Dr.S.MercyShalinie

shalinie@tce.edu

Educational Qualification

DEGREE BRANCH INSTITUTE YEAR
B.E. EIE Annamalai University 1989
M.E. Applied Electronics Coimbatore Institute of Technology 1991
Ph.D. Design of Neuro-Fuzzy systems Madurai Kamaraj University 1999
Post Doctoral Fellowship Machine Learning models for threat analyses University of California, Irvine, USA 2008

Experience

PERIOD NO OF YEARS DESIGNATION INSTITUTION
2015 to Till date 5.1 Professor Thiagarajar College of Engineering
2007 to 2015 8 Associate Professor Thiagarajar College of Engineering
2005 to 2007 2 Assistant Professor Thiagarajar College of Engineering
1996 to 2005 9 Lecturer Thiagarajar College of Engineering
1990 to 1996 6 Lecturer R.V.S. College of Engg.

Journals

  1. Lilian, J.F., Sundarakantham, K. & Shalinie, S.M. QeCSO: Design of hybrid Cuckoo Search based Query expansion model for efficient information retrieval. Sādhanā 46, 181 (2021). https://doi.org/10.1007/s12046-021-01706-0
  2. Felicia Lilian J, Sundarakantham K, Mercy Shalinie S. (2020) Anti-negation method for handling negation words in question answering system. The Journal of Supercomputing, 1-23. DOI: 10.1007/s11227-020-03437-1. ISSN: 0920-8542, 77(6)
  3. M. -H. Yang, J. -N. Luo, M. Vijayalakshmi and S. M. Shalinie, "Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices," in IEEE Access, vol. 8, pp. 201087-201097, 2020, doi: 10.1109/ACCESS.2020.3034226. Impact Factor: 4.096
  4. 1.Felicia Lilian J, Sundarakantham, K & Mercy Shalinie S, Anti-negation method for handling negation words in question answering system, The Journal of Supercomputing, 1-23, 2020
  5. M. Suguna, S. Mercy Shalinie, "Privacy preserving auditing protocol for remote data storage", Cluster Computing, 22(3), pp.6891-6898 (2019)
  6. Vijayalakshmi, M and Mercy Shalinie, S, ‘UDP based IP Traceback for Flooding DDoS Attack’, The International Arab Journal of Information Technology, Vol. 15, No. 1, pp. 103 - 111, 2018. Impact factor : 0.724
  7. Prabavathy, S, Sundarakantham, K & Mercy Shalinie, S 2018, ‘Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things’, Journal of Communications and Networks. Vol 20, No 3, June 2018, pp 291- 298. DOI: 10.1109/JCN.2018.000041. Impact Factor – 1.130
  8. M. Suguna, S. Mercy Shalinie, "Provable dynamic auditing in mobile cloud computing for secure storage of e-health data", Biomedical Research (India), pp. 88-94, 2018
  9. K.NarasimhaMallikarjunan, S.Mercy Shalinie, G.Preetha,"Real Time Attacker Behavior Pattern Discovery and Profiling using Fuzzy Rules”, Special issue on Behavior Data Analytics for Cyber security, Journal of Internet Technology, 2018(Accepted)
  10. A.Avelin Diana, K.Sundarakantham, S.Mercy Shalinie, Alleviation of Binding Update Re-registration handoff latency at Home Agent Failure in MIPv6 Network, International Journal of Computer Communications and Control vol.10, no.4, pp. 463-467, 2015 (Annexure-1)DOI:10.1109/WIRLES.2005.1549599, 1295-1300. Impact Factor 0.694
  11. Vijayalakshmi, M and Mercy Shalinie, S 2014, ‘Single Packet ICMP Traceback Technique using Router Interface’, Journal of Information Science and Engineering, vol. 30, no. 6, pp. 1673-1694. Impact Factor: 0.61
  12. P. Mohana Priya, V. Akilandeswari, S. Mercy Shalinie, Detecting DRDoS attack by Log File based IP pairing mechanism, WSEAS Transaction on Computers, Vol 13, pp. 538 - 548, November 2014
  13. P. Mohana Priya, V. Akilandeswari, G. Akilarasu, S. Mercy Shalinie, An Integrated approach of E-RED and ANT classification methods for DRDoS attacks, Journal of Communications in Computer and Information Science, pp. 369 - 377, 2014
  14. Avelin Diana, K. Sundarakantham, S. Mercy Shalinie and L. Rajendran, “Analytical Model for Binding Refresh Request to reduce Storage and Communication Overhead in MIPv6 Network”, International Journal of Network Management,vol. 24, no.5, pp. 402-414, 2014.DOI: 10.1002/nem.1871 Source Normalized Impact Factor: 0.681
