Color Image Encryption Using Chaotic Map.
J. Information Security, 2011

2009
Design of Intelligent layer for flexible querying in databases
CoRR, 2009

An ensemble approach for feature selection of Cyber Attack Dataset
CoRR, 2009

Generalized Discriminant Analysis algorithm for feature reduction in Cyber Attack Detection System
CoRR, 2009

Color Image Clustering using Block Truncation Algorithm
CoRR, 2009

Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks
CoRR, 2009

Network Security Scheme for Wireless Sensor Networks using Efficient CSMA MAC Layer Protocol.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

An Ethical Way of Encrypt Data Transfer in Bluetooth Mobile Using Chaos Based Feedback Technique.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Survey for Designing Attack Resilient and Adaptive Medium Access Control Protocol for Wireless Networks.
Proceedings of the First International Conference on Computational Intelligence, 2009

An Adaptive Medium Access Control Protocol for Computer Network.
Proceedings of the First International Conference on Computational Intelligence, 2009

Integration of Artificial Intelligence and Database Management System: An Inventive Approach for Intelligent Databases.
Proceedings of the First International Conference on Computational Intelligence, 2009

Image Clustering Using Color and Texture.
Proceedings of the First International Conference on Computational Intelligence, 2009

An Ethical Way of Image Encryption Using ECC.
Proceedings of the First International Conference on Computational Intelligence, 2009

2008
Multi-User FPGA - An Efficient Way of Managing Expensive FPGA Resources Using TCP/IP, Wi-Max/ Wi-Fi in a Secure Network Environment.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2005
Transference and Storage of Spatial Data in Distributed Wireless GIS.
Proceedings of the Wireless Information Systems, 2005

2004
Efficient Proxy Server Caching Using Web Usage Mining Technique on Web Logs - for Improving Hit Rate and Response Time.
Proceedings of the ICETE 2004, 2004

A Cost-Effective Iris Recognition System Using Linear Discriminant Analysis and Cross-Correlation Techniques.
Proceedings of the ICETE 2004, 2004


  Loading...