Dr.S.MercyShalinie

 shalinie@tce.edu

131

PUBLICATIONS       

4

SPONSORED PROJECTS

3

CONSULTANCY PROJECTS

22

M.E./Ph.D. SCHOLARS

8

SEMINAR, CONFERENCE, WORKSHOP ATTENDED

 Educational Qualification

DEGREE BRANCH INSTITUTE YEAR
B.E. EIE Annamalai University 1989
M.E. Applied Electronics Coimbatore Institute of Technology 1991
Ph.D. Design of Neuro-Fuzzy systems Madurai Kamaraj University 1999
Post Doctoral Fellowship Machine Learning models for threat analyses University of California, Irvine, USA 2008

 Experience

PERIOD NO OF YEARS DESIGNATION INSTITUTION
2011 to till date 10.5 Professor Thiagarajar College of Engineering
2007 to 2011 4 Associate Professor Thiagarajar College of Engineering
2005 to 2007 2 Assistant Professor Thiagarajar College of Engineering
1996 to 2005 9 Lecturer Thiagarajar College of Engineering
1990 to 1996 6 Lecturer R.V.S. College of Engg.

 Publications

 Journals
  1. Anita, N, Vijayalakshmi, M & Shalinie, SM, 2022, ‘Proof-of-improved-participation: A new consensus protocol for blockchain technology’, Computer Systems Science and Engineering, vol. 44, no. 3, pp. 2007-2018, ISSN: 0267-6192, Impact Factor: 4.397. SCI Indexed
  2. Anita, N, Vijayalakshmi, M & Shalinie, SM 2022, ‘A Lightweight scalable and secure blockchain based IoT using fuzzy logic’, Wireless Personal Communications, vol. 125, no. 3, pp. 2129-2146, ISSN: 0929-6212, Impact Factor: 2.017. SCI Indexed
  3. Anita, N., Vijayalakshmi, M. & Shalinie, S.M. Blockchain-based anonymous anti-counterfeit supply chain framework. Sādhanā 47, 208 (2022). https://doi.org/10.1007/s12046-022-01984-2 SCI Indexed
  4. Dharani J, Sundarakantham K, Kunwar Singh, Mercy Shalinie S, "A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric" in Elsevier Computers & Security Journal Volume 116, February 2022. DOI: https://doi.org/10.1016/j.cose.2022.102637.
  5. Lilian, J.F., Sundarakantham, K. & Shalinie, S.M. QeCSO: Design of hybrid Cuckoo Search based Query expansion model for efficient information retrieval. Sādhanā 46, 181 (2021). https://doi.org/10.1007/s12046-021-01706-0
  6. Dharani J, Sundarakantham K, Kunwar Singh, Mercy Shalinie S, "Design of Anonymous Endorsers in Hyperledger Fabric withLinkable Threshold Ring Signature" in Research Briefs on Information & Communication Technology Evolution (ReBICTE), Vol. 6, Article No. 4, October 1, 2020. DOI: 10.22667/ReBiCTE.2020.10.01.004
  7. Felicia Lilian J, Sundarakantham K, Mercy Shalinie S. (2020) Anti-negation method for handling negation words in question answering system. The Journal of Supercomputing, 1-23. DOI: 10.1007/s11227-020-03437-1. ISSN: 0920-8542, 77(6)
  8. M. -H. Yang, J. -N. Luo, M. Vijayalakshmi and S. M. Shalinie, "Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices," in IEEE Access, vol. 8, pp. 201087-201097, 2020, doi: 10.1109/ACCESS.2020.3034226. Impact Factor: 4.096
  9. 1.Felicia Lilian J, Sundarakantham, K & Mercy Shalinie S, Anti-negation method for handling negation words in question answering system, The Journal of Supercomputing, 1-23, 2020
  10. M. Suguna, S. Mercy Shalinie, "Privacy preserving auditing protocol for remote data storage", Cluster Computing, 22(3), pp.6891-6898 (2019)
  11. Vijayalakshmi, M and Mercy Shalinie, S, ‘UDP based IP Traceback for Flooding DDoS Attack’, The International Arab Journal of Information Technology, Vol. 15, No. 1, pp. 103 - 111, 2018. Impact factor : 0.724
  12. Prabavathy, S, Sundarakantham, K & Mercy Shalinie, S 2018, ‘Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things’, Journal of Communications and Networks. Vol 20, No 3, June 2018, pp 291- 298. DOI: 10.1109/JCN.2018.000041. Impact Factor – 1.130
  13. K.NarasimhaMallikarjunan, S.Mercy Shalinie, G.Preetha,Real Time Attacker Behavior Pattern Discovery and Profiling using Fuzzy Rules, Special issue on Behavior Data Analytics for Cyber security, Journal of Internet Technology,Vol. 19, no. 5 , pp. 1567-1575 ,2018
  14. M. Suguna, S. Mercy Shalinie, "Provable dynamic auditing in mobile cloud computing for secure storage of e-health data", Biomedical Research (India), pp. 88-94, 2018
  15. A.Avelin Diana, K.Sundarakantham, S.Mercy Shalinie, Alleviation of Binding Update Re-registration handoff latency at Home Agent Failure in MIPv6 Network, International Journal of Computer Communications and Control vol.10, no.4, pp. 463-467, 2015 (Annexure-1)DOI:10.1109/WIRLES.2005.1549599, 1295-1300. Impact Factor 0.694
