default search action
Shishir K. Shandilya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Akshay Jadhav, Shishir Kumar Shandilya, Ivan Izonin, Roman Muzyka:
Multi-Step Dynamic Ensemble Selection to Estimate Software Effort. Appl. Artif. Intell. 38(1) (2024) - [j25]Ivan Izonin, Tetiana Hovorushchenko, Shishir Kumar Shandilya:
Quality and Security of Critical Infrastructure Systems. Big Data Cogn. Comput. 8(1): 10 (2024) - [j24]Chirag Ganguli, Shishir Kumar Shandilya, Michal Gregus, Oleh Basystiuk:
Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security. Comput. Syst. Sci. Eng. 48(3): 739-758 (2024) - [j23]Geetanjali Rathee, Hemraj Saini, Shishir K. Shandilya, S. Rajasoundaran:
A trusted and adaptive security mechanism for wearable e-healthcare systems. Int. J. Ad Hoc Ubiquitous Comput. 45(1): 3-10 (2024) - [j22]Shahana Gajala Qureshi, Shishir Kumar Shandilya:
Nature-inspired adaptive decision support system for secured clustering in cyber networks. Multim. Tools Appl. 83(1): 3153-3187 (2024) - [j21]Akshay Jadhav, Shishir Kumar Shandilya:
Towards effective feature selection in estimating software effort using machine learning. J. Softw. Evol. Process. 36(5) (2024) - 2023
- [b1]Shishir Kumar Shandilya, Agni Datta, Atulya K. Nagar:
A Nature-Inspired Approach to Cryptology. Studies in Computational Intelligence 1122, Springer 2023, ISBN 978-981-99-7080-3, pp. 3-309 - [j20]Akshay Jadhav, Shishir Kumar Shandilya, Ivan Izonin, Michal Gregus:
Effective Software Effort Estimation Leveraging Machine Learning for Digital Transformation. IEEE Access 11: 83523-83536 (2023) - [j19]Durgesh M. Sharma, Shishir Kumar Shandilya, Suresh Chandra Satapathy:
Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms. Concurr. Comput. Pract. Exp. 35(23) (2023) - [j18]Chirag Ganguli, Shishir Kumar Shandilya, Maryna Nehrey, Myroslav Havryliuk:
Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense. Syst. 11(1): 27 (2023) - [j17]Shahana Gajala Qureshi, Shishir Kumar Shandilya, Suresh Chandra Satapathy, Massimo Ficco:
Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments. Wirel. Pers. Commun. 128(1): 67-88 (2023) - 2022
- [j16]Akshara Makrariya, Shishir Kumar Shandilya, Smita Shandilya, Michal Gregus, Ivan Izonin, Rahul Makrariya:
Mathematical Simulation of Behavior of Female Breast Consisting Malignant Tumor During Hormonal Changes. IEEE Access 10: 91346-91355 (2022) - [j15]M. Akhil Jabbar, Shishir Kumar Shandilya, Ajit Kumar, Smita Shandilya:
Applications of cognitive internet of medical things in modern healthcare. Comput. Electr. Eng. 102: 108276 (2022) - [j14]Durgesh M. Sharma, Shishir Kumar Shandilya:
An efficient cyber-physical system using hybridized enhanced support-vector machine with Ada-Boost classification algorithm. Concurr. Comput. Pract. Exp. 34(21) (2022) - [j13]Shishir Kumar Shandilya, Saket Upadhyay, Ajit Kumar, Atulya K. Nagar:
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis. Future Gener. Comput. Syst. 127: 297-308 (2022) - [j12]Shishir Kumar Shandilya:
Design and Deployment of Network Testbed for Web Data Security. J. Cyber Secur. Mobil. 11(2) (2022) - [j11]Sampathkumar Arumugam, Shishir Kumar Shandilya, Nebojsa Bacanin:
Federated Learning-Based Privacy Preservation with Blockchain Assistance in IoT 5G Heterogeneous Networks. J. Web Eng. 21(4): 1323-1346 (2022) - [j10]Shishir Kumar Shandilya:
Paradigm Shift in Adaptive Cyber Defense for Securing the Web Data: The Future Ahead. J. Web Eng. 21(4): 1371-1376 (2022) - [j9]Ivan Izonin, Roman Tkachenko, Rostyslav Holoven, Kyrylo Yemets, Myroslav Havryliuk, Shishir Kumar Shandilya:
SGD-Based Cascade Scheme for Higher Degrees Wiener Polynomial Approximation of Large Biomedical Datasets. Mach. Learn. Knowl. Extr. 4(4): 1088-1106 (2022) - [j8]Banoth Ravi, Jaisingh Thangaraj, Shishir Kumar Shandilya:
Stochastic modelling and analysis of mobility models for intelligent software defined internet of vehicles. Phys. Commun. 50: 101498 (2022) - [j7]Soumya P. Dash, Sandeep Joshi, Suresh Chandra Satapathy, Shishir Kumar Shandilya, Ganapati Panda:
A Cybertwin-Based 6G Cooperative IoE Communication Network: Secrecy Outage Analysis. IEEE Trans. Ind. Informatics 18(7): 4922-4932 (2022) - [j6]Lokesh M. Giripunje, Abhay Vidyarthi, Shishir Kumar Shandilya:
Adaptive Congestion Prediction in Vehicular Ad-hoc Networks (VANET) Using Type-2 Fuzzy Model to Establish Reliable Routes. Wirel. Pers. Commun. 125(4): 3527-3548 (2022) - [j5]Shahana Gajala Qureshi, Shishir Kumar Shandilya:
Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN. Wirel. Pers. Commun. 127(1): 577-597 (2022) - [c10]Gaurav Pramod Kachare, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag:
Sandbox Environment for Real Time Malware Analysis of IoT Devices. COMS2 2022: 169-183 - [c9]Meeraj Mahendra Gawde, Gaurav Choudhary, Shishir Kumar Shandilya, Rizwan Ur Rahman, Hoonyong Park, Ilsun You:
Improvised Model for Blockchain in Distributed Cloud Environment. CSS 2022: 327-341 - [d1]Shishir Kumar Shandilya, Chirag Ganguli, Ivan Izonin, Atulya Kumar Nagar:
Cyber Attack Evaluation Dataset for Deep Packet Inspection and Analysis. IEEE DataPort, 2022 - 2021
- [j4]R. Gowtham, Sanjay S. P., Shishir Kumar Shandilya, S. Sountharrajan:
A Cognitive Personal Assistant System to Enhance the Individual-Centric Research Capabilities. Int. J. Web Based Learn. Teach. Technol. 16(4): 1-11 (2021) - [j3]Shahana Gajala Qureshi, Shishir Kumar Shandilya:
Novel hybridized crow whale optimization and QoS based bipartite coverage routing for secure data transmission in wireless sensor networks. J. Intell. Fuzzy Syst. 41(1): 2085-2099 (2021) - [c8]Shishir Kumar Shandilya:
Design and Analysis of NICS Based Web Attack Detection for Advanced Intrusion Detection System. KGSWC 2021: 61-70 - [c7]Paresh Sajan Gharat, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag:
Future Applications of Blockchain in Education Sector: A Semantic Review. MobiSec 2021: 93-106 - [e2]Ajith Abraham, Shishir K. Shandilya, Laura García-Hernández, Maria Leonilde Varela:
Hybrid Intelligent Systems - 19th International Conference on Hybrid Intelligent Systems (HIS 2019) held in Bhopal, India, December 10-12, 2019. Advances in Intelligent Systems and Computing 1179, Springer 2021, ISBN 978-3-030-49335-6 [contents] - 2020
- [j2]Ajit Kumar, Vinti Agarwal, Shishir K. Shandilya, Andrii Shalaginov, Saket Upadhyay, Bhawna Yadav:
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting. Future Internet 12(4): 66 (2020) - [c6]Durgesh M. Sharma, Shishir Kumar Shandilya, Ashish K. Sharma:
A Comprehensive Review on Cyber Physical System and Its Applications in Robotic Process Automation. IBICA 2020: 311-322 - [c5]Devottam Gaurav, Shishir K. Shandilya, Sanju Mishra Tiwari, Ayush Goyal:
A Machine Learning Method for Recognizing Invasive Content in Memes. KGSWC 2020: 195-213 - [e1]Boris Villazón-Terrazas, Fernando Ortiz-Rodríguez, Sanju Mishra Tiwari, Shishir K. Shandilya:
Knowledge Graphs and Semantic Web - Second Iberoamerican Conference and First Indo-American Conference, KGSWC 2020, Mérida, Mexico, November 26-27, 2020, Proceedings. Communications in Computer and Information Science 1232, Springer 2020, ISBN 978-3-030-65383-5 [contents]
2010 – 2019
- 2019
- [j1]Archana Patel, Sarika Jain, Shishir K. Shandilya:
Data of SemanticWeb as Unit of Knowledge. J. Web Eng. 17(8): 647-674 (2019) - [c4]Ajit Kumar, Vinti Agarwal, Shishir K. Shandilya, Andrii Shalaginov, Saket Upadhyay, Bhawna Yadav:
PACE: Platform for Android Malware Classification and Performance Evaluation. IEEE BigData 2019: 4280-4288 - [c3]Lokesh M. Giripunje, Deepika Masand, Shishir Kumar Shandilya:
Congestion Control in Vehicular Ad-Hoc Networks (VANET's): A Review. HIS 2019: 258-267 - [c2]Shahana Gajala Qureshi, Shishir Kumar Shandilya:
Advances in Cyber Security Paradigm: A Review. HIS 2019: 268-276 - 2010
- [c1]Ashutosh K. Dubey, Shishir K. Shandilya:
A Novel J2ME Service for Mining Incremental Patterns in Mobile Computing. ICT 2010: 157-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint