Dr.S.Mercy Shalinie

shalinie@tce.edu

Educational Qualification

DEGREE BRANCH INSTITUTE YEAR
B.E. EIE Annamalai University 1989
M.E. Applied Electronics Coimbatore Institute of Technology 1991
Ph.D. Design of Neuro-Fuzzy systems Madurai Kamaraj University 1999
Post Doctoral Fellowship Machine Learning models for threat analyses University of California, Irvine, USA 2008

Experience

PERIOD NO OF YEARS DESIGNATION INSTITUTION
2015 to Till date 5.1 Professor Thiagarajar College of Engineering
2007 to 2015 8 Associate Professor Thiagarajar College of Engineering
2005 to 2007 2 Assistant Professor Thiagarajar College of Engineering
1996 to 2005 9 Lecturer Thiagarajar College of Engineering
1990 to 1996 6 Lecturer R.V.S. College of Engg.

Journals

  1. M. Suguna, S. Mercy Shalinie, "Privacy preserving auditing protocol for remote data storage", Cluster Computing, 22(3), pp.6891-6898 (2019)
  2. Vijayalakshmi, M and Mercy Shalinie, S, ‘UDP based IP Traceback for Flooding DDoS Attack’, The International Arab Journal of Information Technology, Vol. 15, No. 1, pp. 103 - 111, 2018. Impact factor : 0.724
  3. Prabavathy, S, Sundarakantham, K & Mercy Shalinie, S 2018, ‘Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things’, Journal of Communications and Networks. Vol 20, No 3, June 2018, pp 291- 298. DOI: 10.1109/JCN.2018.000041. Impact Factor – 1.130
  4. K.NarasimhaMallikarjunan, S.Mercy Shalinie, G.Preetha,"Real Time Attacker Behavior Pattern Discovery and Profiling using Fuzzy Rules”, Special issue on Behavior Data Analytics for Cyber security, Journal of Internet Technology, 2018(Accepted)
  5. A.Avelin Diana, K.Sundarakantham, S.Mercy Shalinie, Alleviation of Binding Update Re-registration handoff latency at Home Agent Failure in MIPv6 Network, International Journal of Computer Communications and Control vol.10, no.4, pp. 463-467, 2015 (Annexure-1)DOI:10.1109/WIRLES.2005.1549599, 1295-1300. Impact Factor 0.694
  6. P. Mohana Priya, V. Akilandeswari, S. Mercy Shalinie, Detecting DRDoS attack by Log File based IP pairing mechanism, WSEAS Transaction on Computers, Vol 13, pp. 538 - 548, November 2014
  7. Vijayalakshmi, M and Mercy Shalinie, S 2014, ‘Single Packet ICMP Traceback Technique using Router Interface’, Journal of Information Science and Engineering, vol. 30, no. 6, pp. 1673-1694. Impact Factor: 0.61
  8. P. Mohana Priya, V. Akilandeswari, G. Akilarasu, S. Mercy Shalinie, An Integrated approach of E-RED and ANT classification methods for DRDoS attacks, Journal of Communications in Computer and Information Science, pp. 369 - 377, 2014
  9. Parvathy, K.Sundarakantham, S.Mercy Shalinie, TRPC: An ensembled Online prediction mechanism for trusted Recommender systems, WSEAS Transactions on computers,13, 2014, Art 19, pp 231-241 Source Normalized Impact Factor: 0.39
  10. Avelin Diana, K. Sundarakantham, S. Mercy Shalinie and L. Rajendran, “Analytical Model for Binding Refresh Request to reduce Storage and Communication Overhead in MIPv6 Network”, International Journal of Network Management,vol. 24, no.5, pp. 402-414, 2014.DOI: 10.1002/nem.1871 Source Normalized Impact Factor: 0.681
  11. M.Parvathy,K.Sundarakantham,S.Mercy Shalinie,Cosine Similarity based clustering and dynamic reputation trust aware key generation scheme for trusted communication on social Networking, Journal of Statistical Computation and Simulation 85(16):1-12 · May 2014 DOI: 10.1080/00949655.2014.964240 Source Normalized Impact Factor 0.749
