Somasundaram Mary Saira Bhanu

Orcid: 0000-0001-8509-4461

Affiliations:
  • National Institute of Technology, Department of Computer Science and Engineering, Tiruchirappalli, India


According to our database1, Somasundaram Mary Saira Bhanu authored at least 38 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Clustering-based data integrity verification approach for multi-replica in a fog environment.
J. Supercomput., February, 2024

2023
A new hybrid encryption in fog-cloud environment for secure medical data-sharing.
Iran J. Comput. Sci., June, 2023

Measurement Configuration Strategy for Decoupled Handover in Beyond 5G Networks.
Wirel. Pers. Commun., April, 2023

A hybrid encryption for secure data deduplication the cloud.
Int. J. Cloud Comput., 2023

ROTI-MARK: Real-world-impact-driven Optimization Target Identification - Metrics Assessment and Reporting Kit.
Proceedings of the 5th World Symposium on Software Engineering, 2023

Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
A reinforcement learning algorithm for rescheduling preempted tasks in fog nodes.
J. Sched., 2022

2021
ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication.
Wirel. Pers. Commun., 2021

An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment.
Peer-to-Peer Netw. Appl., 2021

Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment.
J. Inf. Secur. Appl., 2021

2020
Detection of HTTP flooding attacks in cloud using fuzzy bat clustering.
Neural Comput. Appl., 2020

UbCadet: detection of compromised accounts in twitter based on user behavioural profiling.
Multim. Tools Appl., 2020

Detection of malware applications using social spider algorithm in mobile cloud computing environment.
Int. J. Ad Hoc Ubiquitous Comput., 2020

2019
NFC-ARP: neuro-fuzzy controller for adaptive resource provisioning in virtualized environments.
Neural Comput. Appl., 2019

HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering.
IET Inf. Secur., 2019

Compromised account detection in online social networks: A survey.
Concurr. Comput. Pract. Exp., 2019

Secure logging scheme for forensic analysis in cloud.
Concurr. Comput. Pract. Exp., 2019

Overload prediction and avoidance for maintaining optimal working condition in a fog node.
Comput. Electr. Eng., 2019

2018
Detection of repackaged Android applications based on Apps Permissions.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

Permission-Based Android Malware Application Detection Using Multi-Layer Perceptron.
Proceedings of the Intelligent Systems Design and Applications, 2018

Multiple Imputation Inference for Missing Values in Distributed Datasets Using Apache Spark.
Proceedings of the Advances in Computing and Data Science, 2018

2017
An Efficient DSR Protocol to Detect Blackhole Attacks in WMN Using Cross Layer Approach.
Wirel. Pers. Commun., 2017

2016
HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster-Shafer theory with MapReduce.
Secur. Commun. Networks, 2016

Auto-scale: automatic scaling of virtualised resources using neuro-fuzzy reinforcement learning approach.
Int. J. Big Data Intell., 2016

Service provisioning of flexible advance reservation leases in IaaS clouds.
Int. J. Big Data Intell., 2016

Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service.
CoRR, 2016

Catfish-PSO based scheduling of scientific workflows in IaaS cloud.
Computing, 2016

MDedup++: Exploiting Temporal and Spatial Page-Sharing Behaviors for Memory Deduplication Enhancement.
Comput. J., 2016

2014
Two layered protection for sensitive data in cloud.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
SLA achievement by negotiation in a cloud.
Proceedings of the 6th ACM India Computing Convention, 2013

Ontology Based Resource Discovery Mechanism for Mobile Grid Environment.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2012
Security and Availability of Data in the Cloud.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2010
Performance Comparison of Multicast Routing Protocols for MANETs.
Proceedings of the Information Processing and Management, 2010

Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks.
Proceedings of the Information Processing and Management, 2010

2009
Group Aware Semantic Matchmaker for Grid Resource Discovery.
Proceedings of the ARTCom 2009, 2009

2008
A Hyper-Heuristic Approach for Efficient Resource Scheduling in Grid.
Int. J. Comput. Commun. Control, 2008

2006
Distributed Grid Resource Discovery with Matchmakers.
Proceedings of the 2006 International Conference on Semantics, 2006

Remote Memory Management and Prefetching Techniques for Jobs in Grid.
Proceedings of the 2006 International Conference on Semantics, 2006


  Loading...