Personal information

information processing and security
India

Biography

Dr. (Mrs.) B. Janet obtained her Undergraduate degree in B.Sc. (Physics) with Distinction from Holy Cross College, Trichy in 1999 from the Bharathidasan University, Tiruchirappalli and Postgraduate degree in Master of Computer Applications in 2002 from Bishop Heber College, with a university third rank from Bharathidasan University, Tiruchirappalli.

She started her research in Information Retrieval with a Master of Philosophy in Computer Science from Alagappa University, Karaikudi in 2005. She was awarded Ph. D. degree in 2012 by the National Institute of Technology, Tiruchirappalli.

She passed the National Eligibility Test for Lectureship (NET) of UGC in December 2001.

Since 2002, she has been a professional teacher. Now, she is an Assistant Professor in the Department of Computer Applications, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India. She has 10 years of teaching experience and 9 years of research experience. Her research interests include Information Retrieval, and Multimedia Mining.

She has visited Malaysia to present one of her research papers in a conference. She is also a reviewer for International Conference Papers. She is presently the Life member of Computer Society of India, International Association of Engineers and International Association of Computer Science and Information Technology. She is also an active member of IEEE.

Activities

Employment (2)

National Institute of Technology Tiruchirappalli: Tiruchirappalli, Tamil Nadu, IN

2024-03-20 to present | Associate Professor (Computer Applications)
Employment
Source: Self-asserted source
B. Janet

National Institute of Technology Tiruchirappalli: Tiruchirappalli, IN

2006-04-20 to 2024-03-19 | Assistant Professor (Computer Applications)
Employment
Source: Self-asserted source
B. Janet

Education and qualifications (1)

National Institute of Technology Tiruchirappalli: Tiruchirappalli, Tamil Nadu, IN

Ph. D (Computer Applications)
Qualification
Source: Self-asserted source
B. Janet

Professional activities (3)

IEEE: New York, NY, US

Senior member (Computer Science)
Membership
Source: Self-asserted source
B. Janet

NITT: Tiruchirappalli, Tamil Nadu, IN

2020-02-02 to 2022-02-02 | Lab coordinator of IoT Lab (Siemens Center of Excellence)
Invited position
Source: Self-asserted source
B. Janet

Government of India: New Delhi, New Delhi, IN

2021-01-19 | A MULTI-DIRECTIONAL DISPLAY DEVICE TO ENABLE ACTIVE USER SCREEN TIME AND METHOD THEREOF (Intellectual Property)
Distinction
Source: Self-asserted source
B. Janet

Works (50 of 84)

Items per page:
Page 1 of 2

Caviar-Sunflower Optimization Algorithm-Based Deep Learning Classifier for Multi-Document Summarization

The Computer Journal
2023 | Journal article
Contributors: Sheela, J.; Janet, B.
Source: check_circle
Web of Science Researcher Profile Sync

SDB-RGSO: Swarm-Based Data Balancing and Randomized Grid Search Optimization for IoT NetFlow Malware Detection with Ensemble Machine Learning Model

2023 | Book chapter
Contributors: D. Santhadevi; B. Janet
Source: check_circle
Crossref

EIDIMA: Edge-based Intrusion Detection of IoT Malware Attacks using Decision Tree-based Boosting Algorithms

2022 | Book chapter
Contributors: D. Santhadevi; B. Janet
Source: check_circle
Crossref

NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework

2022-11-22 | Book chapter
Contributors: D. Santhadevi; B. Janet
Source: check_circle
Crossref

Education Data Analysis using Ensemble Models

2022-01-20 | Conference paper
Contributors: Janet B; Joshua Arul Kumar R; Anisha Mitra; Titus S
Source: check_circle
Crossref

A deep learning based HTTP slow DoS classification approach using flow data

ICT Express
2021 | Journal article
Contributors: Muraleedharan, N.; Janet, B.
Source: check_circle
Web of Science Researcher Profile Sync

Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection

Peer-to-Peer Networking and Applications
2021 | Journal article
Contributors: Nirmal, K.; Janet, B.; Kumar, R.
Source: check_circle
Web of Science Researcher Profile Sync

Distinguishing malicious programs based on visualization and hybrid learning algorithms

2021 | Journal article
Source: check_circle
Web of Science Researcher Profile Sync

Flow-based machine learning approach for slow HTTP distributed denial of service attack classification

International Journal of Computational Science and Engineering
2021 | Journal article
Contributors: Muraleedharan, N.; Janet, B.
Source: check_circle
Web of Science Researcher Profile Sync

SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data

International Journal of Information Security and Privacy
2021 | Journal article
Source: check_circle
Web of Science Researcher Profile Sync

An abstractive summary generation system for customer reviews and news article using deep learning

Journal of Ambient Intelligence and Humanized Computing
2020 | Journal article
Source: Self-asserted source
B. Janet
grade
Preferred source (of 2)‎

Analysis of Inappropriate Usage of Cryptographic Primitives in Indian Mobile Financial Applications

