According to our database1, Suvasini Panigrahi
Legend:Book In proceedings Article PhD thesis Other
A Distributed Scalar Controller Selection Scheme for Redundant Data Elimination in Sensor Networks.
A Distributed Approach Based on Hierarchical Scalar Leader Selection for Enhanced Event Coverage in Wireless Multimedia Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2017
SQLiDDS: SQL injection detection using document similarity measure.
Journal of Computer Security, 2016
Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks.
Detection of Mobile Phone Fraud Using Possibilistic Fuzzy C-Means Clustering and Hidden Markov Model.
SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM.
Computers & Security, 2016
A Distributed Approach Based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation.
Proceedings of the Distributed Computing and Internet Technology, 2016
A new approach to intrusion detection in databases by using artificial neuro fuzzy inference system.
Centralised cum sub-centralised scheme for multi-event coverage and optimum camera activation in wireless multimedia sensor networks.
IET Networks, 2015
SQLiDDS: SQL Injection Detection Using Query Transformation and Document Similarity.
Proceedings of the Distributed Computing and Internet Technology, 2015
Two-stage database intrusion detection by combining multiple evidence and belief update.
Information Systems Frontiers, 2013
BLAST-SSAHA Hybridization for Credit Card Fraud Detection.
IEEE Trans. Dependable Sec. Comput., 2009
Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning.
Information Fusion, 2009
Detection of Database Intrusion Using a Two-Stage Fuzzy System.
Proceedings of the Information Security, 12th International Conference, 2009
Detection of intrusive activity in databases by combining multiple evidences and belief update.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007