  15. Parvathy, K.Sundarakantham, S.Mercy Shalinie, TRPC: An ensembled Online prediction mechanism for trusted Recommender systems, WSEAS Transactions on computers,13, 2014, Art 19, pp 231-241 Source Normalized Impact Factor: 0.39
  16. M.Parvathy,K.Sundarakantham,S.Mercy Shalinie,Cosine Similarity based clustering and dynamic reputation trust aware key generation scheme for trusted communication on social Networking, Journal of Statistical Computation and Simulation 85(16):1-12 · May 2014 DOI: 10.1080/00949655.2014.964240 Source Normalized Impact Factor 0.749
  17. Avelin Diana, K.Sundarakantham, S.Mercy Shalinie, DHSLB:Dynamic HA Selection WITH Load Balancing mechanism in MIPv6 network, Australian Journal of Basic and Applied Sciences, 8 (6), 1-6: 2014, Source Normalized Impact Factor: 0.23
  18. M. Parvathy, R. Ramya, K. Sundarakantham, S. Mercy Shalinie, Tnet: A Trust network for predicting trust in Online Social networks, Information : An International Interdisciplinary Journal, Vol.17, No. 4, pp.1383 - 1393, April 2014
  19. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, SHAD: Swift Home Agent Discovery Mechanism to mitigate home registration latency in MIPv6 network, Information : An International Interdisciplinary Journal, Vol.17, No. 4, pp.1375 - 1381, April 2014.
  20. G. Sujitha, T. Rajeswaran, R. thiagarajan, K. Vidya, S. Mercy Shalinie, Preserving Privacy of cloud data using Homomorphic encryption in Map Reduce, International Journal of Hybrid Information Technology, Vol.7, No.3, pp.363 - 376, 2014.
  21. V. Akilandeswari, S. Mercy Shalinie, Design of an adaptive distributed critical care extensive response network (AD-CERN) using cooperative overlay network, 2014
  22. V. Akilandeswari, S. Mercy Shalinie, A Self-organizing Defense technique for SSH Dictionary attacks, Information : An International Interdisciplinary Journal, Vol. 17, No. 2, pp. 821 - 834, February 2014.
  23. A. Avelin Diana, K. Sundarakantham, S. Mercy Shalinie, V. Raga Vinodhini, DHSLB: Dynamic HA Selection with load balancing mechanism in MIPv6 network, Australian Journal of Basic and Applied sciences, Vol. 8, No.4, pp.1 -7, 2014.
  24. G. Sujitha, M. Varadharajan, Y. Vignesh Rao, M. K. Sarvesh Gautham, Sowmi Narayanan, R. Swarnaraja, S. Mercy Shalinie, Improving Security of Parallel Algorithm using Key Encryption Technique, Information Technology Journal , Vol 12, Issue 12, pp. 2398 - 2404, 2013.
  25. S.MercyShalinie, Neural Network Based Decision Making In Uncertain Environment , Journal of Cognitive science, 1998
  26. S.MercyShalinie, S.Padmavathi, D.Kavinnithya, D.Kavinnithya, An Integrated Approach to Performance Effective Task Scheduling using Aggregated Backfilling Technique , International Journal of Software Engineering Research & Practices , Volume 1, No.1, pp:25-28, January 2011
  27. S.MercyShalinie, Design Of Variable Structure Controller Systems, Journal of Computer Engineering IE(I), pp.84-87,1995
  28. T.Subbulakshmi, S.MercyShalinie, Ensemble Design of Masquerader Detection Systems for Information Security , ICTACT Journal on Soft Computing, pp.131-137,2011
  29. S.MercyShalinie, V. Akilandeswari, Fractal Dimension Based Time Delayed Neural Network for Non Linear Time Series Prediction, Journal of Computer Engineering IE(I),
  30. S.MercyShalinie, S.Padmavathi, Scalable, Low Complexity Task Scheduling Algorithm for Cluster of Workstations, Journal of Engineering Science and Technology, Volume 5, No.3, pp:354-363, Septermber 2010
  31. S.MercyShalinie, S.Padmavathi, Tabu Search Based Memetic Algorithm for Task Scheduling, Journal of Computational Information Systems, Volume 6,No.4, pp:1017-1025, August 2010
  32. S.MercyShalinie, S.Padmavathi, A Memetic Algorithm Based Task Scheduling considering Communication Cost on Cluster Workstations, International Journal of Advances in Soft Computing & Applications, Volume 2, No.2, pp:174-190, July 2010
  33. S.MercyShalinie, G.Preetha, B.S.Kiruthika, S.Dina Nidhya, S.Dina Nidhya, S.Dina Nidhya, Fuzzy Adaptive Tuning Of Router Buffers for congestion control, International journal of Advancements in Technology, vol 1, No 1, June 2010
  34. S.MercyShalinie,K.SundarakanthamSSGL: A Semi-supervised Grammar LearnerJournal of Computer Application in Technology, Inderscience PublishersVolume 38 - Issue 4, 2010. DOI: http://dx.doi.org/10.1504/IJCAT.2010.034526 Source Normalized Impact Factor:0.220
  35. T.Subbulakshmi, S.MercyShalinie, Detection and Classification of DDoS Attacks Using Fuzzy Interfernce System, European Journal of Scientific Research , vol no.47, NO.3 ,pp 334-346,2010
  36. T.Subbulakshmi, S.MercyShalinie, Real Time Classification and Clustering IDS Alerts Using Machine Learning Algorithms, Intenational Journal of Artificial Intelligence and Applications(IJAIA), Vol.1, No.1,Jan 2010
  37. T.Subbulakshmi, S.MercyShalinie, Detection and Classification of DDoS Attacks Using Machine Learning Algorithms, European Journal of Scientific Research , Vol.47, No. 3, pp. 334-346, 2010
  38. S.MercyShalinie, S.Padmavathi, DAG Scheduling on Cluster of Workstations using Hybrid Particle Swarm Optimization, International Journal of Simulation-Systems, Science and Technology, Volume 10, No.6, pp:50-55,July 2009
  39. S.MercyShalinie, Modeling parallel feed-forward based compression network , International Journal of Parallel, Emergent and Distributed Systems, Vol.21, No.4, pp. 227-237
  40. S.MercyShalinie, Modeling Connectionist Neuro-Fuzzy network and Applications, International Journal on Neural computation and applications, Springer Verlag, Vol.14, No 1, pp.88-93
  41. Vijayalakshmi, M, Mercy Shalinie, S, and Nithya, N 2014, ‘A Brief Survey of IP Traceback Methodologies’, Acta Polytechnica Hungarica, vol. 11, no. 9, pp. 197-216. Impact Factor: 0.745
  42. Vijayalakshmi, M, Mercy Shalinie, S, Ajay, K and Arvind, M, 'Setting up an Efficient IoT Experimental Test Bed',IoTEvolutionWorld, 2016
  43. S. Karthick, S. Mercy Shalinie, Chidambaram Kollengode, Design and Evaluation of a Parallel Algorithm for Inferring Topic Hierarchies, Information Processing and Management 51 (2015), pp. 662-676, Elsevier, DOI: 10.1016/j.ipm.2015.06.006 [Impact Factor: 2.391]
  44. S. Karthick, S. Mercy Shalinie, Parallelization of a graph-cut based algorithm for hierarchical clustering of web documents, International Journal of Concurrency and Computation: Practice and Experience, Wiley, Apr, 2015, DOI: 10.1002/cpe.3545 (In Press) [Source Normalized Impact Factor: 1.133]
  45. Akilandeswari, V, MercyShalinie, S, Vijayalakshmi, M, Sheik Mohamad Mubeen, S, Proactive Behaviour Analysis of Network Traffic Using SNMP-MIB Agents,International Journal of Network Security and its Applications
  46. S.MercyShalinie, S.Surenthar,V. Akilandeswari, Unusual Attack Behavior Analysis for High Rate Flooding Attack Detection Using Markov Model, International Journal of Network Security and its Applications, April 2012
  47. K.NarasimhaMallikarjunan, S.Mercy Shalinie, A.Bhuvaneeshwaran,BAIT: Behavior Aided Intruder Testimony Technique for Attacker Intention Prediction in Business Data Handling”, Special Issue on Applied Soft Computing Strategies for Effective Business Data Analytics, DOI: 10.1504/IJBIDM.2018.10012004 International Journal of Business Intelligence and Data Mining, 2018
  48. Vijayalakshmi, M.; Mercy Shalinie, S.; Yang, Ming Hour; U., Raja Meenakshi: 'Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions', IET Networks, 2020, 9, (5), p. 235-246, DOI: 10.1049/iet-net.2020.0078IET Digital Library, https://digital-library.theiet.org/content/journals/10.1049/iet-net.2020.0078. SNIP: 1.160
  49. S.MercyShalinie,S.PadmavathiEnhanced Memetic Algorithm for Task SchedulingJournal, Springer-Verlag, Lecture Notes in Computer ScienceVolume 6466, pp:448, 2010.Impact Factor-0.51
  50. G.Madhu Priya, S Mercy Shalinie, P.Mohana Priya, Deep Learning framework for early detection of intrusion in Virtualized Environment, International Journal of Business Intelligence and Data Mining, April 2020, DOI: 10.1504/IJBIDM.2018.10012559, Volume-17, Issue No. 3, Pages - 393-411