  12. Avelin Diana, K.Sundarakantham, S.Mercy Shalinie, DHSLB:Dynamic HA Selection WITH Load Balancing mechanism in MIPv6 network, Australian Journal of Basic and Applied Sciences, 8 (6), 1-6: 2014, Source Normalized Impact Factor: 0.23
  13. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, SHAD: Swift Home Agent Discovery Mechanism to mitigate home registration latency in MIPv6 network, Information : An International Interdisciplinary Journal, Vol.17, No. 4, pp.1375 - 1381, April 2014.
  14. M. Parvathy, R. Ramya, K. Sundarakantham, S. Mercy Shalinie, Tnet: A Trust network for predicting trust in Online Social networks, Information : An International Interdisciplinary Journal, Vol.17, No. 4, pp.1383 - 1393, April 2014
  15. A. Avelin Diana, K. Sundarakantham, S. Mercy Shalinie, V. Raga Vinodhini, DHSLB: Dynamic HA Selection with load balancing mechanism in MIPv6 network, Australian Journal of Basic and Applied sciences, Vol. 8, No.4, pp.1 -7, 2014.
  16. V. Akilandeswari, S. Mercy Shalinie, A Self-organizing Defense technique for SSH Dictionary attacks, Information : An International Interdisciplinary Journal, Vol. 17, No. 2, pp. 821 - 834, February 2014.
  17. V. Akilandeswari, S. Mercy Shalinie, Design of an adaptive distributed critical care extensive response network (AD-CERN) using cooperative overlay network, 2014
  18. G. Sujitha, T. Rajeswaran, R. thiagarajan, K. Vidya, S. Mercy Shalinie, Preserving Privacy of cloud data using Homomorphic encryption in Map Reduce, International Journal of Hybrid Information Technology, Vol.7, No.3, pp.363 - 376, 2014.
  19. G. Sujitha, M. Varadharajan, Y. Vignesh Rao, M. K. Sarvesh Gautham, Sowmi Narayanan, R. Swarnaraja, S. Mercy Shalinie, Improving Security of Parallel Algorithm using Key Encryption Technique, Information Technology Journal , Vol 12, Issue 12, pp. 2398 - 2404, 2013.
  20. S.MercyShalinie, S.Padmavathi, D.Kavinnithya, D.Kavinnithya, An Integrated Approach to Performance Effective Task Scheduling using Aggregated Backfilling Technique , International Journal of Software Engineering Research & Practices , Volume 1, No.1, pp:25-28, January 2011
  21. T.Subbulakshmi, S.MercyShalinie, Ensemble Design of Masquerader Detection Systems for Information Security , ICTACT Journal on Soft Computing, pp.131-137,2011
  22. S.MercyShalinie, V. Akilandeswari, Fractal Dimension Based Time Delayed Neural Network for Non Linear Time Series Prediction, Journal of Computer Engineering IE(I),
  23. S.MercyShalinie, Neural Network Based Decision Making In Uncertain Environment , Journal of Cognitive science, 1998
  24. S.MercyShalinie, Design Of Variable Structure Controller Systems, Journal of Computer Engineering IE(I), pp.84-87,1995
  25. S.MercyShalinie, S.Padmavathi, Scalable, Low Complexity Task Scheduling Algorithm for Cluster of Workstations, Journal of Engineering Science and Technology, Volume 5, No.3, pp:354-363, Septermber 2010
  26. S.MercyShalinie, S.Padmavathi, Tabu Search Based Memetic Algorithm for Task Scheduling, Journal of Computational Information Systems, Volume 6,No.4, pp:1017-1025, August 2010
  27. S.MercyShalinie, S.Padmavathi, A Memetic Algorithm Based Task Scheduling considering Communication Cost on Cluster Workstations, International Journal of Advances in Soft Computing & Applications, Volume 2, No.2, pp:174-190, July 2010
  28. S.MercyShalinie, G.Preetha, B.S.Kiruthika, S.Dina Nidhya, S.Dina Nidhya, S.Dina Nidhya, Fuzzy Adaptive Tuning Of Router Buffers for congestion control, International journal of Advancements in Technology, vol 1, No 1, June 2010
