Suvasini Panigrahi

According to our database1, Suvasini Panigrahi
  • authored at least 16 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of five.



In proceedings 
PhD thesis 




A Distributed Scalar Controller Selection Scheme for Redundant Data Elimination in Sensor Networks.
IJKDB, 2017

A Distributed Approach Based on Hierarchical Scalar Leader Selection for Enhanced Event Coverage in Wireless Multimedia Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2017

SQLiDDS: SQL injection detection using document similarity measure.
Journal of Computer Security, 2016

Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks.
IJSN, 2016

Detection of Mobile Phone Fraud Using Possibilistic Fuzzy C-Means Clustering and Hidden Markov Model.
IJSE, 2016

SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM.
Computers & Security, 2016

A Distributed Approach Based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation.
Proceedings of the Distributed Computing and Internet Technology, 2016

A new approach to intrusion detection in databases by using artificial neuro fuzzy inference system.
IJRIS, 2015

Centralised cum sub-centralised scheme for multi-event coverage and optimum camera activation in wireless multimedia sensor networks.
IET Networks, 2015

SQLiDDS: SQL Injection Detection Using Query Transformation and Document Similarity.
Proceedings of the Distributed Computing and Internet Technology, 2015

Two-stage database intrusion detection by combining multiple evidence and belief update.
Information Systems Frontiers, 2013

BLAST-SSAHA Hybridization for Credit Card Fraud Detection.
IEEE Trans. Dependable Sec. Comput., 2009

Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning.
Information Fusion, 2009

Detection of Database Intrusion Using a Two-Stage Fuzzy System.
Proceedings of the Information Security, 12th International Conference, 2009

Detection of intrusive activity in databases by combining multiple evidences and belief update.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007