Dr. Sherly K.K

Profile Summary:

  • 29 years of academic experience.
  • Ph.D in Computer Science & Engineering from Anna University, Chennai, in the year 2015, Research Area : Data Mining
  • M.Tech in Information Technology from Punjabi University, Patiala,in the year 2004
  • B.E in Electronics & Communication Engineering from Karnataka University, Dharwad, in the year 1990.
  • DCSM (Diploma in Computer Hardware and Networking) from CEDIT, Calicut
  • Approved research guide of APJ Abdul Kalam Technological University, Kerala
  • Member of the Board of Studies (Department of Computer Science), St. Alberts College, Ernakulam.
  • Research progress evaluation committee member (external expert) at Cochin University of Science and Technology.
  • Co-Author of one text book titled  “Object Oriented Programming”, Jyothis Publishers, ISBN -978-93-5351-261-3.
  • 29 Papers published (includes 9 research publication and co-authored 16 M.Tech and 3 B.Tech students publications) in International/national journals and conferences (includes Springer, IEEE etc.)
  • Editor of 9th International Conference on Advances in Computing and Communication-2018, Proceedings in IEEE Xplore.
  • Editor of 8th International Conference on Advances in Computing and Communication-2018, Proceedings in Procedia Computer Science.
  • Publication chair and session chair of 7th International Conference on Advances in Computing and Communication- 2017 and reviewer of several conference papers.
  • Paper valuation camp chairman of APJ Abdul Kalam Technological University, Kerala
  • Reviewer of many international conferences.
  • Guided several projects and handled theory subjects and lab sessions for both M.Tech and B.Tech.
  • Organized International and National Conferences, Faculty Development Programs, Workshops, Technical Talks and Training Programs
  • Research interests are Network security, Knowledge Discovery in Databases, Distributed Database Systems and Parallel Processing.