  29. T.Subbulakshmi, S.MercyShalinie, Detection and Classification of DDoS Attacks Using Fuzzy Interfernce System, European Journal of Scientific Research , vol no.47, NO.3 ,pp 334-346,2010
  30. T.Subbulakshmi, S.MercyShalinie, Detection and Classification of DDoS Attacks Using Machine Learning Algorithms, European Journal of Scientific Research , Vol.47, No. 3, pp. 334-346, 2010
  31. S.MercyShalinie,K.SundarakanthamSSGL: A Semi-supervised Grammar LearnerJournal of Computer Application in Technology, Inderscience PublishersVolume 38 - Issue 4, 2010. DOI: http://dx.doi.org/10.1504/IJCAT.2010.034526 Source Normalized Impact Factor:0.220
  32. T.Subbulakshmi, S.MercyShalinie, Real Time Classification and Clustering IDS Alerts Using Machine Learning Algorithms, Intenational Journal of Artificial Intelligence and Applications(IJAIA), Vol.1, No.1,Jan 2010
  33. S.MercyShalinie, S.Padmavathi, DAG Scheduling on Cluster of Workstations using Hybrid Particle Swarm Optimization, International Journal of Simulation-Systems, Science and Technology, Volume 10, No.6, pp:50-55,July 2009
  34. S.MercyShalinie, Modeling parallel feed-forward based compression network , International Journal of Parallel, Emergent and Distributed Systems, Vol.21, No.4, pp. 227-237
  35. S.MercyShalinie, Modeling Connectionist Neuro-Fuzzy network and Applications, International Journal on Neural computation and applications, Springer Verlag, Vol.14, No 1, pp.88-93
  36. Vijayalakshmi, M, Mercy Shalinie, S, and Nithya, N 2014, ‘A Brief Survey of IP Traceback Methodologies’, Acta Polytechnica Hungarica, vol. 11, no. 9, pp. 197-216. Impact Factor: 0.745
  37. Vijayalakshmi, M, Mercy Shalinie, S, Ajay, K and Arvind, M, 'Setting up an Efficient IoT Experimental Test Bed',IoTEvolutionWorld, 2016
  38. S. Karthick, S. Mercy Shalinie, Chidambaram Kollengode, Design and Evaluation of a Parallel Algorithm for Inferring Topic Hierarchies, Information Processing and Management 51 (2015), pp. 662-676, Elsevier, DOI: 10.1016/j.ipm.2015.06.006 [Impact Factor: 2.391]
  39. S. Karthick, S. Mercy Shalinie, Parallelization of a graph-cut based algorithm for hierarchical clustering of web documents, International Journal of Concurrency and Computation: Practice and Experience, Wiley, Apr, 2015, DOI: 10.1002/cpe.3545 (In Press) [Source Normalized Impact Factor: 1.133]
  40. Akilandeswari, V, MercyShalinie, S, Vijayalakshmi, M, Sheik Mohamad Mubeen, S, Proactive Behaviour Analysis of Network Traffic Using SNMP-MIB Agents,International Journal of Network Security and its Applications
  41. S.MercyShalinie, S.Surenthar,V. Akilandeswari, Unusual Attack Behavior Analysis for High Rate Flooding Attack Detection Using Markov Model, International Journal of Network Security and its Applications, April 2012
  42. K.NarasimhaMallikarjunan, S.Mercy Shalinie, A.Bhuvaneeshwaran,BAIT: Behavior Aided Intruder Testimony Technique for Attacker Intention Prediction in Business Data Handling”, Special Issue on Applied Soft Computing Strategies for Effective Business Data Analytics, DOI: 10.1504/IJBIDM.2018.10012004 International Journal of Business Intelligence and Data Mining, 2018
  43. S.MercyShalinie,S.PadmavathiEnhanced Memetic Algorithm for Task SchedulingJournal, Springer-Verlag, Lecture Notes in Computer ScienceVolume 6466, pp:448, 2010.Impact Factor-0.51
  44. Deep Learning framework for early detection of intrusion in Virtualized Environment, International Journal of Business Intelligence and Data Mining, 2018, DOI: 10.1504/IJBIDM.2018.10012559