  16. Vijayalakshmi, M and Mercy Shalinie, S 2014, ‘Single Packet ICMP Traceback Technique using Router Interface’, Journal of Information Science and Engineering, vol. 30, no. 6, pp. 1673-1694. Impact Factor: 0.61
  17. P. Mohana Priya, V. Akilandeswari, S. Mercy Shalinie, Detecting DRDoS attack by Log File based IP pairing mechanism, WSEAS Transaction on Computers, Vol 13, pp. 538 - 548, November 2014
  18. M.Parvathy,K.Sundarakantham,S.Mercy Shalinie,Cosine Similarity based clustering and dynamic reputation trust aware key generation scheme for trusted communication on social Networking, Journal of Statistical Computation and Simulation 85(16):1-12 · May 2014 DOI: 10.1080/00949655.2014.964240 Source Normalized Impact Factor 0.749
  19. P. Mohana Priya, V. Akilandeswari, G. Akilarasu, S. Mercy Shalinie, An Integrated approach of E-RED and ANT classification methods for DRDoS attacks, Journal of Communications in Computer and Information Science, pp. 369 - 377, 2014
  20. Parvathy, K.Sundarakantham, S.Mercy Shalinie, TRPC: An ensembled Online prediction mechanism for trusted Recommender systems, WSEAS Transactions on computers,13, 2014, Art 19, pp 231-241 Source Normalized Impact Factor: 0.39
  21. Avelin Diana, K. Sundarakantham, S. Mercy Shalinie and L. Rajendran, “Analytical Model for Binding Refresh Request to reduce Storage and Communication Overhead in MIPv6 Network”, International Journal of Network Management,vol. 24, no.5, pp. 402-414, 2014.DOI: 10.1002/nem.1871 Source Normalized Impact Factor: 0.681
  22. Avelin Diana, K.Sundarakantham, S.Mercy Shalinie, DHSLB:Dynamic HA Selection WITH Load Balancing mechanism in MIPv6 network, Australian Journal of Basic and Applied Sciences, 8 (6), 1-6: 2014, Source Normalized Impact Factor: 0.23
  23. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, SHAD: Swift Home Agent Discovery Mechanism to mitigate home registration latency in MIPv6 network, Information : An International Interdisciplinary Journal, Vol.17, No. 4, pp.1375 - 1381, April 2014.
  24. M. Parvathy, R. Ramya, K. Sundarakantham, S. Mercy Shalinie, Tnet: A Trust network for predicting trust in Online Social networks, Information : An International Interdisciplinary Journal, Vol.17, No. 4, pp.1383 - 1393, April 2014
  25. V. Akilandeswari, S. Mercy Shalinie, A Self-organizing Defense technique for SSH Dictionary attacks, Information : An International Interdisciplinary Journal, Vol. 17, No. 2, pp. 821 - 834, February 2014.
  26. V. Akilandeswari, S. Mercy Shalinie, Design of an adaptive distributed critical care extensive response network (AD-CERN) using cooperative overlay network, 2014
  27. G. Sujitha, T. Rajeswaran, R. thiagarajan, K. Vidya, S. Mercy Shalinie, Preserving Privacy of cloud data using Homomorphic encryption in Map Reduce, International Journal of Hybrid Information Technology, Vol.7, No.3, pp.363 - 376, 2014.
  28. A. Avelin Diana, K. Sundarakantham, S. Mercy Shalinie, V. Raga Vinodhini, DHSLB: Dynamic HA Selection with load balancing mechanism in MIPv6 network, Australian Journal of Basic and Applied sciences, Vol. 8, No.4, pp.1 -7, 2014.
  29. G. Sujitha, M. Varadharajan, Y. Vignesh Rao, M. K. Sarvesh Gautham, Sowmi Narayanan, R. Swarnaraja, S. Mercy Shalinie, Improving Security of Parallel Algorithm using Key Encryption Technique, Information Technology Journal , Vol 12, Issue 12, pp. 2398 - 2404, 2013.
  30. S.MercyShalinie, S.Padmavathi, D.Kavinnithya, D.Kavinnithya, An Integrated Approach to Performance Effective Task Scheduling using Aggregated Backfilling Technique , International Journal of Software Engineering Research & Practices , Volume 1, No.1, pp:25-28, January 2011
  31. T.Subbulakshmi, S.MercyShalinie, Ensemble Design of Masquerader Detection Systems for Information Security , ICTACT Journal on Soft Computing, pp.131-137,2011
  32. S.MercyShalinie, V. Akilandeswari, Fractal Dimension Based Time Delayed Neural Network for Non Linear Time Series Prediction, Journal of Computer Engineering IE(I),
  33. S.MercyShalinie, Neural Network Based Decision Making In Uncertain Environment , Journal of Cognitive science, 1998
  34. S.MercyShalinie, Design Of Variable Structure Controller Systems, Journal of Computer Engineering IE(I), pp.84-87,1995