Conferences

  1. J. Felicia Lilian, K. Sundarakantham, S. Mercy Shalinie, “SSE: Semantic Sentence Embedding for learning user interactions” in the International Conference on Computing, Communication and Networking Technologies (ICCCNT’19) at IIT Kanpur
  2. J. Felicia Lilian, K. Sundarakantham and S. Mercy Shalinie “DLRCNeg: Deep Learning based Reading Comprehension by handling Negation” at the PhD Forum at Advanced Computing and Communication Conference (ADCOM/ACCS) at IIIT Bangalore on 6th September 2019.
  3. J. Felicia Lilian, K. Sundarakantham and S. Mercy Shalinie “ACA: Attention based Context aware Answer selection system” at the International Conference on Machine Intelligence And Signal Processing (MISP’19) at IIIT Allahabad on 8th September 2019.
  4. J. Dharani, K. Sundarakantham, Kunwar Singh and S. Mercy Shalinie “Design of Anonymous Endorsers in Hyperledger Fabric with Linkable Threshold Ring Signature” at National Conference on Blockchain and Smart Contract Technology, (BSCT’19)
  5. J. Felicia Lilian, K. Sundarakantham, S.Mercy Shalinie, “An Efficient information retrieval mechanism from relevant document”, in International Symposium on Artificial Intelligence and Computer Vision by the DCSE, College of Engineering, Guindy, Chennai
  6. Felicia, K.Sundarakantham, S.Mercy Shalinie : An efficient information retrieval mechanism from relevant Document, AICV 2018, 26th to 28th September 2018 at CEG,Anna University
  7. M Suguna, S Mercy Shalinie, "Privacy preserving data auditing protocol for secure storage in mobile cloud computing", IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2725-2729, 2017
  8. M Suguna, R Anusia, S Mercy Shalinie, S Deepti, "Secure identity management in mobile cloud computing", IEEE International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2), PP. 42-45, 2017
  9. S.Prabavathy,K.Sundarakantham,S.Mercy Shalinie "Decentralised Secure Framework for Social Collaborative Internet of Things" in 4th International Conference on Signal Processing, Communications and Networking (ICSCN'17) MIT,Anna University, 16th-18th Mar 2017
  10. S. Karthick, S. Mercy Shalinie, Parallel Hierarchical Subspace Clustering for Segmenting Large Text Corpuses, IEEE International Conference on Electronics and Informatics, Mar 2017. (Accepted)
  11. S.Prabavathy, K.Sundarakantham, S.Mercy Shalinie, "EPIDS:Eneregy Efficient Privacy Preserving Intrusion Detection System for Internet of Things" International Conference on IoT,Data Science and Security(ICIDS-2017) PSG College of Technology, Coimbatore, 6th and 7th January 2017
  12. K.NarasimhaMallikarjunan,K.Muthu Priya,S.Mercy Shalinie,'A survey of Distributed Denial of Service attack',10th International Conference on Intelligent Systems and Control (ISCO 2016)
  13. M. Suguna, J. Adlene Anusha, S.Mercy Shalinie, "Secure Data Sharing with Efficient User Revocation using Proxy Re-signature for Mobile Users Group in Cloud", National Conference on Data Intensive Computing (NCDIC), 2016
  14. K.NarasimhaMallikarjunan,S.Mercy Shalinie,"Evaluation of Security Metrics for Security Analysis" in National Conference on Enhancing Information Technology Education (EITE-2016) diring Jan 4 to Jan 8th 2016 at NIT Goa.
  15. K.NarasimhaMallikarjunan,K.Sundarakantham,S.Mercy Shalinie,"Model for Cyber Attacker Behavior Analysis " in IEEE workshop on computational Intellegence in IIT Kanpur held during dec 14 to dec 17 2015 pg no 1-4
  16. M.Parvathy, R.Ramya, K.Sundarakantham,S.Mercy Shalinie, Recommendation System with Collaborative Social Tagging Exploration, International Conference on Recent Trends in Information Technology,2014
  17. S. Karthick, S. Mercy Shalinie, Parallel Algorithms for Merging Topic Trees, Proceedings of the International ACM KDD Conference CODS-2015, Bangalore, India
  18. M. Suguna, J. Adlene Anusha, S. Mercy Shalinie, "Towards Efficient and Secure Data Storage (ESDS) Framework for Cloud Computing", International Journal of Applied Engineering Research, Vol. 10, No. 2, pp. 1534-1538, 2015