Publications

  1. Sherly, KK & Nedunchezhian R, 2017, ‘Efficient Adaptive Frequent Pattern Mining Techniques for Market Analysis in Sequential and Parallel Systems’, The International Arab Journal of Information Technology, vol.14, no.2, pages 175-185.
  2. Sherly, KK & Nedunchezhian R, 2015, ‘Improved Incremental and Interactive Frequent Pattern Mining Techniques for Market Basket Analysis and Fraud Detection in Distributed and Parallel System’,  Indian Journal of Science and Technology, vol.8, no.18, pp.1-12
  3. Sherly K.K, R Nedunchezhian, M. Rajalakshmi, “IAPI Quad-Filter: An Interactive and Adaptive Partitioned Approach for Incremental Frequent Pattern Mining“, Journal of Theoretical and Applied Information Technology, volume 63, issue 1, pages 147-157, May 2014. (E-Issn 1817-3195 / Issn 1992-8645). 
  4. Sherly K.K, R Nedunchezhian, “Boat Adaptive Credit Card Fraud Detection System” Proceedings of 2010 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC-2010, pages 1-7, E-ISBN 978-1-4244-5967-4
  5. Sherly K.K, R Nedunchezhian, “Data Mining Techniques in Online Financial Fraud Detection: a Survey“, Proceedings of International seminar on wireless communication, mobile computing and emerging technologies, (WICOMET-2011).
  6. Sherly K.K, “Fraud Prevention by Preserving Network Security and Data mining Techniques”, Proceedings of International Conference on “Recent trends in Computational science” ICRTS-2008(TIST).
  7. Sherly K.K, “Data Mining Techniques for Credit Card Fraud Detection”, Proceedings of National Seminar on Sustainable Development on Energy, Environment and Entrepreneurship (E3) Innovative Vision in Emerging Fields for the Future Humanity”  2008, Pages 134-143
  8. Sherly K.K, “An Application Oriented Psycho motor Approach on BOAT Decision Tree Classifier in Data Mining” International Seminar on Innovative in Pedagogical Approaches (TIST-2010).
  9. Sherly K.K, “A Comparative Assessment Of Supervised Data Mining Techniques For Fraud Prevention”, TIST International journal of Science, Technology and Research, Volume 1, Issue 1, Pages 1-6(2012).
  10. 10.  Nimisha Philip, Sherly K.K, “Credit Card Fraud Detection Based on Behavior Mining”, TIST International journal of Science, Technology and Research, Volume 1, Issue 1, Pages 7-12(2012).
  11. 11.  Rose Bell, Sherly K.K, “An Intelligent Network Intrusion Detection System”,  International Conference on Information Security,Sree Narayana Gurukulam College of Engineering, Ernakulam.(ICIS-2011)
  12. 12.  Justy Jameson, SherlyK.K, “SQL HERO: empirical methodforsql injectionobstacle”, International Conference on Information Security,Sree Narayana Gurukulam College of Engineering, Ernakulam. (ICIS-2011)
  13. Justy Jameson, Sherly K.K, “SQL Injection Disclosure using BLAH Algorithm”, Proceedings of International conference on Advances in Computing and Communications in computer and information sciences, volume 191,  pp. 693–702 ,ACC2011 online ISBN 978-3-642-22714-1, Springer.
  14. Neethu Mathai, Sherly K.K, “A Modified Framework for Secure and Robust Blind Data Hiding in Videos using AES Cryptosystem and Forbidden Zone Concept”, Proceedings of National Conference on Emerging Trends in Computer Science and Applications, February 2013 at Sree Narayana Gurukulam College of Engineering, Ernakulam.
  15. SreeLekshmi, Sherly K.K, Security of Encrypted Data With The Help Of LDPC Coding, National Conference on Advances in Computing and Communication (NCACC 2013),March, 2013 .Sree Buddha College of Engineering, Pattoor
  16. NeethuMathai,Sherly K.K, “A Modified Framework For Secure And Robust Blind Data Hiding In Videos Using Chaotic Encryption And  Forbidden Zone Concept”,  International Journal of Scientific & Engineering Research, Volume 4, Issue 8, Pages 1-7, August 2013. ISSN 2229-5518.
  17. Sunu Thomas, Sherly K.K, Dija S, “Extraction of Memory Forensics artifacts from Windows 7 RAM Image” Proceedings of 2013 IEEE International Conference on Information and Communication Technologies (ICT 2013),pp. no. 937-942, ISBN 978-1-4673-5758-6. April 2013.
  18. Anntinu.T.J, Sherly.K.K, “JIT DYNAMIC CRYPTOSYSTEM”, IJRET: International Journal of Research in Engineering and Technology, Volume: 03 Issue: 13 | Jan-2014 , pp. no. 11-15, eISSN: 2319-1163 | pISSN: 2321-7308
  19. AmruthaMuralidharan Nair, Sherly K.K, “Session-Based Intrusion Detection System in Web Application Using Mapping Method”, International Journal of Emerging Trends in Engineering and Development, Volume: 02, Issue: 04,March 2014, ISSN 2249-6149.
  20. AmruthaMuralidharan Nair, Sherly K.K, “Session-Based Intrusion Detection System in Multitier Web Application Using Sensors”.2014
  21. Anntinu.T.J, Sherly.K.K, “RSA Based 2-Factor Cryptosystem”, National Conference on Computing Technologies, SNGCE, Kochi.
  22. Anntinu.T.J, Sherly.K.K, “Hybrid 2-Factor Cryptosystem”, SAPIENCE’14, International conference on security and authentication, 2014, SNGCE,Kochi.
  23. Keerthi J, Sherly K.K, “Energy Efficient and Secure Genetic Clustering in Wireless Sensor Network”, Proceedings of 2nd International Conference on Emerging Trends in Technology and Applied Sciences (ICETTAS'15), 2015, Pages 32-36
  24. Rini Joy, Sherly K.K, “Parallel Frequent Itemset Mining with Spark RDD Framework for Disease Prediction “, Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies (ICCPCT 2016)”.
  25. Jithin S Kuruvila, Sherly K K et. al., 2017, ‘Flowchart Plagiarism Detection System: An Image Processing Approach’, Procedia Computer Science 115 (2017) 533–540. ISSN:1877-0509
  26. Ardra, Sherly K.K, et. al., 2017, Analyzing the Behavior of Youth to Sociality Using Social Media Mining, Proceedings of IEEE International Conference on Intelligent Computing and Control Systems (ICICCS2017), pages: 1231-1235
  27. Divyasree T.H, Sherly K K,  2018, ‘A Network Intrusion Detection System Based on Ensemble CVM Using efficient feature Selection approach’, Procedia Computer Science 143 (2018) 442–449. ISSN:1877-0509
  28.  Ahsana Hassan, Sherly K.K, et. al.,2019, ‘The Biometric Cardless Transaction with Shuffling Keypad Using Proximity Sensor’, Third International Conference on Intelligent Computing and Control Systems(ICICCS-2019)