  35. S.MercyShalinie, S.Padmavathi, Scalable, Low Complexity Task Scheduling Algorithm for Cluster of Workstations, Journal of Engineering Science and Technology, Volume 5, No.3, pp:354-363, Septermber 2010
  36. S.MercyShalinie, S.Padmavathi, Tabu Search Based Memetic Algorithm for Task Scheduling, Journal of Computational Information Systems, Volume 6,No.4, pp:1017-1025, August 2010
  37. S.MercyShalinie, S.Padmavathi, A Memetic Algorithm Based Task Scheduling considering Communication Cost on Cluster Workstations, International Journal of Advances in Soft Computing & Applications, Volume 2, No.2, pp:174-190, July 2010
  38. S.MercyShalinie, G.Preetha, B.S.Kiruthika, S.Dina Nidhya, S.Dina Nidhya, S.Dina Nidhya, Fuzzy Adaptive Tuning Of Router Buffers for congestion control, International journal of Advancements in Technology, vol 1, No 1, June 2010
  39. T.Subbulakshmi, S.MercyShalinie, Real Time Classification and Clustering IDS Alerts Using Machine Learning Algorithms, Intenational Journal of Artificial Intelligence and Applications(IJAIA), Vol.1, No.1,Jan 2010
  40. S.MercyShalinie,K.SundarakanthamSSGL: A Semi-supervised Grammar LearnerJournal of Computer Application in Technology, Inderscience PublishersVolume 38 - Issue 4, 2010. DOI: http://dx.doi.org/10.1504/IJCAT.2010.034526 Source Normalized Impact Factor:0.220
  41. T.Subbulakshmi, S.MercyShalinie, Detection and Classification of DDoS Attacks Using Machine Learning Algorithms, European Journal of Scientific Research , Vol.47, No. 3, pp. 334-346, 2010
  42. T.Subbulakshmi, S.MercyShalinie, Detection and Classification of DDoS Attacks Using Fuzzy Interfernce System, European Journal of Scientific Research , vol no.47, NO.3 ,pp 334-346,2010
  43. S.MercyShalinie, S.Padmavathi, DAG Scheduling on Cluster of Workstations using Hybrid Particle Swarm Optimization, International Journal of Simulation-Systems, Science and Technology, Volume 10, No.6, pp:50-55,July 2009
  44. S.MercyShalinie, Modeling parallel feed-forward based compression network , International Journal of Parallel, Emergent and Distributed Systems, Vol.21, No.4, pp. 227-237
  45. S.MercyShalinie, Modeling Connectionist Neuro-Fuzzy network and Applications, International Journal on Neural computation and applications, Springer Verlag, Vol.14, No 1, pp.88-93
  46. Vijayalakshmi, M, Mercy Shalinie, S, and Nithya, N 2014, ‘A Brief Survey of IP Traceback Methodologies’, Acta Polytechnica Hungarica, vol. 11, no. 9, pp. 197-216. Impact Factor: 0.745
  47. Vijayalakshmi, M, Mercy Shalinie, S, Ajay, K and Arvind, M, 'Setting up an Efficient IoT Experimental Test Bed',IoTEvolutionWorld, 2016
  48. S. Karthick, S. Mercy Shalinie, Chidambaram Kollengode, Design and Evaluation of a Parallel Algorithm for Inferring Topic Hierarchies, Information Processing and Management 51 (2015), pp. 662-676, Elsevier, DOI: 10.1016/j.ipm.2015.06.006 [Impact Factor: 2.391]
  49. S. Karthick, S. Mercy Shalinie, Parallelization of a graph-cut based algorithm for hierarchical clustering of web documents, International Journal of Concurrency and Computation: Practice and Experience, Wiley, Apr, 2015, DOI: 10.1002/cpe.3545 (In Press) [Source Normalized Impact Factor: 1.133]
  50. S.MercyShalinie, S.Surenthar,V. Akilandeswari, Unusual Attack Behavior Analysis for High Rate Flooding Attack Detection Using Markov Model, International Journal of Network Security and its Applications, April 2012
  51. G.Madhu Priya, S Mercy Shalinie, P.Mohana Priya, Deep Learning framework for early detection of intrusion in Virtualized Environment, International Journal of Business Intelligence and Data Mining, April 2020, DOI: 10.1504/IJBIDM.2018.10012559, Volume-17, Issue No. 3, Pages - 393-411, Scopus Indexed, SNIP - 0.308, SJR - Q4.
  52. Akilandeswari, V, MercyShalinie, S, Vijayalakshmi, M, Sheik Mohamad Mubeen, S, Proactive Behaviour Analysis of Network Traffic Using SNMP-MIB Agents,International Journal of Network Security and its Applications
  53. K.NarasimhaMallikarjunan, S.Mercy Shalinie, A.Bhuvaneeshwaran,BAIT: Behavior Aided Intruder Testimony Technique for Attacker Intention Prediction in Business Data Handling”, Special Issue on Applied Soft Computing Strategies for Effective Business Data Analytics, DOI: 10.1504/IJBIDM.2018.10012004 International Journal of Business Intelligence and Data Mining, 2018