  19. S. Karthick, S. Mercy Shalinie, Chidambaram Kollengode, A Sparsification Technique For Fast Hierarchical Community Detection in Social Networks, Proc. of the International IEEE Conference on Eco-Friendly Computing and Communication Systems, NIT-K, Mangalore, Dec 2014.
  20. Sixth International Conference on Advanced Computing (ICoAC 2014) in association with IEEE, "A Survey on foundation for future generation internet through network virtualization" at MIT, Chennai
  21. V.K.Soundar Rajam, G. Selvaram, M. Pradeep Kumar, S. Mercy Shalinie, ACOPID : An Improved Traceback Mechanism based on ACO Algorithm for DDoS Attack, International Conference On Communication Network, Elsevier Sciencetech, pp. 194 - 202, July 2014.
  22. Mobile Application Testing on smart devices using MTAAS framework in cloudA.Malini,N. Venkatesh, K.Sundarakantham, S.Mercy Shalinie International conference on Computing and Communication Technologies ICCCT 2014,Osmania University, Hyderbad
  23. K.NarasimhaMallikarjunan,A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie,"Binding Registration Based On Home Agent Priority Queue Scheduling in MIPv6 Network",International Conference on Recent Trends in Information Technology -2014
  24. G.Madhu Priya, S.Ezhilarasi, S.Mercy Shalinie, "Efficient memory utilization using dynamic resource provisioning", TEQIP II sponsored National Conference on Intelligent systems, computing and information technology 2014 at Anna university Bharathidasan institute of technology, Tiruchirappalli, April 4-5 2014, Volume I, page 61-68.
  25. S. Karthick, S. Mercy Shalinie, Effect of Multi-word Features on the Hierarchical Clustering of Web Documents, IEEE International conference on Recent Trends in IT at Anna University-Chennai, April 2014
  26. B.S. Kiruthiga Devi, G. Preetha, S. Mercy Shalinie, An impact analysis: Realtime DDoS Attack Detection and Mitigation Using Machine Learning, IEEE International Conference on Recent Trends in Information Technology, pp. 1- 7, April 2014.
  27. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, K. NarasimhaMallikarjun, Binding registration based on Home agent priority queue scheduling in MIPv6 network, Fourth International Conference on Recent Trends in Information Technology, pp. 1- 7, April 2014.
  28. P. Mohana Priya, V. Akilandeswari, S. Mercy Shalinie, V. Lavanya, M. Shanmuga Priya, The Protocol Independent Detection and Classifcation (PIDC) System for DRDoS attack, IEEE International Conference on Recent Trends in Information Technology, MIT, pp. 1 - 7, April 2014.
  29. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, CRHA : An Efficient HA revitalization to sustain binding information of Home agent in MIPv6 network , International Conference on Computational Intelligence, Cyber security and Computational Models (ICC3), Springer - Advances in Intelligent Systems and Computing, Vol 246, pp. 227 - 235, 2014.
  30. K.Sundarakantham, S.Mercy Shalinie, A.Avelin Diana, V.Ragavinodhini,CHRA: An Efficient HA Revitalization to sustain Binding Information of Home Agent in MIPv6 Network,Computational Intelligence,Cyber Security and Computational models, Advances in Intelligent Systems and Computing 246, DOI: 10.1007/978-81-322-1680-3_25, Springer India ,2014
  31. K.Sundarakantham, S.Mercy Shalinie, M.Parvathy, R.Ramya, Trust Dependence Network for Recommender Systems, Fifth International Conference on Advanced Computing, ICoAC, Dec 2013
  32. Code Refactoring Using Aspect Oriented Programming,A.Malini, K.Vanitha, K.Sundarakantham, S.Mercy Shalinie, ACM National Conference on Intelligent Computing,PSG college of Technology, Coimbatore,National,26.4.13-27.4.13
  33. G. Prem Paul, V. Akilandeswari, S. Mercy Shalinie, Evolution of Vulnerability in Large Scale Networks, International Conference in Engineering and Technology, (ICET2K13), pp. 77-80, April 2013
