Shashikala Tapaswi

Orcid: 0000-0002-6830-2895

  • Atal Bihari Vajpayee Indian Institute of Information Technology and Management, Gwalior, India

According to our database1, Shashikala Tapaswi authored at least 96 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Improved Child Safety Using Edge-Fog-Cloud Enabled Smart IoT Wearable Device: An Architecture.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

Intelligent Emergency Evacuation System for Industrial Environments Using IoT-Enabled WSNs.
IEEE Trans. Instrum. Meas., 2023

A Novel Technique for Gateway Selection in Hybrid MANET Using Genetic Algorithm.
Wirel. Pers. Commun., 2022

Bounding function for fast computation of transmission in single image dehazing.
Multim. Tools Appl., 2022

Intelligent Fault-Tolerance Data Routing Scheme for IoT-Enabled WSNs.
IEEE Internet Things J., 2022

A Survey on Path Planning Techniques for Mobile Sink in IoT-Enabled Wireless Sensor Networks.
Wirel. Pers. Commun., 2021

A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack.
Wirel. Networks, 2021

Estimation of minimum color channel using difference channel in single image Dehazing.
Multim. Tools Appl., 2021

An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment.
J. Netw. Syst. Manag., 2021

Multi-objective particle swarm optimization based rendezvous point selection for the energy and delay efficient networked wireless sensor data acquisition.
J. Netw. Comput. Appl., 2021

An Impact Analysis and Detection of HTTP Flooding Attack in Cloud Using Bio-Inspired Clustering Approach.
Int. J. Swarm Intell. Res., 2021

Optimal rendezvous points selection to reliably acquire data from wireless sensor networks using mobile sink.
Computing, 2021

A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment.
Clust. Comput., 2021

AVDR: A Framework for Migration Policy to Handle DDoS Attacked VM in Cloud.
Wirel. Pers. Commun., 2020

Multipath Delay Analysis Using Queuing Theory for Gateway Selection in Hybrid MANET.
Wirel. Pers. Commun., 2020

Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform.
Wirel. Pers. Commun., 2020

Virtual grid-based rendezvous point and sojourn location selection for energy and delay efficient data acquisition in wireless sensor networks with mobile sink.
Wirel. Networks, 2020

A review on rendezvous based data acquisition methods in wireless sensor networks with mobile sink.
Wirel. Networks, 2020

Tight lower bound on transmission for single image dehazing.
Vis. Comput., 2020

Lower Bound on Transmission Using Non-Linear Bounding Function in Single Image Dehazing.
IEEE Trans. Image Process., 2020

Adaptive dehazing control factor based fast single image dehazing.
Multim. Tools Appl., 2020

Malware Detection in PDF and Office Documents: A survey.
Inf. Secur. J. A Glob. Perspect., 2020

A proactive defense method for the stealthy EDoS attacks in a cloud environment.
Int. J. Netw. Manag., 2020

PSO-Based Rendezvous Point Selection for Delay Efficient Trajectory Formation for Mobile Sink in Wireless Sensor Networks.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

A Detailed Study on Internet Connectivity Schemes for Mobile ad Hoc Network.
Wirel. Pers. Commun., 2019

A Green Multicast Routing Algorithm for Smart Sensor Networks in Disaster Management.
IEEE Trans. Green Commun. Netw., 2019

A trustworthy agent-based encrypted access control method for mobile cloud computing environment.
Pervasive Mob. Comput., 2019

FZ enabled Multi-objective PSO for multicasting in IoT based Wireless Sensor Networks.
Inf. Sci., 2019

Forensic analysis of Google Allo messenger on Android platform.
Inf. Comput. Secur., 2019

Novel routing mechanism for IoT-based emergency rescue scenarios.
Int. J. Mob. Commun., 2019

Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges.
IEEE Commun. Surv. Tutorials, 2019

Bio-inspired energy conserving adaptive power and rate control in MANET.
Computing, 2019

Rendezvous Point based Delay-efficient Trajectory Formation for Mobile Sink in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Computing, 2019

Gateway load balancing using multiple QoS parameters in a hybrid MANET.
Wirel. Networks, 2018

An improved linear depth model for single image fog removal.
Multim. Tools Appl., 2018

Low rate cloud DDoS attack defense method based on power spectral density analysis.
Inf. Process. Lett., 2018

A Resource Efficient Expectation Maximization Clustering Approach for Cloud.
Comput. J., 2018

Optimized power control and efficient energy conservation for topology management of MANET with an adaptive Gabriel graph.
Comput. Electr. Eng., 2018

Forwarding Zone enabled PSO routing with Network lifetime maximization in MANET.
Appl. Intell., 2018

Enhanced Gateway Deployment Scheme for Load Balancing in Heterogeneous Networks.
Proceedings of the 9th International Conference on Computing, 2018

Modeling of an Efficient Integration of MANET and Internet Using Queuing Theory.
Wirel. Pers. Commun., 2017

The impact of mobility and node capacity on voice traffic.
Int. J. Syst. Assur. Eng. Manag., 2017

Voice performance analysis using voice codec by packet fragmentation and contention free periods in wireless networks.
Int. J. Syst. Assur. Eng. Manag., 2017

New cloud offloading algorithm for better energy consumption and process time.
Int. J. Syst. Assur. Eng. Manag., 2017

Investigation of the AODV and the SDWCA QoS handling at different utilisation levels in adaptive clustering environments.
Int. J. Syst. Assur. Eng. Manag., 2017