Conferences

  1. Felicia, K.Sundarakantham, S.Mercy Shalinie : An efficient information retrieval mechanism from relevant Document, AICV 2018, 26th to 28th September 2018 at CEG,Anna University
  2. M Suguna, R Anusia, S Mercy Shalinie, S Deepti, "Secure identity management in mobile cloud computing", IEEE International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2), PP. 42-45, 2017
  3. S.Prabavathy,K.Sundarakantham,S.Mercy Shalinie "Decentralised Secure Framework for Social Collaborative Internet of Things" in 4th International Conference on Signal Processing, Communications and Networking (ICSCN'17) MIT,Anna University, 16th-18th Mar 2017
  4. S. Karthick, S. Mercy Shalinie, Parallel Hierarchical Subspace Clustering for Segmenting Large Text Corpuses, IEEE International Conference on Electronics and Informatics, Mar 2017. (Accepted)
  5. M Suguna, S Mercy Shalinie, "Privacy preserving data auditing protocol for secure storage in mobile cloud computing", IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2725-2729, 2017
  6. S.Prabavathy, K.Sundarakantham, S.Mercy Shalinie, "EPIDS:Eneregy Efficient Privacy Preserving Intrusion Detection System for Internet of Things" International Conference on IoT,Data Science and Security(ICIDS-2017) PSG College of Technology, Coimbatore, 6th and 7th January 2017
  7. K.NarasimhaMallikarjunan,K.Muthu Priya,S.Mercy Shalinie,'A survey of Distributed Denial of Service attack',10th International Conference on Intelligent Systems and Control (ISCO 2016)
  8. M. Suguna, J. Adlene Anusha, S.Mercy Shalinie, "Secure Data Sharing with Efficient User Revocation using Proxy Re-signature for Mobile Users Group in Cloud", National Conference on Data Intensive Computing (NCDIC), 2016
  9. K.NarasimhaMallikarjunan,S.Mercy Shalinie,"Evaluation of Security Metrics for Security Analysis" in National Conference on Enhancing Information Technology Education (EITE-2016) diring Jan 4 to Jan 8th 2016 at NIT Goa.
  10. K.NarasimhaMallikarjunan,K.Sundarakantham,S.Mercy Shalinie,"Model for Cyber Attacker Behavior Analysis " in IEEE workshop on computational Intellegence in IIT Kanpur held during dec 14 to dec 17 2015 pg no 1-4
  11. M.Parvathy, R.Ramya, K.Sundarakantham,S.Mercy Shalinie, Recommendation System with Collaborative Social Tagging Exploration, International Conference on Recent Trends in Information Technology,2014
  12. S. Karthick, S. Mercy Shalinie, Parallel Algorithms for Merging Topic Trees, Proceedings of the International ACM KDD Conference CODS-2015, Bangalore, India
  13. M. Suguna, J. Adlene Anusha, S. Mercy Shalinie, "Towards Efficient and Secure Data Storage (ESDS) Framework for Cloud Computing", International Journal of Applied Engineering Research, Vol. 10, No. 2, pp. 1534-1538, 2015
  14. S. Karthick, S. Mercy Shalinie, Chidambaram Kollengode, A Sparsification Technique For Fast Hierarchical Community Detection in Social Networks, Proc. of the International IEEE Conference on Eco-Friendly Computing and Communication Systems, NIT-K, Mangalore, Dec 2014.
  15. Sixth International Conference on Advanced Computing (ICoAC 2014) in association with IEEE, "A Survey on foundation for future generation internet through network virtualization" at MIT, Chennai
  16. Mobile Application Testing on smart devices using MTAAS framework in cloudA.Malini,N. Venkatesh, K.Sundarakantham, S.Mercy Shalinie International conference on Computing and Communication Technologies ICCCT 2014,Osmania University, Hyderbad
  17. V.K.Soundar Rajam, G. Selvaram, M. Pradeep Kumar, S. Mercy Shalinie, ACOPID : An Improved Traceback Mechanism based on ACO Algorithm for DDoS Attack, International Conference On Communication Network, Elsevier Sciencetech, pp. 194 - 202, July 2014.
  18. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, K. NarasimhaMallikarjun, Binding registration based on Home agent priority queue scheduling in MIPv6 network, Fourth International Conference on Recent Trends in Information Technology, pp. 1- 7, April 2014.
  19. B.S. Kiruthiga Devi, G. Preetha, S. Mercy Shalinie, An impact analysis: Realtime DDoS Attack Detection and Mitigation Using Machine Learning, IEEE International Conference on Recent Trends in Information Technology, pp. 1- 7, April 2014.
  20. P. Mohana Priya, V. Akilandeswari, S. Mercy Shalinie, V. Lavanya, M. Shanmuga Priya, The Protocol Independent Detection and Classifcation (PIDC) System for DRDoS attack, IEEE International Conference on Recent Trends in Information Technology, MIT, pp. 1 - 7, April 2014.
  21. G.Madhu Priya, S.Ezhilarasi, S.Mercy Shalinie, "Efficient memory utilization using dynamic resource provisioning", TEQIP II sponsored National Conference on Intelligent systems, computing and information technology 2014 at Anna university Bharathidasan institute of technology, Tiruchirappalli, April 4-5 2014, Volume I, page 61-68.
  22. S. Karthick, S. Mercy Shalinie, Effect of Multi-word Features on the Hierarchical Clustering of Web Documents, IEEE International conference on Recent Trends in IT at Anna University-Chennai, April 2014
  23. K.NarasimhaMallikarjunan,A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie,"Binding Registration Based On Home Agent Priority Queue Scheduling in MIPv6 Network",International Conference on Recent Trends in Information Technology -2014
  24. A. Avelin Diana, V. Raga Vinodhini, K. Sundarakantham, S. Mercy Shalinie, CRHA : An Efficient HA revitalization to sustain binding information of Home agent in MIPv6 network , International Conference on Computational Intelligence, Cyber security and Computational Models (ICC3), Springer - Advances in Intelligent Systems and Computing, Vol 246, pp. 227 - 235, 2014.
  25. K.Sundarakantham, S.Mercy Shalinie, A.Avelin Diana, V.Ragavinodhini,CHRA: An Efficient HA Revitalization to sustain Binding Information of Home Agent in MIPv6 Network,Computational Intelligence,Cyber Security and Computational models, Advances in Intelligent Systems and Computing 246, DOI: 10.1007/978-81-322-1680-3_25, Springer India ,2014
  26. K.Sundarakantham, S.Mercy Shalinie, M.Parvathy, R.Ramya, Trust Dependence Network for Recommender Systems, Fifth International Conference on Advanced Computing, ICoAC, Dec 2013
  27. Code Refactoring Using Aspect Oriented Programming,A.Malini, K.Vanitha, K.Sundarakantham, S.Mercy Shalinie, ACM National Conference on Intelligent Computing,PSG college of Technology, Coimbatore,National,26.4.13-27.4.13
  28. G. Prem Paul, V. Akilandeswari, S. Mercy Shalinie, Evolution of Vulnerability in Large Scale Networks, International Conference in Engineering and Technology, (ICET2K13), pp. 77-80, April 2013
  29. K.Sundarakantham, S.Mercy Shalinie, M.Parvathy, M.P.Manoj kumar,D.L.Don Rudin,V.Anandarajan, Detection of Malicious communities in Online Social Networks, PSG-ACM National Conference on Intelligent Computing NCIC 2013, Page No 386-390, 26-27 April 2013
  30. V. Akilandeswari, S. Mercy Shalinie, Probabilistic Neural Network based Attack Traffic Classification, Fourth International Conference on Advanced Computing (ICOAC), MIT, Chennai, pp. 1-8, 2012.