  34. K.Sundarakantham, S.Mercy Shalinie, M.Parvathy, M.P.Manoj kumar,D.L.Don Rudin,V.Anandarajan, Detection of Malicious communities in Online Social Networks, PSG-ACM National Conference on Intelligent Computing NCIC 2013, Page No 386-390, 26-27 April 2013
  35. V. Akilandeswari, S. Mercy Shalinie, Probabilistic Neural Network based Attack Traffic Classification, Fourth International Conference on Advanced Computing (ICOAC), MIT, Chennai, pp. 1-8, 2012.
  36. V. Akilandeswari, D. Namachivayam, S. Prasanna, S. Mercy Shalinie, Design of an Early Response System using EGT-based overlay network, International Conference on Recent Trends in Information Technology (ICRTIT), MIT, pp. 445 - 451, April 2012
  37. V.K.Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie, Tulika Pandey, Application IP Traceback Mechanism to Online Voting, International Conference on Advanced Computing, Networking and Security (ADCONS 2011), Springer-Verlag Berlin Heidelberg LNCS 7135, pp. 620-629, 2012
  38. V.K.SoundarRajam, S.MercyShalinie, A Novel Traceback Algorithm for DDoS Attack with Marking Scheme for Online System, International Conference on Recent Trends in Information Technology, pp.407-412,2012
  39. B.S.Kiruthika, G.Preetha, S.MercyShalinie, DDoS Detection Using Host-Network Based Metrics and Mitigation in Experimental Testbed, Recent Trends in Information Technology(ICRTIT), pp. 423-427,2012
  40. V.K.SoundarRajam, S.MercyShalinie, B.Sundaresa Pandian, Tulika pandey, B.Sundaresa Pandian, Tulika pandey, Application Of IP Traceback Mechanism to Online Voting, International Conference on Advanced Computing, Networking and Security (ADCONS 2011), Springer- Verlag Berlin Heidelberg, LNCS 7135, pp. 620-629, 2011
  41. S.Prasanna, S.MercyShalinie, V. Akilandeswari, D. Namatchivayam, V. Akilandeswari, D. Namatchivayam, Design of an Early Response System Using EGT-based Overlay Network, Recent Trends in Information Technology(ICRTIT),
  42. S.MercyShalinie, T.Subbulakshmi, Analysis of Immune Intrusion Detection Systems using Sequence of System calls, National Conference on Recent Trends in Advanced Computing(NCRTAC 05), 2005
  43. T.Subbulakshmi, S.MercyShalinie, Misuse Detection Systems using Support Vector Machines, International Conference on Information Technology and Business Intelligence(ITBI 09), 2009
  44. S.MercyShalinie, K.Sundarakantham, Hand Written Numeral Recognition Using Neocognitron,, National Conference on Artificial Neural Networks And Fuzzy Systems,, 2002
  45. T.Subbulakshmi, S.MercyShalinie, Real Time Detection and Classification of DDoS Attacks using Enhanced SVM with String Kernals, International Conference on Recent Trends in Information Technology, 91
  46. B.S.Kiruthika, G.Preetha, S.MercyShalinie, A Novel Fuzzy congestion control Algorithm for Router Buffers, Recent Trends in Information Technology(ICRTIT), pp.423-427,2011
  47. S.MercyShalinie, T.Subbulakshmi, Intelligent Masquerader Detection using Linux Command Sequences, National Conference on Advances in Computer Engineering and Networking(NCACEN 08), 2008
  48. T.Subbulakshmi, S.MercyShalinie, Attack Source Identification at Router Level in Real Time Using Marking Algorithm Deployed in Programmable Routers, International Conference on Recent Trends in Information Technology, 1
  49. S.MercyShalinie, T.Subbulakshmi, Application of Naive Bayes Classifiers for Detecting Masqueraders using Enriched and Truncated Command lines, International Conference on Information Security(ICIS 05), 2005
  50. K.Sundarakantham, S.MercyShalinie, Natural Language Grammatical Inference Using Support Vector Machines,, International Conference on Intelligent Sensing And Information Processing,, Jan 4-7 , 2005
  51. S.MercyShalinie, B. Thanga Parvathy, A High Speed Decision Tree Classifier Algorithm for Huge Dataset , Recent Trends in Information Technology(ICRTIT), pp. 695-700, 2011
  52. S.MercyShalinie, K.Sundarakantham, A Author Topic Model Based Unsuperfised Algoritm For Learning Topics from Large Text Collections, Recent Trends in Information Technology(ICRTIT), p.360-363,2011