  54. S.MercyShalinie,S.PadmavathiEnhanced Memetic Algorithm for Task SchedulingJournal, Springer-Verlag, Lecture Notes in Computer ScienceVolume 6466, pp:448, 2010.Impact Factor-0.51
 Conferences
  1. Harine Rajashree R, Sundarakantham K, Mercy Shalinie S, " A Novel Hierarchical clustering technique to analyse style and content factorization during Image Recognition", International conference on Machine learning, Deep Learning, and Computational Intelligence for Wireless Communication MDCWC 2023, COMPSIG, NIT Trichy, 22-24 Jun 2023
  2. Ramprasad R, Pradhiksha S, Sundarakantham K, Harine Rajashree R, Mercy Shalinie S, ”A partitioned Task offloading Approach for Privacy Preservation at Edge” in 2nd International Conference on Big Data, Machine Learning and Applications (BigDML 2021) at National Institute of Technology Silchar, India, 19-20, December 2021.
  3. Dharani J, Sundarakantham K, Kunwar Singh, Mercy Shalinie S, " Obfuscation techniques for a secure endorsement system in Hyperledger Fabric" in International Conference on Network Security and Blockchain Technology at Indian Statistical Institute (ISI), Kolkata, December 2-4, 2021.
  4. J. Felicia Lilian, K. Sundarakantham, S. Mercy Shalinie, “SSE: Semantic Sentence Embedding for learning user interactions” in the International Conference on Computing, Communication and Networking Technologies (ICCCNT’19) at IIT Kanpur
  5. J. Felicia Lilian, K. Sundarakantham and S. Mercy Shalinie “DLRCNeg: Deep Learning based Reading Comprehension by handling Negation” at the PhD Forum at Advanced Computing and Communication Conference (ADCOM/ACCS) at IIIT Bangalore on 6th September 2019.
  6. J. Felicia Lilian, K. Sundarakantham and S. Mercy Shalinie “ACA: Attention based Context aware Answer selection system” at the International Conference on Machine Intelligence And Signal Processing (MISP’19) at IIIT Allahabad on 8th September 2019.
  7. J. Dharani, K. Sundarakantham, Kunwar Singh and S. Mercy Shalinie “Design of Anonymous Endorsers in Hyperledger Fabric with Linkable Threshold Ring Signature” at National Conference on Blockchain and Smart Contract Technology, (BSCT’19)
  8. J. Felicia Lilian, K. Sundarakantham, S.Mercy Shalinie, “An Efficient information retrieval mechanism from relevant document”, in International Symposium on Artificial Intelligence and Computer Vision by the DCSE, College of Engineering, Guindy, Chennai
  9. Felicia, K.Sundarakantham, S.Mercy Shalinie : An efficient information retrieval mechanism from relevant Document, AICV 2018, 26th to 28th September 2018 at CEG,Anna University
  10. M Suguna, S Mercy Shalinie, "Privacy preserving data auditing protocol for secure storage in mobile cloud computing", IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2725-2729, 2017
  11. M Suguna, R Anusia, S Mercy Shalinie, S Deepti, "Secure identity management in mobile cloud computing", IEEE International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2), PP. 42-45, 2017
  12. S.Prabavathy,K.Sundarakantham,S.Mercy Shalinie "Decentralised Secure Framework for Social Collaborative Internet of Things" in 4th International Conference on Signal Processing, Communications and Networking (ICSCN'17) MIT,Anna University, 16th-18th Mar 2017
  13. S. Karthick, S. Mercy Shalinie, Parallel Hierarchical Subspace Clustering for Segmenting Large Text Corpuses, IEEE International Conference on Electronics and Informatics, Mar 2017. (Accepted)
  14. S.Prabavathy, K.Sundarakantham, S.Mercy Shalinie, "EPIDS:Eneregy Efficient Privacy Preserving Intrusion Detection System for Internet of Things" International Conference on IoT,Data Science and Security(ICIDS-2017) PSG College of Technology, Coimbatore, 6th and 7th January 2017
  15. K.NarasimhaMallikarjunan,K.Muthu Priya,S.Mercy Shalinie,'A survey of Distributed Denial of Service attack',10th International Conference on Intelligent Systems and Control (ISCO 2016)
  16. M. Suguna, J. Adlene Anusha, S.Mercy Shalinie, "Secure Data Sharing with Efficient User Revocation using Proxy Re-signature for Mobile Users Group in Cloud", National Conference on Data Intensive Computing (NCDIC), 2016
  17. K.NarasimhaMallikarjunan,S.Mercy Shalinie,"Evaluation of Security Metrics for Security Analysis" in National Conference on Enhancing Information Technology Education (EITE-2016) diring Jan 4 to Jan 8th 2016 at NIT Goa.