  31. V. Akilandeswari, D. Namachivayam, S. Prasanna, S. Mercy Shalinie, Design of an Early Response System using EGT-based overlay network, International Conference on Recent Trends in Information Technology (ICRTIT), MIT, pp. 445 - 451, April 2012
  32. V.K.Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie, Tulika Pandey, Application IP Traceback Mechanism to Online Voting, International Conference on Advanced Computing, Networking and Security (ADCONS 2011), Springer-Verlag Berlin Heidelberg LNCS 7135, pp. 620-629, 2012
  33. V.K.SoundarRajam, S.MercyShalinie, B.Sundaresa Pandian, Tulika pandey, B.Sundaresa Pandian, Tulika pandey, Application Of IP Traceback Mechanism to Online Voting, International Conference on Advanced Computing, Networking and Security (ADCONS 2011), Springer- Verlag Berlin Heidelberg, LNCS 7135, pp. 620-629, 2011
  34. S.Prasanna, S.MercyShalinie, V. Akilandeswari, D. Namatchivayam, V. Akilandeswari, D. Namatchivayam, Design of an Early Response System Using EGT-based Overlay Network, Recent Trends in Information Technology(ICRTIT),
  35. V.K.SoundarRajam, S.MercyShalinie, A Novel Traceback Algorithm for DDoS Attack with Marking Scheme for Online System, International Conference on Recent Trends in Information Technology, pp.407-412,2012
  36. B.S.Kiruthika, G.Preetha, S.MercyShalinie, DDoS Detection Using Host-Network Based Metrics and Mitigation in Experimental Testbed, Recent Trends in Information Technology(ICRTIT), pp. 423-427,2012
  37. S.MercyShalinie, T.Subbulakshmi, Application of Naive Bayes Classifiers for Detecting Masqueraders using Enriched and Truncated Command lines, International Conference on Information Security(ICIS 05), 2005
  38. T.Subbulakshmi, S.MercyShalinie, Real Time Detection and Classification of DDoS Attacks using Enhanced SVM with String Kernals, International Conference on Recent Trends in Information Technology, 91
  39. B.S.Kiruthika, G.Preetha, S.MercyShalinie, A Novel Fuzzy congestion control Algorithm for Router Buffers, Recent Trends in Information Technology(ICRTIT), pp.423-427,2011
  40. T.Subbulakshmi, S.MercyShalinie, Attack Source Identification at Router Level in Real Time Using Marking Algorithm Deployed in Programmable Routers, International Conference on Recent Trends in Information Technology, 1
  41. S.MercyShalinie, B. Thanga Parvathy, A High Speed Decision Tree Classifier Algorithm for Huge Dataset , Recent Trends in Information Technology(ICRTIT), pp. 695-700, 2011
  42. K.Sundarakantham, S.MercyShalinie, Natural Language Grammatical Inference Using Support Vector Machines,, International Conference on Intelligent Sensing And Information Processing,, Jan 4-7 , 2005
  43. S.MercyShalinie, T.Subbulakshmi, Intelligent Masquerader Detection using Linux Command Sequences, National Conference on Advances in Computer Engineering and Networking(NCACEN 08), 2008
  44. K.Sundarakantham, S.MercyShalinie, Unsupervised learning of context free grammars with a hybrid statistical and probablistic algorithm, International Conference on Knowledge Networking Networking in ICT Era, 365, 2010
  45. S.MercyShalinie, K.Sundarakantham, A Author Topic Model Based Unsuperfised Algoritm For Learning Topics from Large Text Collections, Recent Trends in Information Technology(ICRTIT), p.360-363,2011
  46. S.MercyShalinie, T.Subbulakshmi, Analysis of Immune Intrusion Detection Systems using Sequence of System calls, National Conference on Recent Trends in Advanced Computing(NCRTAC 05), 2005
  47. T.Subbulakshmi, S.MercyShalinie, MLAs for Intrusion Detection, PC Quest Magazine , Jan 2007
  48. T.Subbulakshmi, S.MercyShalinie, Misuse Detection Systems using Support Vector Machines, International Conference on Information Technology and Business Intelligence(ITBI 09), 2009
