2022 3rd International Symposium on Computer Engineering and Intelligent Communications

Welcome Dr.M.Vijayalakshmi, Thiagarajar College of Engineering, India to be the Keynote Speaker!


Dr. M.Vijayalakshmi, Thiagarajar College of Engineering, India



  1. Anita, N, Vijayalakshmi, M & Shalinie, SM 2022,  ̳A Lightweight scalable and secure blockchain based IoT using fuzzy logic‘, Wireless Personal Communications, Available from: <https://doi.org/10.1007/s11277-022-09648-4>, ISSN: 0929-6212, Annexure II, Impact Factor: 1.671.

  2. Anita, N, Vijayalakshmi, M & Shalinie, SM, 2022,  ̳Proof-of-improved-participation: A new consensus protocol for blockchain technology‘, Accepted in Computer Systems Science and Engineering, Tech Science Press, ISSN: 0267-6192, Annexure II, Impact Factor: 1.486.

  3. Yang, M.-H.; Luo, J.-N.; Vijayalakshmi, M.; Shalinie, S.M. Contactless Credit Cards Payment Fraud Protection by Ambient Authentication. Sensors 2022, 22, 1989. https://doi.org/10.3390/s22051989 Impact Factor: 3.576

  4. M. Vijayalakshmi, S. Mercy Shalinie, Ming Hour Yang, Shou-Chuan Lai, Jia-Ning Luo, "A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol", Security and Communication Networks, vol. 2022, Article ID 9377818, pp. 1-12, 2022. https://doi.org/10.1155/2022/9377818. Impact Factor: 1.791

  5. Vijayalakshmi, M.; Mercy Shalinie, S.; Yang, Ming Hour; U., Raja Meenakshi: 'Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions', IET Networks, 2020, 9, (5), p. 235-246, DOI: 10.1049/iet-net.2020.0078IET Digital Library, https://digital-library.theiet.org/content/journals/10.1049/iet-net.2020.0078. SNIP: 1.160

  6. M. -H. Yang, J. -N. Luo, M. Vijayalakshmi and S. M. Shalinie, "Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices," in IEEE Access, vol. 8, pp. 201087-201097, 2020, doi: 10.1109/ACCESS.2020.3034226. Impact Factor: 4.096

  7. Vijayalakshmi Murugesan, Mercy Shalinie Selvaraj, Ming-Hour Yang, HPSIPT: A high-precision single-packet IP traceback scheme, Computer Networks, vol. 143, 2018, pp. 275-288, ISSN: 1389-1286. doi: https://doi.org/10.1016/j.comnet.2018.07.013. Impact Factor: 2.522

  8. Vijayalakshmi, M, Mercy Shalinie, S, Ming Hour Yang, 'Design and Analysis of Hybrid Single Packet IP Traceback Scheme', IET Networks, vol. 7, no. 3, pp. 141-151, 5 2018. doi: 10.1049/iet-net.2017.0115. SNIP: 1.160.

  9. Vijayalakshmi, M and Mercy Shalinie, S, ‘UDP based IP Traceback for Flooding DDoS Attack’, The International Arab Journal of Information Technology, Vol. 15, No. 1, pp. 103 - 111. Impact factor : 0.724

  10. Vijayalakshmi, M, Mercy Shalinie, S, and Nithya, N, ‘A Brief Survey of IP Traceback Methodologies’, Acta Polytechnica Hungarica, vol. 11, no. 9, pp. 197-216, 2014. DOI: doi: 10.12700/APH.11.09.2014.09.12. Impact Factor: 0.909

  11. Vijayalakshmi, M and Mercy Shalinie, S, ‘Single Packet ICMP Traceback Technique using Router Interface’, Journal of Information Science and Engineering, vol. 30, no. 6, pp. 1673-1694, 2014. doi:10.1688/JISE.2014.30.6.1. Impact Factor: 0.61

  12. Akilandeswari, V, Mercy Shalinie, S,Vijayalakshmi, M, Sheik Mohamad Mubeen, S, ‘Proactive Behavior Analysis of Network Traffic Using SNMP-MIB Agents’, International Journal of Network Security and its Applications, 2012.


  1. Anita,      N & Vijayalakshmi, M 2022, ̳RIM: A Reputation-based Incentive      Mechanism using blockchain‘, 2022 3rd International Conference on      Innovative Trends in Information Technology (ICITIIT,) Kottayam,      India,IEEE, pp. 1-5.

