Download PUBLICATION OF PAPERS IN REFEREED JOURNALS Karthika, S

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
PUBLICATION OF PAPERS IN REFEREED JOURNALS
1. Karthika, S, Bose, S & Kannan, A 2014, ‘SpyNetMiner: An Outlier Analysis to Tag
Elites in Clandestine Social Networks’, International Journal of Data Warehousing
and Mining (IJDWM), vol.10,no.1, pp. 32- 54. DOI: 10.4018/ijdwm.2014010103
(Annexure 1, IF:1.35)
2. Karthika, S & Bose, S 2014, “Paralyzing Covert Network: Removing Pivot Actors
and
Predicting Second Leaders
Advances.(Annexure 1, IF:2.2)
To
Curb
Future
Disaster”,
Disaster
3. Karthika, S, Kiruthiga, A & Bose, S 2012, Dominant Features Identification for
Covert Nodes In 9/11 Attack Using Their Profile’, International Journal of Network
Security & Its Applications, vol. 4, no.4.
4. Karthika, S & Bose, S 2011, ‘A comparative study of social networking approaches in
identifying the covert nodes’, International Journal on Web Services Computing
(IJWSC), vol. 2, pp. 65-78.
5. Karthika, S & Bose, S 2015, “What happens next? Prediction of disastrous links in
covert network”, in Disaster Advances, Vol 8, no. 4, pp 53-60.
6. Karthika, S & Vinodhini, M 2015, “Prediction of links in complex networks”,
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10
No.34.
PUBLICATION OF PAPERS IN CONFERENCES
1. Karthika, S, Geetha, R & Bose, S 2013, ‘Whom to remove? Breaking covert
network’, I n Advanced Computing (ICoAC), 2013 Fifth International Conference
on (pp. 348-354). IEEE.
2. Karthika, S, Kiruthiga, A, & Bose, S 2012, ‘Identifying key players in a covert
network using behavioral profile’, In Recent Trends In Information Technology
(ICRTIT), International Conference on IEEE, pp. 22-27.
3. Karthika, S, Kiruthiga, A & Bose, S 2012, ‘Behavioral Profile Generation for 9/11
Terrorist Network Using Efficient Selection Strategies’, In Advances in Computer
Science, Engineering & Applications, Springer Berlin Heidelberg, pp. 333-344.
4. Karthika, S & Bose, S 2011, ‘Analyzing various social networking approaches for
covert networks’, In Trends in Network and Communications, pp. 558-566. Springer
Berlin Heidelberg.
5. Nivedita N, Noorjahan M & Karthika S, 2015, “Big Data – Hand in Hand with Social
Networks”, International Conference on Advanced Computer Science and
Information Tehnology (ICACSIT), Proceedings of 23rd IRF International
Conference, pp 46-51.
6. Vaishali Sarathy, Srinidhin S & Karthika S, 2015“Semantic Analysis using Big Data
from Social Media”, International Conference on Advanced Computer Science and
Information Tehnology(ICACSIT), Proceedings of 23rd IRF International Conference,
pp 40-45.
7. Karthika, S & Bose, S 2015 “SpyMe: Analysis of crucial players in covert social
network”, Bilingual international conference on Information Technology: yesterday,
today and tomorrow, pp. 273-280.