  18. K.NarasimhaMallikarjunan,K.Sundarakantham,S.Mercy Shalinie,"Model for Cyber Attacker Behavior Analysis " in IEEE workshop on computational Intellegence in IIT Kanpur held during dec 14 to dec 17 2015 pg no 1-4
  19. M.Parvathy, R.Ramya, K.Sundarakantham,S.Mercy Shalinie, Recommendation System with Collaborative Social Tagging Exploration, International Conference on Recent Trends in Information Technology,2014
  20. S. Karthick, S. Mercy Shalinie, Parallel Algorithms for Merging Topic Trees, Proceedings of the International ACM KDD Conference CODS-2015, Bangalore, India
  21. M. Suguna, J. Adlene Anusha, S. Mercy Shalinie, "Towards Efficient and Secure Data Storage (ESDS) Framework for Cloud Computing", International Journal of Applied Engineering Research, Vol. 10, No. 2, pp. 1534-1538, 2015
  22. Sixth International Conference on Advanced Computing (ICoAC 2014) in association with IEEE, "A Survey on foundation for future generation internet through network virtualization" at MIT, Chennai
  23. S. Karthick, S. Mercy Shalinie, Chidambaram Kollengode, A Sparsification Technique For Fast Hierarchical Community Detection in Social Networks, Proc. of the International IEEE Conference on Eco-Friendly Computing and Communication Systems, NIT-K, Mangalore, Dec 2014.
  24. Mobile Application Testing on smart devices using MTAAS framework in cloudA.Malini,N. Venkatesh, K.Sundarakantham, S.Mercy Shalinie International conference on Computing and Communication Technologies ICCCT 2014,Osmania University, Hyderbad
  25. V.K.Soundar Rajam, G. Selvaram, M. Pradeep Kumar, S. Mercy Shalinie, ACOPID : An Improved Traceback Mechanism based on ACO Algorithm for DDoS Attack, International Conference On Communication Network, Elsevier Sciencetech, pp. 194 - 202, July 2014.
  26. S. Karthick, S. Mercy Shalinie, Effect of Multi-word Features on the Hierarchical Clustering of Web Documents, IEEE International conference on Recent Trends in IT at Anna University-Chennai, April 2014
  27. P. Mohana Priya, V. Akilandeswari, S. Mercy Shalinie, V. Lavanya, M. Shanmuga Priya, The Protocol Independent Detection and Classifcation (PIDC) System for DRDoS attack, IEEE International Conference on Recent Trends in Information Technology, MIT, pp. 1 - 7, April 2014.
  28. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, K. NarasimhaMallikarjun, Binding registration based on Home agent priority queue scheduling in MIPv6 network, Fourth International Conference on Recent Trends in Information Technology, pp. 1- 7, April 2014.
  29. B.S. Kiruthiga Devi, G. Preetha, S. Mercy Shalinie, An impact analysis: Realtime DDoS Attack Detection and Mitigation Using Machine Learning, IEEE International Conference on Recent Trends in Information Technology, pp. 1- 7, April 2014.
  30. G.Madhu Priya, S.Ezhilarasi, S.Mercy Shalinie, "Efficient memory utilization using dynamic resource provisioning", TEQIP II sponsored National Conference on Intelligent systems, computing and information technology 2014 at Anna university Bharathidasan institute of technology, Tiruchirappalli, April 4-5 2014, Volume I, page 61-68.
  31. K.NarasimhaMallikarjunan,A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie,"Binding Registration Based On Home Agent Priority Queue Scheduling in MIPv6 Network",International Conference on Recent Trends in Information Technology -2014
  32. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, CRHA : An Efficient HA revitalization to sustain binding information of Home agent in MIPv6 network , International Conference on Computational Intelligence, Cyber security and Computational Models (ICC3), Springer - Advances in Intelligent Systems and Computing, Vol 246, pp. 227 - 235, 2014.
  33. K.Sundarakantham, S.Mercy Shalinie, A.Avelin Diana, V.Ragavinodhini,CHRA: An Efficient HA Revitalization to sustain Binding Information of Home Agent in MIPv6 Network,Computational Intelligence,Cyber Security and Computational models, Advances in Intelligent Systems and Computing 246, DOI: 10.1007/978-81-322-1680-3_25, Springer India ,2014
  34. K.Sundarakantham, S.Mercy Shalinie, M.Parvathy, R.Ramya, Trust Dependence Network for Recommender Systems, Fifth International Conference on Advanced Computing, ICoAC, Dec 2013