  49. S.MercyShalinie, K.Sundarakantham, Hand Written Numeral Recognition Using Neocognitron,, National Conference on Artificial Neural Networks And Fuzzy Systems,, 2002
  50. S.Padmavathi, S.MercyShalinie, Enhanced Memetic Algorithm for Task Scheduling, International Conference on Swarm, Evolutionary and Memetic Computing, Dec-2010
  51. T.Subbulakshmi, S.MercyShalinie, Feature Selection and Classification of Intrutions Using Genetic Algorithms and Neural Networks , Communication in Computer and Information Science, Vol No.90
  52. S.MercyShalinie, S.Padmavathi, Hybrid Approach for Task scheduling with Selective Duplication under Memory and Time constraints, International Conference on Emerging Trends in Engineering Technologies ICETES 2010, 2010
  53. S.MercyShalinie, S.Padmavathi, Introduction of Contention Awareness in Task Scheduling, National Conference on Advanced Computing & Application NCACA-09, 2009
  54. S.MercyShalinie,S.Padmavathi Contention Awareness in Task Scheduling Using Tabu Search,IEEE International Advance Computing Conference IACC 09,2009 (Available in IEEE Xplore Library)
  55. S.MercyShalinie, S.Padmavathi, Performance Effective Task Scheduling For Homogeneous Computing Environment, National Conference on Ubiquitous & Pervasive Computing NCUPC 2008, 2008
  56. S.MercyShalinie, S.Padmavathi, DAG Scheduling On Cluster of Workstations using Hybrid Particle Swarm Optimization, International Conference on Emerging Trends in Engineering&Technology ICETET 2008, 2008
  57. S.MercyShalinie, S.Padmavathi, Analyzing The Time Complexity Of Parallel Algorithms For Knapsack Problem, International Conference On Signal Processing,Communications And Networking, Feb-22 to 24 , 2007
  58. M. Suguna, S. Mercy Shalinie, J. Adlene Anusha, "Towards cloud storage security enhancement using secure access control and sure deletion (SASD)", IEEE Sixth International conference on advanced computing, ICoAC 2014
  59. S.MercyShalinie,K.NarasimaMallikarjunan,K.Sundarakantham CoDe — An collaborative detection algorithm for DDoS attacks,Recent Trends in Information Technology (ICRTIT), 2011 ,Page(s): 113- 118
  60. J. Felicia Lilian, K.Sundarakantham, Harinie Rajashree, S. Mercy Shalinie, SSE: Semantic Sentence Embedding for learning user interactions, ICCCNT,2019 at IIT Kanpur
  61. G.MadhuPriya, D.S.Abinaya, S.MercyShalinie, "Framework for detecting malware in virtualized environment", International Conference on Modeling, Optimizing and Computing (ICMOC2012) held at Noorul Islam Centre for Higher Education, Kanyakumari District ,April 10, 11 2012, Vol II, pages 767-775
  62. M.Suguna,S.MercyShalinie, R.Parkavi, A Weblet Scheduler Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing ,International Conference on Modeling, Optimizing and Computing ,ICMOC, 2012
  63. M.Vijayalakshmi,S.MercyShalinie, A.Arun Pragash,IP Traceback System for Network and Application Layer Attack,Recent Trends in Information Technology(ICRTIT),pp.439-444, 2012
  64. S.Prasanna,M.Vijayalakshmi,S.MercyShalinie, Anomaly Detection System based on Analysis of Packet Header and Payload Histograms,Recent Trends in Information Technology(ICRTIT),pp.412-416,2011
  65. K.Sundarakantham,S.MercyShalinie An Intelligent Tamil Chat Robot,,National Conference On Recent Advances In Computing,,Dec 21-22 , 2007.
  66. S.MercyShalinie,S.Padmavathi, D.Kavinithya, Integrated Approach to Performance Effective Task Scheduling ,International Conference on Advanced Computing and Communication Technologies -ACCT’11,2011