  53. K.Sundarakantham, S.MercyShalinie, Unsupervised learning of context free grammars with a hybrid statistical and probablistic algorithm, International Conference on Knowledge Networking Networking in ICT Era, 365, 2010
  54. T.Subbulakshmi, S.MercyShalinie, MLAs for Intrusion Detection, PC Quest Magazine , Jan 2007
  55. S.Padmavathi, S.MercyShalinie, Enhanced Memetic Algorithm for Task Scheduling, International Conference on Swarm, Evolutionary and Memetic Computing, Dec-2010
  56. T.Subbulakshmi, S.MercyShalinie, Feature Selection and Classification of Intrutions Using Genetic Algorithms and Neural Networks , Communication in Computer and Information Science, Vol No.90
  57. S.MercyShalinie, S.Padmavathi, Hybrid Approach for Task scheduling with Selective Duplication under Memory and Time constraints, International Conference on Emerging Trends in Engineering Technologies ICETES 2010, 2010
  58. S.MercyShalinie, S.Padmavathi, Introduction of Contention Awareness in Task Scheduling, National Conference on Advanced Computing & Application NCACA-09, 2009
  59. S.MercyShalinie,S.Padmavathi Contention Awareness in Task Scheduling Using Tabu Search,IEEE International Advance Computing Conference IACC 09,2009 (Available in IEEE Xplore Library)
  60. S.MercyShalinie, S.Padmavathi, DAG Scheduling On Cluster of Workstations using Hybrid Particle Swarm Optimization, International Conference on Emerging Trends in Engineering&Technology ICETET 2008, 2008
  61. S.MercyShalinie, S.Padmavathi, Performance Effective Task Scheduling For Homogeneous Computing Environment, National Conference on Ubiquitous & Pervasive Computing NCUPC 2008, 2008
  62. S.MercyShalinie, S.Padmavathi, Analyzing The Time Complexity Of Parallel Algorithms For Knapsack Problem, International Conference On Signal Processing,Communications And Networking, Feb-22 to 24 , 2007
  63. J. Felicia Lilian, K.Sudarakantham, S Mercy shalinie, “ACA: Attention based Context aware Answer selection system”, in the International Conference on Machine Intelligence And Signal Processing (MISP’19) at IIIT Allahabad
  64. M. Suguna, S. Mercy Shalinie, J. Adlene Anusha, "Towards cloud storage security enhancement using secure access control and sure deletion (SASD)", IEEE Sixth International conference on advanced computing, ICoAC 2014
  65. S.MercyShalinie,K.NarasimaMallikarjunan,K.Sundarakantham CoDe — An collaborative detection algorithm for DDoS attacks,Recent Trends in Information Technology (ICRTIT), 2011 ,Page(s): 113- 118
  66. J. Felicia Lilian, K.Sundarakantham, Harinie Rajashree, S. Mercy Shalinie, SSE: Semantic Sentence Embedding for learning user interactions, ICCCNT,2019 at IIT Kanpur
  67. G.MadhuPriya, D.S.Abinaya, S.MercyShalinie, "Framework for detecting malware in virtualized environment", International Conference on Modeling, Optimizing and Computing (ICMOC2012) held at Noorul Islam Centre for Higher Education, Kanyakumari District ,April 10, 11 2012, Vol II, pages 767-775
  68. M.Suguna,S.MercyShalinie, R.Parkavi, A Weblet Scheduler Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing ,International Conference on Modeling, Optimizing and Computing ,ICMOC, 2012
  69. S.MercyShalinie,S.Padmavathi, D.Kavinithya, Integrated Approach to Performance Effective Task Scheduling ,International Conference on Advanced Computing and Communication Technologies -ACCT’11,2011
  70. K.Sundarakantham,S.MercyShalinie An Intelligent Tamil Chat Robot,,National Conference On Recent Advances In Computing,,Dec 21-22 , 2007.
  71. M.Vijayalakshmi,S.MercyShalinie, A.Arun Pragash,IP Traceback System for Network and Application Layer Attack,Recent Trends in Information Technology(ICRTIT),pp.439-444, 2012
  72. S.Prasanna,M.Vijayalakshmi,S.MercyShalinie, Anomaly Detection System based on Analysis of Packet Header and Payload Histograms,Recent Trends in Information Technology(ICRTIT),pp.412-416,2011

