Suvasini Panigrahi

According to our database1, Suvasini Panigrahi authored at least 28 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An efficient composite cloud service model using multi-criteria decision-making techniques.
J. Supercomput., May, 2023

A modified Brown and Gibson model for cloud service selection.
Int. J. Comput. Sci. Eng., 2023

2022
Application of OPTICS and ensemble learning for Database Intrusion Detection.
J. King Saud Univ. Comput. Inf. Sci., 2022

Rule-based database intrusion detection using coactive artificial neuro-fuzzy inference system and genetic algorithm.
Int. J. Bus. Intell. Data Min., 2022

2021
Role-Based Profiling Using Fuzzy Adaptive Resonance Theory for Securing Database Systems.
Int. J. Appl. Metaheuristic Comput., 2021

2020
Use of optimized Fuzzy C-Means clustering and supervised classifiers for automobile insurance fraud detection.
J. King Saud Univ. Comput. Inf. Sci., 2020

Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning.
Int. J. Inf. Secur. Priv., 2020

2018
A hybrid mobile call fraud detection model using optimized fuzzy C-means clustering and group method of data handling-based network.
Vietnam. J. Comput. Sci., 2018

Detection of Automobile Insurance Fraud Using Feature Selection and Data Mining Techniques.
Int. J. Rough Sets Data Anal., 2018

Creating More Efficient Distributed Cameras: A Distributed Multievent Ensnaring Scheme Based on Scalar Leader Determination.
IEEE Consumer Electron. Mag., 2018

2017
A Distributed Scalar Controller Selection Scheme for Redundant Data Elimination in Sensor Networks.
Int. J. Knowl. Discov. Bioinform., 2017

A Distributed Approach Based on Hierarchical Scalar Leader Selection for Enhanced Event Coverage in Wireless Multimedia Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2017

2016
SQLiDDS: SQL injection detection using document similarity measure.
J. Comput. Secur., 2016

Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks.
Int. J. Secur. Networks, 2016

Detection of Mobile Phone Fraud Using Possibilistic Fuzzy C-Means Clustering and Hidden Markov Model.
Int. J. Synth. Emot., 2016

SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM.
Comput. Secur., 2016

A Distributed Approach Based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation.
Proceedings of the Distributed Computing and Internet Technology, 2016

Redundant Data Minimization Using Minimal Mean Distant Scalar Leader Selection for Event Driven Camera Actuation.
Proceedings of the 2016 International Conference on Information Technology, 2016

A Distributed Scheme Based on Minimum Camera Actuation Employing Concentric Hexagonal Scalar Premier Selection for Data Redundancy Minimization.
Proceedings of the 2016 International Conference on Information Technology, 2016

2015
A new approach to intrusion detection in databases by using artificial neuro fuzzy inference system.
Int. J. Reason. based Intell. Syst., 2015

Centralised cum sub-centralised scheme for multi-event coverage and optimum camera activation in wireless multimedia sensor networks.
IET Networks, 2015

SQLiDDS: SQL Injection Detection Using Query Transformation and Document Similarity.
Proceedings of the Distributed Computing and Internet Technology, 2015

2013
Two-stage database intrusion detection by combining multiple evidence and belief update.
Inf. Syst. Frontiers, 2013

2009
BLAST-SSAHA Hybridization for Credit Card Fraud Detection.
IEEE Trans. Dependable Secur. Comput., 2009

Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning.
Inf. Fusion, 2009

Detection of Database Intrusion Using a Two-Stage Fuzzy System.
Proceedings of the Information Security, 12th International Conference, 2009

Detection of intrusive activity in databases by combining multiple evidences and belief update.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2007
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007


  Loading...