Defense schemes for variants of distributed denial-of-service (DDoS) attacks in cloud computing: A survey.
Inf. Secur. J. A Glob. Perspect., 2017

The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network.
Int. J. Wirel. Inf. Networks, 2017

A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

Mobility prediction in mobile ad hoc networks using a lightweight genetic algorithm.
Wirel. Networks, 2016

Light weight security protocol for communications in vehicular networks.
Wirel. Networks, 2016

Vehicular Rogue Access Point Detection Using Speed of Vehicle.
Wirel. Pers. Commun., 2015

Energy and Time Efficient Algorithm for Cloud Offloading Using Dynamic Profiling.
Wirel. Pers. Commun., 2015

Wireless Rogue Access Point Detection Using Shadow Honeynet.
Wirel. Pers. Commun., 2015

Logical acquisition and analysis of data from android mobile devices.
Inf. Comput. Secur., 2015

Markov Chain Based Roaming Schemes for Honeypots.
Wirel. Pers. Commun., 2014

An Adaptative Energy Efficient Routing Protocol for MANET.
J. Networks, 2014

Virtual machine introspection: towards bridging the semantic gap.
J. Cloud Comput., 2014

Trust evaluation in wireless ad-hoc networks using fuzzy system.
Comput. Syst. Sci. Eng., 2014

A secured alternative path routing protocol against DoS attack.
Proceedings of the Eleventh International Conference on Wireless and Optical Communications Networks, 2014

Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2013

RSS Fingerprints Based Distributed Semi-Supervised Locally Linear Embedding (DSSLLE) Location Estimation System for Indoor WLAN.
Wirel. Pers. Commun., 2013

Performance Analysis of Received Signal Strength Fingerprinting Based Distributed Location Estimation System for Indoor WLAN.
Wirel. Pers. Commun., 2013

Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.
Informatica (Slovenia), 2013

Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Flow-Based P2P Network Traffic Classification Using Machine Learning.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Location Estimation Based on Semi-Supervised Locally Linear Embedding (SSLLE) Approach for Indoor Wireless Networks.
Wirel. Pers. Commun., 2012

Secure Key Exchange Scheme for IPTV Broadcasting.
Informatica (Slovenia), 2012

An improved bacterial foraging algorithm for combined static/dynamic environmental economic dispatch.
Appl. Soft Comput., 2012

Spectrum sharing in Multi-hop cognitive radio networks with optimal power control.
Proceedings of the Ninth International Conference on Wireless and Optical Communications Networks, 2012

Distributed location estimation system using WLAN received signal strength fingerprints.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Security Vulnerabilities of User Authentication Scheme Using Smart Card.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

A centralized detection and prevention technique against ARP poisoning.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Static/Dynamic Environmental Economic Dispatch Employing Chaotic Micro Bacterial Foraging Algorithm.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2011

SSLLE: Semi-supervised Locally Linear Embedding based Localization Method for Indoor Wireless Networks.
Proceedings of the NCTA 2011, 2011

Integrated evolutionary neural network approach with distributed computing for congestion management.
Appl. Soft Comput., 2010

A secure key management system in group structured mobile ad hoc networks.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

An Efficient Compressed Domain Spatial Transcoding Scheme for Adaptive Video Content Delivery.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Packet Count Based Routing Mechanism - A Load Balancing Approach in MANETS.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Automatic annotation of image and video using semantics.
Proceedings of the Second International Conference on Digital Image Processing, 2010

Parsing Operations Based Approach towards Phishing Attacks.
Proceedings of the Data Engineering and Management - Second International Conference, 2010

Knowledge Base Compound Approach towards Spam Detection.
Proceedings of the Recent Trends in Network Security and Applications, 2010

VD4: Vehicular Density-Dependent Data Delivery Model in Vehicular Ad Hoc Networks.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

Shape Based Automatic Annotation and Fuzzy Indexing of Video Sequences.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

Growing RBFNN-based soft computing approach for congestion management.
Neural Comput. Appl., 2009

A Power Aware Minimum Connected Dominating Set for Wireless Sensor Networks.
J. Networks, 2009

On-line security monitoring and analysis using Levenberg-Marquardt algorithm-based Neural Network.
Int. J. Intell. Syst. Technol. Appl., 2009

A Heuristic for Minimum Connected Dominating Set with Local Repair for Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Networks, 2009

An Optimization of Semantic Image Analysis Using Genetic Algorithm Approach Coupled with Ontologies.
Proceedings of the 2009 International Conference on Digital Image Processing, 2009

WADIA: An Efficient Algorithm for Watermarking of Images with Abrupt Intensity Variations.
Proceedings of the 2008 International Conference on Image Processing, 2008

Probability based routing for Ad Hoc networks in a building.
Proceedings of the 16th International Conference on Networks, 2008

Frame Sliced Parallel Signature Files for Fast Colored Image Retrieval.
J. Convergence Inf. Technol., 2007

Web content adaptation classification and summarization in mobile devices.
Proceedings of the 4th International Conference on Mobile Technology, 2007

Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

An Evolutionary Computing Approach for Mining of Bio-medical Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Classification of Bio-medical Images Using Neuro Fuzzy Approach.
Proceedings of the Database Systems for Advances Applications, 2004

Retrieval of Image Databases Using Supervised Learning Approach.
Proceedings of the First European Conference on Colour in Graphics, Imaging, and Vision, 2002