default search action
Subramanian Selvakumar
Person information
- affiliation: National Institute of Technology, Tiruchirappalli, India
- affiliation: Indian Institute of Information Technology, Una, India
Other persons with the same name
- S. Selvakumar 0002 (aka: S. Selva Kumar 0002) — Thiagarajar College of Engineering, Madurai, India (and 1 more)
- S. Selva Kumar 0003 (aka: S. Selvakumar 0003) — Periyar University, College of Arts and Science, India
- S. Selvakumar 0004 — Indian Institute of Technology, Madras, India (and 1 more)
- S. Selvakumar 0005 (aka: S. Selva Kumar 0005) — MS University, Tirunelveli, India
- S. Selvakumar 0006 — Indian Institute of Technology Delhi Hauz Khas, Centre for Atmospheric Sciences, New Delhi, India
- S. Selvakumar 0007 — Dhanalakshmi Srinivasan College of Engineering, Coimbatore, India (and 1 more)
- S. Selvakumar 0008 — University of Madras, Institute for Advanced Study in Mathematics, Chennai, India
- S. Selvakumar 0009 — Alagappa University, Department of Education, Karaikudi, India
- S. Selvakumar 0010 — Kongu Engineering College, Erode, India
- S. Selvakumar 0011 — Aarupadai Veedu Institute of Technology, Paiyanoor, Chengalpattu, India
- S. Selvakumar 0012 — Visvesvaraya College of Engineering & Technology, Hyderabad, India
- S. Selva Kumar 0004 — Amrita School of Engineering, Department of Electrical and Electronics Engineering, Coimbatore, India
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Kanchana Rajaram, Bhuvaneswari Amma N. G., Ashwin S. Guptha, S. Selvakumar:
CLNet: a contactless fingerprint spoof detection using deep neural networks with a transfer learning approach. Multim. Tools Appl. 83(9): 27703-27722 (2024) - 2023
- [j37]S. Priya, S. Selvakumar, R. Leela Velusamy:
Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks. J. Ambient Intell. Humaniz. Comput. 14(3): 1951-1975 (2023) - [j36]Chandrasekaran Sugapriya, Murugesan Nithya, Kathirvel Jeganathan, Subramanian Selvakumar, Thanushkodi Harikrishnan:
A comparative analysis of (s, Q) and (s, S) ordering policies in a queueing-inventory system with stock-dependent arrival and queue-dependent service process. Oper. Res. Decis. 33(2) (2023) - 2022
- [j35]N. G. Bhuvaneswari Amma, S. Selvakumar:
Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks. Neural Comput. Appl. 34(4): 2869-2882 (2022) - [j34]E. Elakkiya, S. Selvakumar:
Stratified hyperparameters optimization of feed-forward neural network for social network spam detection (SON2S). Soft Comput. 26(21): 11915-11934 (2022) - [j33]S. Priya, S. Selvakumar, R. Leela Velusamy:
PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites. Wirel. Pers. Commun. 125(1): 755-784 (2022) - 2021
- [j32]N. G. Bhuvaneswari Amma, S. Selvakumar:
A statistical class center based triangle area vector method for detection of denial of service attacks. Clust. Comput. 24(1): 393-415 (2021) - [j31]S. Priya, S. Selvakumar:
Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services. Int. J. Ad Hoc Ubiquitous Comput. 36(2): 67-88 (2021) - [j30]E. Elakkiya, S. Selvakumar, R. Leela Velusamy:
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism. J. Ambient Intell. Humaniz. Comput. 12(10): 9287-9302 (2021) - 2020
- [j29]Narayanavadivoo Gopinathan Bhuvaneswari Amma, S. Selvakumar:
Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment. Future Gener. Comput. Syst. 113: 255-265 (2020) - [j28]E. Elakkiya, S. Selvakumar:
GAMEFEST: Genetic Algorithmic Multi Evaluation measure based FEature Selection Technique for social network spam detection. Multim. Tools Appl. 79(11-12): 7193-7225 (2020) - [j27]N. G. Bhuvaneswari Amma, S. Selvakumar, R. Leela Velusamy:
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 17(4): 2511-2522 (2020) - [c7]N. G. Bhuvaneswari Amma, S. Selvakumar, R. Leela Velusamy:
SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection. FICTA (2) 2020: 41-50 - [c6]Elakkiya E, S. Selvakumar, R. Leela Velusamy:
CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection. ICCCNT 2020: 1-7 - [c5]S. Priya, S. Selvakumar, R. Leela Velusamy:
Detection of Phishing Attacks using Radial Basis Function Network Trained for Categorical Attributes. ICCCNT 2020: 1-6
2010 – 2019
- 2019
- [j26]Bhuvaneswari Amma N. G., S. Selvakumar:
Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks. Neurocomputing 340: 294-308 (2019) - [c4]E. Elakkiya, S. Selvakumar:
Initial Weights Optimization using Enhanced Step Size Firefly Algorithm for Feed Forward Neural Network applied to Spam Detection. TENCON 2019: 942-946 - 2018
- [c3]Narayanavadivoo Gopinathan Bhuvaneswari Amma, Subramanian Selvakumar:
VCDeepFL: Vector Convolutional Deep Feature Learning Approach for Identification of Known and Unknown Denial of Service Attacks. TENCON 2018: 640-645 - 2016
- [j25]Sangeeta Bhattacharya, Subramanian Selvakumar:
Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks. Comput. J. 59(6): 923-943 (2016) - [j24]Alampallam Ramaswamy Vasudevan, Subramanian Selvakumar:
Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset. Frontiers Comput. Sci. 10(4): 755-766 (2016) - 2015
- [j23]Alampallam Ramaswamy Vasudevan, Subramanian Selvakumar:
Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset. Secur. Commun. Networks 8(18): 3441-3458 (2015) - [j22]Sangeeta Bhattacharya, Subramanian Selvakumar:
LAWRA: a layered wrapper feature selection approach for network attack detection. Secur. Commun. Networks 8(18): 3459-3468 (2015) - [j21]Vignesh P, S. Selvakumar:
Design of an Abstraction Layer for Communication with BOSH XMPP Server. ACM SIGSOFT Softw. Eng. Notes 40(2): 1-4 (2015) - [c2]S. Selvakumar, Kanchana Rajaram:
Achieving excellence in engineering education through improved teaching-learning process. TALE 2015: 246-252 - 2014
- [j20]Pritesh Pathak, S. Selvakumar:
Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation. Digit. Investig. 11(1): 67-77 (2014) - 2013
- [j19]P. Arun Raj Kumar, S. Selvakumar:
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Comput. Commun. 36(3): 303-319 (2013) - [j18]Amritha Raghunath, Sadhana Ramachandran, Subramanian Selvakumar, Sreevatsan Vaidyanathan:
Data rate based adaptive thread assignment solution for combating the SlowPOST denial of service attack. ACM SIGSOFT Softw. Eng. Notes 38(5): 1-5 (2013) - [j17]Sugavanesh B, Hari Prasath R, S. Selvakumar:
SHS-HTTPS enforcer: enforcing HTTPS and preventing MITM attacks. ACM SIGSOFT Softw. Eng. Notes 38(6): 1-4 (2013) - 2012
- [j16]Lakshmi Priya Sekar, Vinitha Reddy Gankidi, Subramanian Selvakumar:
Avoidance of security breach through selective permissions in android operating system. ACM SIGSOFT Softw. Eng. Notes 37(5): 1-9 (2012) - [j15]Siva Brahmasani, Subramanian Selvakumar, E. Sivasankar:
Prevention of XSS attacks using STCD: server side tagging and client side differentiation. ACM SIGSOFT Softw. Eng. Notes 37(6): 1-9 (2012) - 2011
- [j14]R. Leela, N. Thanulekshmi, S. Selvakumar:
Multi-constraint Qos Unicast Routing Using Genetic Algorithm (MURUGA). Appl. Soft Comput. 11(2): 1753-1761 (2011) - [j13]P. Arun Raj Kumar, S. Selvakumar:
Distributed denial of service attack detection using an ensemble of neural classifier. Comput. Commun. 34(11): 1328-1341 (2011) - [j12]C. Vembuselvi, S. Selvakumar:
LISISAP: link level signature based secure anonymous protocol for prevention of traffic analysis attacks. ACM SIGSOFT Softw. Eng. Notes 36(2): 1-10 (2011) - [j11]Subash Dangol, S. Selvakumar, M. Brindha:
Genuine ARP (GARP): a broadcast based stateful authentication protocol. ACM SIGSOFT Softw. Eng. Notes 36(4): 1-10 (2011) - [j10]Chandrabhanu Mahapatra, S. Selvakumar:
An online cross view difference and behavior based kernel rootkit detector. ACM SIGSOFT Softw. Eng. Notes 36(4): 1-9 (2011) - [j9]Sharath Chandra V., S. Selvakumar:
BIXSAN: browser independent XSS sanitizer for prevention of XSS attacks. ACM SIGSOFT Softw. Eng. Notes 36(5): 1-7 (2011) - 2010
- [j8]R. Leela, S. Selvakumar:
Genetic algorithm approach to dynamic multiconstraint multipath QoS routing algorithm for IP networks. Int. J. Commun. Networks Distributed Syst. 5(4): 392-411 (2010) - [j7]V. Radhakishan, Yaser Farook, S. Selvakumar:
CRAYSE: design and implementation of efficient text search algorithm in a web crawler. ACM SIGSOFT Softw. Eng. Notes 35(4): 1-8 (2010)
2000 – 2009
- 2006
- [j6]C. Mala, S. Selvakumar:
Construction of an optimal multicast tree for group communication in a cellular network using genetic algorithm. Comput. Commun. 29(16): 3306-3312 (2006) - 2004
- [j5]S. Selvakumar, Swarup Kumar Sahoo, Vijay Venkatasubramani:
Delay sensitive least frequently used algorithm for replacement in web caches. Comput. Commun. 27(3): 322-326 (2004) - 2001
- [j4]S. Selvakumar, V. Venkateshwaran:
Partition equalizer: a scheduler for algorithm-agile-encryptor ATM networks. Comput. Commun. 24(7-8): 631-640 (2001) - [j3]S. Selvakumar, P. Prabhakar:
Implementation and comparison of distributed caching schemes. Comput. Commun. 24(7-8): 677-684 (2001) - [j2]S. Selvakumar, Murali M. Brahmadesam:
Secure dynamic anycasting for 'best' server selection using active networks. Comput. Commun. 24(18): 1819-1827 (2001) - 2000
- [c1]S. Selvakumar, P. Prabhakar:
Implementation and comparison of distributed caching schemes. ICON 2000: 491-
1990 – 1999
- 1997
- [j1]S. Selvakumar, S. V. Raghavan:
Differential priority-based adaptive rate service discipline for QoS guarantee of video stream. Comput. Commun. 20(13): 1160-1174 (1997)
Coauthor Index
aka: Bhuvaneswari Amma N. G.
aka: N. G. Bhuvaneswari Amma
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-20 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint