Dr. Serin V Simpson
Qualification : Ph.D. (Sathyabama University)
Details of Educational Qualification:
Course | Specialization | Group | College Name/University | Year of Passing |
---|---|---|---|---|
Ph.D. | Computer Science and Engineering | Computer Science and Engineering | Sathyabama Institute of Science and Technology | 2023 |
M.Tech. | Computer Science and Engineering | Computer Science and Engineering | Thejus Engineering College, University of Calicut | 2015 |
B.Tech. | Information Technology | Information Technology | Nehru College, Pampady, University of Calicut | 2012 |
List of Publications
S.No | Title of the Paper | Full Details of Journal Name / Conference Name, Volume number, page number, Date |
---|---|---|
1 | A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment. | Future Generation Computer Systems (Impact Factor: 7.187) (2021), Elsevier, Vol. 125, pp. 544-563. doi: 10.1016/j.future.2021.06.052 |
2 | An edge based trustworthy environment establishment for internet of things: an approach for smart cities. | Wireless Networks (Impact Factor: 2.602) (2021), Springer, pp. 1-17. doi: 10.1007/s11276-021-02667-2 |
3 | A table based attack detection (TBAD) scheme for Internet of Things: An approach for Smart City environment. | In 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), pp. 696-701. IEEE, 2021. doi: 10.1109/ESCI50559.2021.9396929 Scopus indexed journals |
4 | An Environment-Adaptive Distributed Node Joining Approach and A Secure Cluster Based Architecture for MANET. | In International Journal of Enterprise Network Management (2022), Inderscience Publishers, preprint doi: 10.1504/IJENM.2022.122401 |
5 | SEAL—Security-Aware List-Based Routing Protocol for Mobile Ad Hoc Network. | Lecture Notes in Electrical Engineering, Springer, pp. 519-530, 2020. doi: 10.1007/978-981-15-7504-4_51 |
6 | Security Aware Cluster Based Architecture for MANET. | International Conference on Emerging Trends in Engineering & Technology (ICETET-2015), pp. 89-96. 2015. |
7 | AODV: Security Consideration. | International Journal of Computer Applications 975 (2015): 8887. |
8 | Intrusion Detection System for a Cluster Based WSN. | Wireless Communication 8, no. 7 (2016): 274-277. |
Book Chapters
S.No | Book Chapters |
---|---|
1 | Edge computing security: layered classification of attacks and possible countermeasures, EFCP 2021: Integration: Edge/Fog Computing Paradigm: The Concept, Platforms and Applications, Elsevier |
2 | An application oriented study of security threats and countermeasures in edge computingassisted internet of things, EdgeAI-2021: CRC Press, Taylor &Francis Group. Book Chapter2021: Applied Edge AI: Concepts, Platforms, and Industry Use Cases. |
3 | Security challenges and attacks in MANET-IOT system, Enterprise Digital Transformation: Technology, Tools and Use Cases, to be published by CRC Press Taylor & Francis Group in 2021. |