Subramanian Selvakumar
Orcid: 0000-0002-4900-4745Affiliations:
- National Institute of Technology, Tiruchirappalli, India
- Indian Institute of Information Technology, Una, India
According to our database1,
Subramanian Selvakumar
authored at least 44 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CLNet: a contactless fingerprint spoof detection using deep neural networks with a transfer learning approach.
Multim. Tools Appl., March, 2024
2023
Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks.
J. Ambient Intell. Humaniz. Comput., March, 2023
A comparative analysis of (s, Q) and (s, S) ordering policies in a queueing-inventory system with stock-dependent arrival and queue-dependent service process.
Oper. Res. Decis., 2023
2022
PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites.
Wirel. Pers. Commun., 2022
Stratified hyperparameters optimization of feed-forward neural network for social network spam detection (SON2S).
Soft Comput., 2022
Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks.
Neural Comput. Appl., 2022
2021
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism.
J. Ambient Intell. Humaniz. Comput., 2021
Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services.
Int. J. Ad Hoc Ubiquitous Comput., 2021
A statistical class center based triangle area vector method for detection of denial of service attacks.
Clust. Comput., 2021
2020
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks.
IEEE Trans. Netw. Serv. Manag., 2020
GAMEFEST: Genetic Algorithmic Multi Evaluation measure based FEature Selection Technique for social network spam detection.
Multim. Tools Appl., 2020
Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment.
Future Gener. Comput. Syst., 2020
Detection of Phishing Attacks using Radial Basis Function Network Trained for Categorical Attributes.
Proceedings of the 11th International Conference on Computing, 2020
CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection.
Proceedings of the 11th International Conference on Computing, 2020
SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection.
Proceedings of the Intelligent Data Engineering and Analytics, 2020
2019
Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks.
Neurocomputing, 2019
Initial Weights Optimization using Enhanced Step Size Firefly Algorithm for Feed Forward Neural Network applied to Spam Detection.
Proceedings of the TENCON 2019, 2019
2018
VCDeepFL: Vector Convolutional Deep Feature Learning Approach for Identification of Known and Unknown Denial of Service Attacks.
Proceedings of the TENCON 2018, 2018
2016
Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset.
Frontiers Comput. Sci., 2016
Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks.
Comput. J., 2016
2015
ACM SIGSOFT Softw. Eng. Notes, 2015
Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Achieving excellence in engineering education through improved teaching-learning process.
Proceedings of the IEEE International Conference on Teaching, 2015
2014
Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation.
Digit. Investig., 2014
2013
Data rate based adaptive thread assignment solution for combating the SlowPOST denial of service attack.
ACM SIGSOFT Softw. Eng. Notes, 2013
ACM SIGSOFT Softw. Eng. Notes, 2013
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems.
Comput. Commun., 2013
2012
Avoidance of security breach through selective permissions in android operating system.
ACM SIGSOFT Softw. Eng. Notes, 2012
Prevention of XSS attacks using STCD: server side tagging and client side differentiation.
ACM SIGSOFT Softw. Eng. Notes, 2012
2011
LISISAP: link level signature based secure anonymous protocol for prevention of traffic analysis attacks.
ACM SIGSOFT Softw. Eng. Notes, 2011
ACM SIGSOFT Softw. Eng. Notes, 2011
ACM SIGSOFT Softw. Eng. Notes, 2011
ACM SIGSOFT Softw. Eng. Notes, 2011
Distributed denial of service attack detection using an ensemble of neural classifier.
Comput. Commun., 2011
Appl. Soft Comput., 2011
2010
CRAYSE: design and implementation of efficient text search algorithm in a web crawler.
ACM SIGSOFT Softw. Eng. Notes, 2010
Genetic algorithm approach to dynamic multiconstraint multipath QoS routing algorithm for IP networks.
Int. J. Commun. Networks Distributed Syst., 2010
2006
Construction of an optimal multicast tree for group communication in a cellular network using genetic algorithm.
Comput. Commun., 2006
2004
Comput. Commun., 2004
2001
Comput. Commun., 2001
Comput. Commun., 2001
1997
Differential priority-based adaptive rate service discipline for QoS guarantee of video stream.
Comput. Commun., 1997