Subramanian Selvakumar

Orcid: 0000-0002-4900-4745

Affiliations:
  • National Institute of Technology, Tiruchirappalli, India
  • Indian Institute of Information Technology, Una, India


According to our database1, Subramanian Selvakumar authored at least 44 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CLNet: a contactless fingerprint spoof detection using deep neural networks with a transfer learning approach.
Multim. Tools Appl., March, 2024

2023
Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks.
J. Ambient Intell. Humaniz. Comput., March, 2023

A comparative analysis of (s, Q) and (s, S) ordering policies in a queueing-inventory system with stock-dependent arrival and queue-dependent service process.
Oper. Res. Decis., 2023

2022
PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites.
Wirel. Pers. Commun., 2022

Stratified hyperparameters optimization of feed-forward neural network for social network spam detection (SON2S).
Soft Comput., 2022

Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks.
Neural Comput. Appl., 2022

2021
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism.
J. Ambient Intell. Humaniz. Comput., 2021

Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services.
Int. J. Ad Hoc Ubiquitous Comput., 2021

A statistical class center based triangle area vector method for detection of denial of service attacks.
Clust. Comput., 2021

2020
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks.
IEEE Trans. Netw. Serv. Manag., 2020

GAMEFEST: Genetic Algorithmic Multi Evaluation measure based FEature Selection Technique for social network spam detection.
Multim. Tools Appl., 2020

Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment.
Future Gener. Comput. Syst., 2020

Detection of Phishing Attacks using Radial Basis Function Network Trained for Categorical Attributes.
Proceedings of the 11th International Conference on Computing, 2020

CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection.
Proceedings of the 11th International Conference on Computing, 2020

SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection.
Proceedings of the Intelligent Data Engineering and Analytics, 2020

2019
Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks.
Neurocomputing, 2019

Initial Weights Optimization using Enhanced Step Size Firefly Algorithm for Feed Forward Neural Network applied to Spam Detection.
Proceedings of the TENCON 2019, 2019

2018
VCDeepFL: Vector Convolutional Deep Feature Learning Approach for Identification of Known and Unknown Denial of Service Attacks.
Proceedings of the TENCON 2018, 2018

2016
Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset.
Frontiers Comput. Sci., 2016

Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks.
Comput. J., 2016

2015
Design of an Abstraction Layer for Communication with BOSH XMPP Server.
ACM SIGSOFT Softw. Eng. Notes, 2015

Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset.
Secur. Commun. Networks, 2015

LAWRA: a layered wrapper feature selection approach for network attack detection.
Secur. Commun. Networks, 2015

Achieving excellence in engineering education through improved teaching-learning process.
Proceedings of the IEEE International Conference on Teaching, 2015

2014
Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation.
Digit. Investig., 2014

2013
Data rate based adaptive thread assignment solution for combating the SlowPOST denial of service attack.
ACM SIGSOFT Softw. Eng. Notes, 2013

SHS-HTTPS enforcer: enforcing HTTPS and preventing MITM attacks.
ACM SIGSOFT Softw. Eng. Notes, 2013

Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems.
Comput. Commun., 2013

2012
Avoidance of security breach through selective permissions in android operating system.
ACM SIGSOFT Softw. Eng. Notes, 2012

Prevention of XSS attacks using STCD: server side tagging and client side differentiation.
ACM SIGSOFT Softw. Eng. Notes, 2012

2011
LISISAP: link level signature based secure anonymous protocol for prevention of traffic analysis attacks.
ACM SIGSOFT Softw. Eng. Notes, 2011

BIXSAN: browser independent XSS sanitizer for prevention of XSS attacks.
ACM SIGSOFT Softw. Eng. Notes, 2011

An online cross view difference and behavior based kernel rootkit detector.
ACM SIGSOFT Softw. Eng. Notes, 2011

Genuine ARP (GARP): a broadcast based stateful authentication protocol.
ACM SIGSOFT Softw. Eng. Notes, 2011

Distributed denial of service attack detection using an ensemble of neural classifier.
Comput. Commun., 2011

Multi-constraint Qos Unicast Routing Using Genetic Algorithm (MURUGA).
Appl. Soft Comput., 2011

2010
CRAYSE: design and implementation of efficient text search algorithm in a web crawler.
ACM SIGSOFT Softw. Eng. Notes, 2010

Genetic algorithm approach to dynamic multiconstraint multipath QoS routing algorithm for IP networks.
Int. J. Commun. Networks Distributed Syst., 2010

2006
Construction of an optimal multicast tree for group communication in a cellular network using genetic algorithm.
Comput. Commun., 2006

2004
Delay sensitive least frequently used algorithm for replacement in web caches.
Comput. Commun., 2004

2001
Partition equalizer: a scheduler for algorithm-agile-encryptor ATM networks.
Comput. Commun., 2001

Implementation and comparison of distributed caching schemes.
Comput. Commun., 2001

Secure dynamic anycasting for 'best' server selection using active networks.
Comput. Commun., 2001

1997
Differential priority-based adaptive rate service discipline for QoS guarantee of video stream.
Comput. Commun., 1997


  Loading...