  35. Code Refactoring Using Aspect Oriented Programming,A.Malini, K.Vanitha, K.Sundarakantham, S.Mercy Shalinie, ACM National Conference on Intelligent Computing,PSG college of Technology, Coimbatore,National,26.4.13-27.4.13
  36. G. Prem Paul, V. Akilandeswari, S. Mercy Shalinie, Evolution of Vulnerability in Large Scale Networks, International Conference in Engineering and Technology, (ICET2K13), pp. 77-80, April 2013
  37. K.Sundarakantham, S.Mercy Shalinie, M.Parvathy, M.P.Manoj kumar,D.L.Don Rudin,V.Anandarajan, Detection of Malicious communities in Online Social Networks, PSG-ACM National Conference on Intelligent Computing NCIC 2013, Page No 386-390, 26-27 April 2013
  38. V. Akilandeswari, D. Namachivayam, S. Prasanna, S. Mercy Shalinie, Design of an Early Response System using EGT-based overlay network, International Conference on Recent Trends in Information Technology (ICRTIT), MIT, pp. 445 - 451, April 2012
  39. V. Akilandeswari, S. Mercy Shalinie, Probabilistic Neural Network based Attack Traffic Classification, Fourth International Conference on Advanced Computing (ICOAC), MIT, Chennai, pp. 1-8, 2012.
  40. V.K.Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie, Tulika Pandey, Application IP Traceback Mechanism to Online Voting, International Conference on Advanced Computing, Networking and Security (ADCONS 2011), Springer-Verlag Berlin Heidelberg LNCS 7135, pp. 620-629, 2012
  41. V.K.SoundarRajam, S.MercyShalinie, B.Sundaresa Pandian, Tulika pandey, B.Sundaresa Pandian, Tulika pandey, Application Of IP Traceback Mechanism to Online Voting, International Conference on Advanced Computing, Networking and Security (ADCONS 2011), Springer- Verlag Berlin Heidelberg, LNCS 7135, pp. 620-629, 2011
  42. V.K.SoundarRajam, S.MercyShalinie, A Novel Traceback Algorithm for DDoS Attack with Marking Scheme for Online System, International Conference on Recent Trends in Information Technology, pp.407-412,2012
  43. S.Prasanna, S.MercyShalinie, V. Akilandeswari, D. Namatchivayam, V. Akilandeswari, D. Namatchivayam, Design of an Early Response System Using EGT-based Overlay Network, Recent Trends in Information Technology(ICRTIT),
  44. B.S.Kiruthika, G.Preetha, S.MercyShalinie, DDoS Detection Using Host-Network Based Metrics and Mitigation in Experimental Testbed, Recent Trends in Information Technology(ICRTIT), pp. 423-427,2012
  45. B.S.Kiruthika, G.Preetha, S.MercyShalinie, A Novel Fuzzy congestion control Algorithm for Router Buffers, Recent Trends in Information Technology(ICRTIT), pp.423-427,2011
  46. T.Subbulakshmi, S.MercyShalinie, Attack Source Identification at Router Level in Real Time Using Marking Algorithm Deployed in Programmable Routers, International Conference on Recent Trends in Information Technology, 1
  47. S.MercyShalinie, T.Subbulakshmi, Intelligent Masquerader Detection using Linux Command Sequences, National Conference on Advances in Computer Engineering and Networking(NCACEN 08), 2008
  48. K.Sundarakantham, S.MercyShalinie, Natural Language Grammatical Inference Using Support Vector Machines,, International Conference on Intelligent Sensing And Information Processing,, Jan 4-7 , 2005
  49. S.MercyShalinie, B. Thanga Parvathy, A High Speed Decision Tree Classifier Algorithm for Huge Dataset , Recent Trends in Information Technology(ICRTIT), pp. 695-700, 2011
  50. T.Subbulakshmi, S.MercyShalinie, MLAs for Intrusion Detection, PC Quest Magazine , Jan 2007
  51. T.Subbulakshmi, S.MercyShalinie, Misuse Detection Systems using Support Vector Machines, International Conference on Information Technology and Business Intelligence(ITBI 09), 2009
  52. S.MercyShalinie, K.Sundarakantham, Hand Written Numeral Recognition Using Neocognitron,, National Conference on Artificial Neural Networks And Fuzzy Systems,, 2002
  53. S.MercyShalinie, K.Sundarakantham, A Author Topic Model Based Unsuperfised Algoritm For Learning Topics from Large Text Collections, Recent Trends in Information Technology(ICRTIT), p.360-363,2011
  54. K.Sundarakantham, S.MercyShalinie, Unsupervised learning of context free grammars with a hybrid statistical and probablistic algorithm, International Conference on Knowledge Networking Networking in ICT Era, 365, 2010
  55. T.Subbulakshmi, S.MercyShalinie, Real Time Detection and Classification of DDoS Attacks using Enhanced SVM with String Kernals, International Conference on Recent Trends in Information Technology, 91