  2. A.      N and V. M, "IoT Security in Supply Chain Using Blockchain,"      2021 2nd International Conference on Communication, Computing and Industry      4.0 (C2I4), 2021, pp. 1-6, doi: 10.1109/C2I454156.2021.9689263.

  3. Shuruthi      V, Keerthana K, Sudha M, Ibrahim Badhusha U, Vijayalakshmi M, Vignaraj      Ananth, “Enabling Sign Language Recognition Feature in Video      Conferencing”,9th International Conference Indian Society Of      Ergonomics, Humanizing Work And Work Environment, 2021, IIT Guwahati –      Accepted

  4. Yogamahalaksmi      M, Vijayalakshmi M, Lavanya S, Saranya B, “Credit      Card Fraud Detection Using CNN”, 6th International      Conference on Internet of Things and Connected Technologies (ICIOTCT)      2021, IIT Patna. Doi:10.1007/978-3-030-94507-7_19

  5. S.      A. Pranesh, V. Kannan V., N. Viswanathan and M. Vijayalakshmi,      "Design and Analysis of Incentive Mechanism for Ethereum-based Supply      Chain Management Systems," 2020 11th International Conference on      Computing, Communication and Networking Technologies (ICCCNT), 2020, pp.      1-6, doi: 10.1109/ICCCNT49239.2020.9225602.

  6. N      Anita, M Vijayalakshmi, ‘Blockchain Security Attack: A Brief Survey’, 2019      10th IEEE International Conference on Computing, Communication and      Networking Technologies(ICCCNT),IIT Kanpur, pp1–6,DOI:10.1109/ICCCNT45670.2019.8944615

  7. W.      Mercy Kiruba and M. Vijayalakshmi, "Implementation and Analysis of      Data Security in a Real Time IoT Based Healthcare Application," 2018      2nd IEEE International Conference on Trends in Electronics and      Informatics (ICOEI), 2018, pp. 1460-1465. doi: 10.1109/ICOEI.2018.8553908

  8. Vijayalakshmi,      M, Mercy Shalinie, S, and Nithya, N, 'A Novel Algorithm on IP Traceback to      Find the Real Source of Spoofed IP Packets', Springer International      Conference on Artificial Intelligence and Evolutionary Algorithms in      Engineering Systems,2014.doi: https://doi.org/10.1007/978-81-322-2135-7_10

  9. Vijayalakshmi,      M, Mercy Shalinie, S, Arun Pragash, A, ‘IP Traceback System for Network      and Application Layer Attack’, Recent Trends in Information Technology      (ICRTIT), pp.439-444, 2012. DOI: 10.1109/ICRTIT.2012.6206778

  10. Prasanna,S,      Vijayalakshmi,M, MercyShalinie,S, ‘Anomaly Detection System based on      Analysis of Packet Header and Payload Histograms’, Recent Trends in      Information Technology (ICRTIT),pp.412-416,2011. Doi: 10.1109/ICRTIT.2011.5972283

Journal Reviewer

  • IET –      Information Security.

  • Wiley – Security      and Communication Networks.

  • Elsevier –      Journal of Information Security and its Applications.

  • Wiley – ETRI      Journal

  • IETE Journal of      Research

  • Elsevier - Ad      Hoc Networks

  • Taylor &      Francis - Information Security Journal: A Global Perspective

  • IEEE      Transactions on Network and Service Management

Program Committee Member    

  1. ACM MobiHoc 2017 -      IoTSII 2017,IIT Madras.

  2. Springer International      Conference On Security With Intelligent Computing And Big-Data Services      (SICBS’17), National Dong Hwa University, TAIWAN

  3. International Conference on Data Security (INCODS – 2017),      Kalasalingam University, 2017.

  4. 2018 IEEE Conference on Dependable and Secure Computing, Kaohsiung,      Taiwan, December 10—13, 2018.

Awards / Recognition Received

  1. Distinguished Paper Award, IIT Guwahati

  2. Best Paper Award at Springer International Conference on Artificial Intelligence      and Evolutionary Algorithms in Engineering Systems, 2014.

  3. WSAD - Application Developer, IBM, 2005

  4. IBM Faculty Ambassador, 2005.