Shashikala Tapaswi

ORCID: 0000-0002-6830-2895
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Energy Efficient Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Indoor and Outdoor Localization Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Cooperative Communication and Network Coding
  • Image Retrieval and Classification Techniques
  • Security in Wireless Sensor Networks
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Image Enhancement Techniques
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Advanced Image and Video Retrieval Techniques
  • Wireless Networks and Protocols
  • Electric Power System Optimization
  • Advanced Image Processing Techniques
  • Caching and Content Delivery
  • Optimal Power Flow Distribution
  • Energy Load and Power Forecasting
  • Spam and Phishing Detection
  • Advanced Image Fusion Techniques

Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2015-2024

SRM University, Andhra Pradesh
2024

Anglia Ruskin University
2016

Indian Institute of Technology Madras
2010

Indian Institute of Technology Indore
2008

Indian Institute of Technology Roorkee
2002

The salient features of cloud computing (such as on-demand self-service, resource pooling, broad network access, rapid elasticity, and measured service) are being exploited by attackers to launch the severe Distributed Denial Service (DDoS) attack. Generally, DDoS attacks in such an environment have been implemented flooding a huge volume (high-rate) malicious traffic exhaust victim servers' resources. Due this traffic, can be easily detected. Thus, getting attracted towards low-rate...

10.1109/comst.2019.2934468 article EN IEEE Communications Surveys & Tutorials 2019-01-01

Wireless sensor networks (WSNs) have become one of the essential components Internet Things (IoT). In any IoT application, different sensor-based devices gather data from physical objects and transmit sensed information to base station (BS). The BS analyzes this depending on location. A high-performance intelligent WSNs is for IoT-based application. article, are referred as IoT-enabled WSNs. WSNs, fault occurrence probability much more than traditional networks. Faulty nodes broken links...

10.1109/jiot.2022.3151501 article EN IEEE Internet of Things Journal 2022-02-15

The visibility of an image captured in poor weather (such as haze, fog, mist, smog) degrades due to scattering light by atmospheric particles. Single dehazing (SID) methods are used restore from a single hazy image. SID is challenging problem its ill-posed nature. Typically, the model (ATSM) solve problem. transmission and two prime parameters ATSM. accuracy effectiveness depends on accurate value light. proposed method translates estimation into difference between minimum color channel...

10.1109/tip.2020.2975909 article EN IEEE Transactions on Image Processing 2020-01-01

Wireless Sensor Networks (WSNs) have become an indistinguishable part of any Internet Things (IoT) based system. In IoT-based system, WSN monitors different physical objects and forwards the collected data to base station or gateway node for further processing. Existing routing protocols designed WSNs are not suitable systems. An intelligent high-performance protocol is essential real-time analysis decision-making. Therefore, this paper proposes a mobile sink-based scheme WSNs. Initially,...

10.1109/jsen.2022.3164944 article EN IEEE Sensors Journal 2022-04-05

Connected Dominating Set (CDS) problem in unit disk graph has a significant impact on an efficient design of routing protocols wireless sensor networks. In this paper, algorithm is proposed for finding Minimum (MCDS) using Set. Sets are connected by Steiner tree. The goes through three phases. first phase found, second connectors identified, third the CDS obtained pruned to obtain MCDS. MCDS so constructed needs adapt continual topology changes due deactivation node exhaustion battery power....

10.4304/jnw.4.6.511-519 article EN Journal of Networks 2009-08-01

In 2018, with the internet being treated as a utility on equal grounds clean water or air, underground malicious software economy is flourishing an influx of growth and sophistication in attacks. The use documents has increased rapidly last five years along spectrum They offer flexibility document structure numerous features for attackers to exploit. Despite efforts from industry research communities, this remains viable security threat. paper, broad classification based attacks provided...

10.1080/19393555.2020.1723747 article EN Information Security Journal A Global Perspective 2020-02-13

The Man-in-the-Middle (MITM) attack on ARP is presently a common and nuisance to the typical LAN environment. This type of MITM brought effect by cache poisoning which achieved using forged packets. mechanism in node poisons table another forcing it send packets destination other than intended one. paper presents feasible solution poisoning, removing inconsistencies from all tables hosts network. uses centralized system Central Server (ACS) manage entries hosts. All network ACS validate...

10.1109/cybersec.2012.6246087 article EN 2012-06-01

In the competitive electric power market allowing open access transmission environment, knowledge of available transfer capability (ATC) is very important for optimum utilization existing facility. ATC information conveys how much can be transmitted through network over and above already committed usage without violation system security limits. This paper presents a Levenberg-Marquardt algorithm neural (LMANN)-based approach fast accurate estimation ATC. System has been estimated both...

10.1109/tpwrs.2010.2042978 article EN IEEE Transactions on Power Systems 2010-03-26

Cloud computing is a fast-growing and promising technology segment that aims to reduce maintenance management costs by shifting high-quality infrastructure the Internet. It emerging as dominant because it provides an on-demand, self-service, scalable, pay-per-use business model. Despite its numerous benefits, suffers from several security challenges. As consequence of on-demand service, availability resources crucial attribute cloud among necessities. In this work, survey presented on...

10.1080/19393555.2017.1282995 article EN Information Security Journal A Global Perspective 2017-02-28

Being as an essential component for data communication in disaster management scenario, IoT has evolved the key paradigm to update information consequent nodes. In such scenarios, sensors, equipped with a limited battery, consume lot of energy communication. Therefore, practical realization networks is challenging task routing ignores paths consuming tremendous amount and delay during tree construction multicast routing. This paper proposes improved squirrel search algorithm (SSA) by...

10.1109/tgcn.2019.2891752 article EN IEEE Transactions on Green Communications and Networking 2019-01-09

In today's era of digitisation, many technologies have evolved that every manual work can be digitally automatized. the digital automatizing process, security and privacy are most important highly demanding aspects. Blockchain offers features used in almost sphere life. Features like decentralisation, transparency, makes it an extremely useful technology. Therefore, by making use all these features, several problems healthcare sector solved removing complex network third parties lack...

10.1109/cict48419.2019.9066225 article EN 2019-12-01

The Industrial Internet of Things (IIoT) uses smart sensors to monitor an industrial environment. These transmit the data through wireless mediums and form Wireless Sensor Networks (WSNs). However, environments are prone accidents like leakage harmful gases, fires, boilers bursting, etc., which is very dangerous for people working there. Existing emergency evacuation systems suffer from low response time, uneven distribution, longer or less safe paths. This paper presents Intelligent...

10.1109/tim.2023.3328071 article EN IEEE Transactions on Instrumentation and Measurement 2023-01-01

Virtual machine introspection is a technique used to inspect and analyse the code running on given virtual machine. has gained considerable attention in field of computer security research. In recent years, it been applied various areas, ranging from intrusion detection malware analysis complete cloud monitoring platforms. A survey existing tools necessary address possible research gaps focus key features required for wide application techniques. this paper, we evolution their ability...

10.1186/s13677-014-0016-2 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2014-10-24
Coming Soon ...