Publications

2020
Sherly KK, Ahsana H. The Biometric Cardless Transaction with Shuffling Keypad Using Proximity Sensor. 2nd INTERNATIONAL CONFERENCE ON INVENTIVE RESEARCH IN COMPUTING APPLICATIONS(ICIRCA 2020). 2020.
2018
Sherly KK, Divyasree TH. A Network Intrusion Detection System Based on Ensemble CVM Using efficient feature Selection approach. Procedia Computer Science. 2018;143:442–449.
2017
Sherly KK, Ardra. Analyzing the Behavior of Youth to Sociality Using Social Media Mining. IEEE International Conference on Intelligent Computing and Control Systems (ICICCS2017). 2017:1231-1235.
K.K S, Nedunchezhian R. Efficient Adaptive Frequent Pattern Mining Techniques for Market Analysis in Sequential and Parallel Systems. The International Arab Journal of Information Technology. 2017;14(2):175-185.
Sherly KK, Jithin K, Sangeetha J. Flowchart Plagiarism Detection System: An Image Processing Approach. Procedia Computer Science. 2017;115:533–540.
2016
Sherly KK, Rini J. Parallel Frequent Itemset Mining with Spark RDD Framework for Disease Prediction . Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies (ICCPCT 2016). 2016.
2015
Sherly KK, Keerthi J. Energy Efficient and Secure Genetic Clustering in Wireless Sensor Network. Proceedings of 2nd International Conference on Emerging Trends in Technology and Applied Sciences (ICETTAS'15). 2015.
K.K S, Nedunchezhian R. Improved Incremental and Interactive Frequent Pattern Mining Techniques for Market Basket Analysis and Fraud Detection in Distributed and Parallel System. Indian Journal of Science and Technology. 2015;8(18):1-12.
2014
Sherly KK, Anntinu TJ. Hybrid 2-Factor Cryptosystem. International conference on security and authentication. 2014.
Sherly KK, Nedunchezhian R. IAPI Quad-Filter: An Interactive and Adaptive Partitioned Approach for Incremental Frequent Pattern Mining. Journal of Theoretical and Applied Information Technology. 2014;63(1):147-157.
Sherly KK, Anntinu TJ. JIT DYNAMIC CRYPTOSYSTEM. International Journal of Research in Engineering and Technology. 2014;3(13):11-15.
Sherly KK, Anntinu TJ. RSA Based 2-Factor Cryptosystem. National Conference on Computing Technologies. 2014.
Sherly KK, Amrutha MN. Session-Based Intrusion Detection System in Web Application Using Mapping Method. International Journal of Emerging Trends in Engineering and Development. 2014;2(4):596-608.
2013
Sherly KK, Sunu T. Extraction of Memory Forensics artifacts from Windows 7 RAM Image. IEEE International Conference on Information and Communication Technologies (ICT 2013),. 2013:937-942.
Sherly KK, Neethu M. A Modified Framework For Secure And Robust Blind Data Hiding In Videos Using Chaotic Encryption And Forbidden Zone Concept. International Journal of Scientific & Engineering Research. 2013;4(8):1-7.
Sherly KK, Neethu M. A Modified Framework for Secure and Robust Blind Data Hiding in Videos using AES Cryptosystem and Forbidden Zone Concept. National Conference on Emerging Trends in Computer Science and Applications. 2013.
Sherly KK, SreeLekshmi. Security of Encrypted Data With The Help Of LDPC Coding. National Conference on Advances in Computing and Communication (NCACC 2013). 2013.
2012
Sherly KK. A Comparative Assessment Of Supervised Data Mining Techniques For Fraud Prevention. TIST International journal of Science, Technology and Research. 2012;1(1):1-6.
Sherly KK, Nimisha P. Credit Card Fraud Detection Based on Behavior Mining. TIST International journal of Science, Technology and Research. 2012;1(1):7-12.
2011
Sherly KK, Nedunchezhian R. Data Mining Techniques in Online Financial Fraud Detection: a Survey. International seminar on wireless communication, mobile computing and emerging technologies. 2011.

Pages