Books

  1. Suguna M, Mercy Shalinie S, Sivaranjani R, "Integrity Verification for Shared Data in Group with User Revocation" In: Zungeru A., Subashini S., Vetrivelan P. (eds) Wireless Communication Networks and Internet of Things, Lecture Notes in Electrical Engineering, vol 493, Springer, Singapore, 2019

Sponsored Research

TITLE SPONSORING AGENCY AMOUNT RESPONSIBILITY
Multisensor Data Fusion DRDO,Hyderabad Rs. 5 lakhs Principal Investigator
Content Generation,Distribution and Mobile Learning DIT,New Delhi Rs. 99 Lakhs Principal Investigator
Smart and Secure Environment National Technical Research Organization Rs. 1 Crore Co-Investigator
High Performance Computing - FIST DST, New Delhi Rs.35.50 Lakhs Principal Investigator

Seminar, Conference, Workshop Attended

  1. Globalization Summit, Zinnov,Bangalore, 2011
  2. Quality Improvement Programme On Instructional Design And Delivery, Thiagarajar College Of Engineering, 2004
  3. Internation Conference On Neural Networks, Madras Institute of Technoliogy,Chennai, 1997
  4. Free/Open Source Software Tools, Thiagarajar College Of Engineering, 2007
  5. Redhat Courses Rh033,Rh133,Rh233, Thiagarajar College Of Engineering, 2008
  6. 5th Indo-Australian Conference on IT Security, Jawaharlal Nehru University, New Delhi, 2009
  7. Campus Connect Program, Infosys,Chennai, 2009
  8. Developing Leadership Skills, Indo-US Collaboration for Engineering Education(IUCEE),Infosys Campus, Mysore, 2008

Seminar, Conference, Workshop Organised

  1. 17th Workshop on Smart and Secure Environment, Thiagarajar College of Engineering, 2011
  2. Faculty Development Program on FOSS, Thiagarajar College of Engineering, 2009
  3. National Conference on FOSS, Thiagarajar College of Engineering, 2009
  4. Seminar on FOSS tools in Information Security, Thiagarajar College of Engineering, 2008

Ph.D Guidance/Supervisorship

NAME OF SCHOLAR COURSE AREA OF RESEARCH STATUS
K.Venkatalakshmi Ph.D Multisensor Data Fusion Completed
K.Sundarakantham Ph.D Natural language processing Completed
S.Padmavathi Ph.D Scheduling algorithms for Parallel computers Completed
T.Subbulakshmi Ph.D DDoS mitigation models Completed
D.Tamilselvi Ph.D Agent based systems Completed
G.Sujitha Ph.D Cloud storage security Completed
P.S.Aravind M.E/M.S Factoring algorithms Completed
V.K.Soundar Rajam M.E/M.S IP traceback mechanism Completed
V.Akilandeswari Ph.D Self-healing networks Completed
B.S.Kiruthika Devi M.E/M.S Analysis of Denial of service attacks Completed
G.Preetha Ph.D Quantitative modeling for DDoS attack mitigation Completed
B. Thanga Parvathi Ph.D Classifier models Completed
M.Vijayalakshmi Ph.D IP Traceback scheme for DDoS attack Completed
G. Akilarasu Ph.D Secure routing in WMN Completed
S. Karthick Ph.D Parallel text mining Completed
M. Suguna Ph.D Security in Mobile Cloud Computing Completed
K. Narasimha Mallikarjunan Ph.D Behavior models for attackers Completed
G. Madhupriya Ph.D Live migration of virtual resources Completed
P. Mohana Priya Ph.D Secure Cognitive Protocol for SDN Completed
J. Kirupakar M.E/M.S Situation Aware Machine Learning system Completed

Lectures Delivered

TOPIC DELIVERED AT PERIOD
Towards Security in Hadoop Keynote Address, International Conference on Advances in Computing ICAC 2011, P.S.G.College of Technology, Coimbatore
Cloud Storage Security Hadoop Summit,Indian Institute of Science, Bangalore
Parallel Algorithms And Neural Networks UGC Refresher Course, Madurai Kamaraj University
Machine Learning and its applications Seminar on Recent Trends in Advanced Computing, Manonmaniam Sundaranar University, Tirunelveli
DDoS Experimental Testbed Queensland University of Technology, Brisbane, Australia
Security,Threats and Vulnerabilities National Seminar on Recent Trends & Research in Cyber & Data Security,NEC

Membership

NAME OF SOCIETY DETAILS PERIOD
Insitution of Engineering(India) Life Member -
Indian Society of Technical Education Life Member -
IEEE Senior Member -
Computer Society of India Life Member -

Other Achievements

  1. Reviewer, IEEE Transactions on Cloud computing, Thomson Reuters
  2. Reviewer, Journal of Information Technology and Decision making, World Scientific