Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
PUBLICATION OF PAPERS IN REFEREED JOURNALS 1. Karthika, S, Bose, S & Kannan, A 2014, ‘SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks’, International Journal of Data Warehousing and Mining (IJDWM), vol.10,no.1, pp. 32- 54. DOI: 10.4018/ijdwm.2014010103 (Annexure 1, IF:1.35) 2. Karthika, S & Bose, S 2014, “Paralyzing Covert Network: Removing Pivot Actors and Predicting Second Leaders Advances.(Annexure 1, IF:2.2) To Curb Future Disaster”, Disaster 3. Karthika, S, Kiruthiga, A & Bose, S 2012, Dominant Features Identification for Covert Nodes In 9/11 Attack Using Their Profile’, International Journal of Network Security & Its Applications, vol. 4, no.4. 4. Karthika, S & Bose, S 2011, ‘A comparative study of social networking approaches in identifying the covert nodes’, International Journal on Web Services Computing (IJWSC), vol. 2, pp. 65-78. 5. Karthika, S & Bose, S 2015, “What happens next? Prediction of disastrous links in covert network”, in Disaster Advances, Vol 8, no. 4, pp 53-60. 6. Karthika, S & Vinodhini, M 2015, “Prediction of links in complex networks”, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.34. PUBLICATION OF PAPERS IN CONFERENCES 1. Karthika, S, Geetha, R & Bose, S 2013, ‘Whom to remove? Breaking covert network’, I n Advanced Computing (ICoAC), 2013 Fifth International Conference on (pp. 348-354). IEEE. 2. Karthika, S, Kiruthiga, A, & Bose, S 2012, ‘Identifying key players in a covert network using behavioral profile’, In Recent Trends In Information Technology (ICRTIT), International Conference on IEEE, pp. 22-27. 3. Karthika, S, Kiruthiga, A & Bose, S 2012, ‘Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies’, In Advances in Computer Science, Engineering & Applications, Springer Berlin Heidelberg, pp. 333-344. 4. Karthika, S & Bose, S 2011, ‘Analyzing various social networking approaches for covert networks’, In Trends in Network and Communications, pp. 558-566. Springer Berlin Heidelberg. 5. Nivedita N, Noorjahan M & Karthika S, 2015, “Big Data – Hand in Hand with Social Networks”, International Conference on Advanced Computer Science and Information Tehnology (ICACSIT), Proceedings of 23rd IRF International Conference, pp 46-51. 6. Vaishali Sarathy, Srinidhin S & Karthika S, 2015“Semantic Analysis using Big Data from Social Media”, International Conference on Advanced Computer Science and Information Tehnology(ICACSIT), Proceedings of 23rd IRF International Conference, pp 40-45. 7. Karthika, S & Bose, S 2015 “SpyMe: Analysis of crucial players in covert social network”, Bilingual international conference on Information Technology: yesterday, today and tomorrow, pp. 273-280.