  56. S.MercyShalinie, T.Subbulakshmi, Analysis of Immune Intrusion Detection Systems using Sequence of System calls, National Conference on Recent Trends in Advanced Computing(NCRTAC 05), 2005
  57. S.MercyShalinie, T.Subbulakshmi, Application of Naive Bayes Classifiers for Detecting Masqueraders using Enriched and Truncated Command lines, International Conference on Information Security(ICIS 05), 2005
  58. S.Padmavathi, S.MercyShalinie, Enhanced Memetic Algorithm for Task Scheduling, International Conference on Swarm, Evolutionary and Memetic Computing, Dec-2010
  59. S.MercyShalinie, S.Padmavathi, Hybrid Approach for Task scheduling with Selective Duplication under Memory and Time constraints, International Conference on Emerging Trends in Engineering Technologies ICETES 2010, 2010
  60. T.Subbulakshmi, S.MercyShalinie, Feature Selection and Classification of Intrutions Using Genetic Algorithms and Neural Networks , Communication in Computer and Information Science, Vol No.90
  61. S.MercyShalinie, S.Padmavathi, Introduction of Contention Awareness in Task Scheduling, National Conference on Advanced Computing & Application NCACA-09, 2009
  62. S.MercyShalinie,S.Padmavathi Contention Awareness in Task Scheduling Using Tabu Search,IEEE International Advance Computing Conference IACC 09,2009 (Available in IEEE Xplore Library)
  63. S.MercyShalinie, S.Padmavathi, Performance Effective Task Scheduling For Homogeneous Computing Environment, National Conference on Ubiquitous & Pervasive Computing NCUPC 2008, 2008
  64. S.MercyShalinie, S.Padmavathi, DAG Scheduling On Cluster of Workstations using Hybrid Particle Swarm Optimization, International Conference on Emerging Trends in Engineering&Technology ICETET 2008, 2008
  65. S.MercyShalinie, S.Padmavathi, Analyzing The Time Complexity Of Parallel Algorithms For Knapsack Problem, International Conference On Signal Processing,Communications And Networking, Feb-22 to 24 , 2007
  66. J. Felicia Lilian, K.Sudarakantham, S Mercy shalinie, “ACA: Attention based Context aware Answer selection system”, in the International Conference on Machine Intelligence And Signal Processing (MISP’19) at IIIT Allahabad
  67. M. Suguna, S. Mercy Shalinie, J. Adlene Anusha, "Towards cloud storage security enhancement using secure access control and sure deletion (SASD)", IEEE Sixth International conference on advanced computing, ICoAC 2014
  68. S.MercyShalinie,K.NarasimaMallikarjunan,K.Sundarakantham CoDe — An collaborative detection algorithm for DDoS attacks,Recent Trends in Information Technology (ICRTIT), 2011 ,Page(s): 113- 118
  69. J. Felicia Lilian, K.Sundarakantham, Harinie Rajashree, S. Mercy Shalinie, SSE: Semantic Sentence Embedding for learning user interactions, ICCCNT,2019 at IIT Kanpur
  70. M.Suguna,S.MercyShalinie, R.Parkavi, A Weblet Scheduler Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing ,International Conference on Modeling, Optimizing and Computing ,ICMOC, 2012
  71. G.MadhuPriya, D.S.Abinaya, S.MercyShalinie, "Framework for detecting malware in virtualized environment", International Conference on Modeling, Optimizing and Computing (ICMOC2012) held at Noorul Islam Centre for Higher Education, Kanyakumari District ,April 10, 11 2012, Vol II, pages 767-775
  72. K.Sundarakantham,S.MercyShalinie An Intelligent Tamil Chat Robot,,National Conference On Recent Advances In Computing,,Dec 21-22 , 2007.
  73. S.MercyShalinie,S.Padmavathi, D.Kavinithya, Integrated Approach to Performance Effective Task Scheduling ,International Conference on Advanced Computing and Communication Technologies -ACCT’11,2011
  74. S.Prasanna,M.Vijayalakshmi,S.MercyShalinie, Anomaly Detection System based on Analysis of Packet Header and Payload Histograms,Recent Trends in Information Technology(ICRTIT),pp.412-416,2011
  75. M.Vijayalakshmi,S.MercyShalinie, A.Arun Pragash,IP Traceback System for Network and Application Layer Attack,Recent Trends in Information Technology(ICRTIT),pp.439-444, 2012
 Books
  1. A Survey on denial of service attack in wired infrastructure
  2. Suguna M, Mercy Shalinie S, Sivaranjani R, "Integrity Verification for Shared Data in Group with User Revocation" In: Zungeru A., Subashini S., Vetrivelan P. (eds) Wireless Communication Networks and Internet of Things, Lecture Notes in Electrical Engineering, vol 493, Springer, Singapore, 2019

 Projects

TITLE SPONSORING AGENCY AMOUNT RESPONSIBILITY
Multisensor Data Fusion DRDO,Hyderabad Rs. 5 lakhs Principal Investigator
Content Generation,Distribution and Mobile Learning DIT,New Delhi Rs. 99 Lakhs Principal Investigator
Smart and Secure Environment National Technical Research Organization Rs. 1 Crore Co-Investigator
High Performance Computing - FIST DST, New Delhi Rs.35.50 Lakhs Principal Investigator

 Consultancy

NAME OF INDUSTRY DETAILS PERIOD
LinkedIn Workload characterization 12-03-2020 to 31-03-2021
Honeywell Binary Differential loader 16-08-2018 to 24-10-2019
Yahoo! India Cloud storage 16-07-2009 to 25-10-2012

 Seminar, Conference, Workshop Attended

  1. Redhat Courses Rh033,Rh133,Rh233, Thiagarajar College Of Engineering, 2008
  2. Free/Open Source Software Tools, Thiagarajar College Of Engineering, 2007
  3. Globalization Summit, Zinnov,Bangalore, 2011
  4. Internation Conference On Neural Networks, Madras Institute of Technoliogy,Chennai, 1997
  5. Quality Improvement Programme On Instructional Design And Delivery, Thiagarajar College Of Engineering, 2004
  6. Campus Connect Program, Infosys,Chennai, 2009
  7. 5th Indo-Australian Conference on IT Security, Jawaharlal Nehru University, New Delhi, 2009
  8. Developing Leadership Skills, Indo-US Collaboration for Engineering Education(IUCEE),Infosys Campus, Mysore, 2008

 Seminar, Conference, Workshop Organised

  1. 17th Workshop on Smart and Secure Environment, Thiagarajar College of Engineering, 2011
  2. Faculty Development Program on FOSS, Thiagarajar College of Engineering, 2009
  3. National Conference on FOSS, Thiagarajar College of Engineering, 2009
  4. Seminar on FOSS tools in Information Security, Thiagarajar College of Engineering, 2008

 M.E./Ph.D. Scholars

NAME OF SCHOLAR COURSE AREA OF RESEARCH STATUS
K.Venkatalakshmi Ph.D Multisensor Data Fusion Completed
K.Sundarakantham Ph.D Natural language processing Completed
S.Padmavathi Ph.D Scheduling algorithms for Parallel computers Completed
T.Subbulakshmi Ph.D DDoS mitigation models Completed
D.Tamilselvi Ph.D Agent based systems Completed
G.Sujitha Ph.D Cloud storage security Completed
P.S.Aravind M.E/M.S Factoring algorithms Completed
V.K.Soundar Rajam M.E/M.S IP traceback mechanism Completed
V.Akilandeswari Ph.D Self-healing networks Completed
B.S.Kiruthika Devi M.E/M.S Analysis of Denial of service attacks Completed
G.Preetha Ph.D Quantitative modeling for DDoS attack mitigation Completed
B. Thanga Parvathi Ph.D Classifier models Completed
M.Vijayalakshmi Ph.D IP Traceback scheme for DDoS attack Completed
G. Akilarasu Ph.D Secure routing in WMN Completed
S. Karthick Ph.D Parallel text mining Completed
M. Suguna Ph.D Security in Mobile Cloud Computing Completed
K. Narasimha Mallikarjunan Ph.D Behavior models for attackers Completed
G. Madhupriya Ph.D Live migration of virtual resources Completed
P. Mohana Priya Ph.D Secure Cognitive Protocol for SDN Completed
J. Kirupakar M.E/M.S Situation Aware Machine Learning system Completed
R.Nagarathna Ph.D SDN Security Completed
P. Vimala Rani Ph.D Security in Information Centric Networks Completed

 Lectures Delivered

TOPIC DELIVERED AT PERIOD
Towards Security in Hadoop Keynote Address, International Conference on Advances in Computing ICAC 2011, P.S.G.College of Technology, Coimbatore
Parallel Algorithms And Neural Networks UGC Refresher Course, Madurai Kamaraj University
Cloud Storage Security Hadoop Summit,Indian Institute of Science, Bangalore
Machine Learning and its applications Seminar on Recent Trends in Advanced Computing, Manonmaniam Sundaranar University, Tirunelveli
DDoS Experimental Testbed Queensland University of Technology, Brisbane, Australia
Security,Threats and Vulnerabilities National Seminar on Recent Trends & Research in Cyber & Data Security,NEC

 Membership

NAME OF SOCIETY DETAILS PERIOD
Insitution of Engineering(India) Life Member -
Computer Society of India Life Member -
IEEE Senior Member -
Indian Society of Technical Education Life Member -

  Other Achievements

  1. Reviewer, IEEE Transactions on Cloud computing, Thomson Reuters
  2. Reviewer, Journal of Information Technology and Decision making, World Scientific