Books

  1. Suguna M, Mercy Shalinie S, Sivaranjani R, "Integrity Verification for Shared Data in Group with User Revocation" In: Zungeru A., Subashini S., Vetrivelan P. (eds) Wireless Communication Networks and Internet of Things, Lecture Notes in Electrical Engineering, vol 493, Springer, Singapore, 2019

Sponsored Research

TITLE SPONSORING AGENCY AMOUNT RESPONSIBILITY
Multisensor Data Fusion DRDO,Hyderabad Rs. 5 lakhs Principal Investigator
Content Generation,Distribution and Mobile Learning DIT,New Delhi Rs. 99 Lakhs Principal Investigator
Smart and Secure Environment National Technical Research Organization Rs. 1 Crore Co-Investigator
High Performance Computing - FIST DST, New Delhi Rs.35.50 Lakhs Principal Investigator

Seminar, Conference, Workshop Attended

  1. Free/Open Source Software Tools, Thiagarajar College Of Engineering, 2007
  2. Redhat Courses Rh033,Rh133,Rh233, Thiagarajar College Of Engineering, 2008
  3. Internation Conference On Neural Networks, Madras Institute of Technoliogy,Chennai, 1997
  4. Quality Improvement Programme On Instructional Design And Delivery, Thiagarajar College Of Engineering, 2004
  5. Globalization Summit, Zinnov,Bangalore, 2011
  6. Campus Connect Program, Infosys,Chennai, 2009
  7. 5th Indo-Australian Conference on IT Security, Jawaharlal Nehru University, New Delhi, 2009
  8. Developing Leadership Skills, Indo-US Collaboration for Engineering Education(IUCEE),Infosys Campus, Mysore, 2008

Seminar, Conference, Workshop Organised

  1. 17th Workshop on Smart and Secure Environment, Thiagarajar College of Engineering, 2011
  2. Faculty Development Program on FOSS, Thiagarajar College of Engineering, 2009
  3. National Conference on FOSS, Thiagarajar College of Engineering, 2009
  4. Seminar on FOSS tools in Information Security, Thiagarajar College of Engineering, 2008

Ph.D Guidance/Supervisorship

NAME OF SCHOLAR COURSE AREA OF RESEARCH STATUS
K.Venkatalakshmi Ph.D Multisensor Data Fusion Completed
K.Sundarakantham Ph.D Natural language processing Completed
S.Padmavathi Ph.D Scheduling algorithms for Parallel computers Completed
T.Subbulakshmi Ph.D DDoS mitigation models Completed
D.Tamilselvi Ph.D Agent based systems Completed
G.Sujitha Ph.D Cloud storage security Completed
P.S.Aravind M.E/M.S Factoring algorithms Completed
V.K.Soundar Rajam M.E/M.S IP traceback mechanism Completed
V.Akilandeswari Ph.D Self-healing networks Completed
B.S.Kiruthika Devi M.E/M.S Analysis of Denial of service attacks Completed
G.Preetha Ph.D Quantitative modeling for DDoS attack mitigation Completed
B. Thanga Parvathi Ph.D Classifier models Completed
M.Vijayalakshmi Ph.D IP Traceback scheme for DDoS attack Completed
G. Akilarasu Ph.D Secure routing in WMN Completed
S. Karthick Ph.D Parallel text mining Completed
M. Suguna Ph.D Security in Mobile Cloud Computing Completed
K. Narasimha Mallikarjunan Ph.D Behavior models for attackers Completed
G. Madhupriya Ph.D Live migration of virtual resources Completed
P. Mohana Priya Ph.D Secure Cognitive Protocol for SDN Completed
J. Kirupakar M.E/M.S Situation Aware Machine Learning system Completed
R.Nagarathna Ph.D SDN Security Completed

Lectures Delivered

TOPIC DELIVERED AT PERIOD
Towards Security in Hadoop Keynote Address, International Conference on Advances in Computing ICAC 2011, P.S.G.College of Technology, Coimbatore
Parallel Algorithms And Neural Networks UGC Refresher Course, Madurai Kamaraj University
Cloud Storage Security Hadoop Summit,Indian Institute of Science, Bangalore
DDoS Experimental Testbed Queensland University of Technology, Brisbane, Australia
Security,Threats and Vulnerabilities National Seminar on Recent Trends & Research in Cyber & Data Security,NEC
Machine Learning and its applications Seminar on Recent Trends in Advanced Computing, Manonmaniam Sundaranar University, Tirunelveli

Membership

NAME OF SOCIETY DETAILS PERIOD
Insitution of Engineering(India) Life Member -
Indian Society of Technical Education Life Member -
IEEE Senior Member -
Computer Society of India Life Member -

Other Achievements

  1. Reviewer, IEEE Transactions on Cloud computing, Thomson Reuters
  2. Reviewer, Journal of Information Technology and Decision making, World Scientific