Proceedings of International Conference on Computational Intelligence and Data Engineering
2020 | Conference paper
Part of ISBN: 978-981-15-8767-2
Source: Self-asserted source
B. Janet

Automated Cyber Threat Intelligence Generation from Honeypot Data

Lecture Notes in Networks and Systems
2020 | Journal article
Contributors: Sanjeev, Kumar; Janet, B.; Eswari, R.
Source: check_circle
Web of Science Researcher Profile Sync

Clustering Performance Analysis

FOURTH IBERIAN ROBOTICS CONFERENCE: ADVANCES IN ROBOTICS, ROBOT, VOL 2
2020 | Journal article
Source: check_circle
Web of Science Researcher Profile Sync

Deep convolutional network for urbansound classification

Sādhanā
2020 | Journal article
Contributors: Karthika, N.; Janet, B.
Source: check_circle
Web of Science Researcher Profile Sync

Deep Learning for Next-Generation Inventive Wireless Networks

2020 | Book chapter
Contributors: Nimmi K.; Varun G. Menon; Janet B.; Akshi Kumar
Source: check_circle
Crossref

Phishing Website Classification and Detection Using Machine Learning

International Conference on Computer Communication and Informatics
2020 | Conference paper
Contributors: Kumar, Jitendra; Santhanavijayan, A.; Janet, B.; Rajendran, Balaji; Bindhumadhava, B. S.
Source: check_circle
Web of Science Researcher Profile Sync

SECURITY CAPABILITY MATURITY MODEL FOR MOBILE APPLICATIONS

International Journal of Modern Agriculture
2020 | Journal article
Contributors: Majeti, Srinadh Swamy; Janet, Barnabas; Dhavale, Narendra P.
Source: check_circle
Web of Science Researcher Profile Sync

A novel data classifier using social spider optimization

International Journal of Innovative Technology and Exploring Engineering
2019 | Journal article
EID:

2-s2.0-85068166696

Contributors: Thalamala, R.; Janet, B.; Reddy, A.V.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

A novel deep neural network model for image classification

International Journal of Engineering and Advanced Technology
2019 | Journal article
EID:

2-s2.0-85072089143

Contributors: Karthika, N.; Janet, B.; Shukla, H.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

A novel deep neural network model for image classification

International Journal of Engineering and Advanced Technology
2019 | Journal article
Source: Self-asserted source
B. Janet

A Novel Deep Neural Network Model for Image Classification

‘International Journal of Engineering and Advanced Technology (IJEAT)
2019 | Journal article
Source: Self-asserted source
B. Janet

A novel variant of social spider optimization using single centroid representation and enhanced mating for data clustering

PeerJ Computer Science
2019 | Journal article
Source: Self-asserted source
B. Janet
grade
Preferred source (of 3)‎

Context ?sensitive sentimental based text summarization and classification based on the occurrence of trigger term in a sentence

International Journal of Engineering and Advanced Technology
2019 | Journal article
Source: Self-asserted source
B. Janet

Context –sensitive sentimental based text summarization and classification based on the occurrence of trigger term in a sentence

International Journal of Engineering and Advanced Technology
2019 | Journal article
EID:

2-s2.0-85069946747

Contributors: Sheela, J.; Janet, B.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

Feature Pair Index Graph for Clustering

Journal of Intelligent Systems
2019 | Journal article
EID:

2-s2.0-85060369718

Contributors: Karthika, N.; Janet, B.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

Feature Pair Index Graph for Clustering

Journal of Intelligent Systems
2019 | Journal article
Source: Self-asserted source
B. Janet

IMAGE FINCRYPTION AND DECRYPTION USING CHAOTIC SYSTEM

IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC)
2019 | Journal article
Contributors: Swathika, E.; Karthika, N.; Janet, B.
Source: check_circle
Web of Science Researcher Profile Sync

It's More Than Stealing Cookies - Exploitability of XSS

Proceedings of the 2nd International Conference on Intelligent Computing and Control Systems, ICICCS 2018
2019 | Journal article
Source: Self-asserted source
B. Janet

It's More Than Stealing Cookies - Exploitability of XSS

Proceedings of the 2nd International Conference on Intelligent Computing and Control Systems, ICICCS 2018
2019 | Conference paper
EID:

2-s2.0-85063813018

Contributors: Nirmal, K.; Janet, B.; Kumar, R.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

Multi Platform Honeypot for Generation of Cyber Threat Intelligence

IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC)
2019 | Journal article
Contributors: Kumar, Sanjeev; Janet, B.; Eswari, R.
Source: check_circle
Web of Science Researcher Profile Sync

Performance Comparison of Social Spider Optimization for Data Clustering with Other Clustering Methods

Proceedings of the 2nd International Conference on Intelligent Computing and Control Systems, ICICCS 2018
2019 | Journal article
Source: Self-asserted source
B. Janet

Performance Comparison of Social Spider Optimization for Data Clustering with Other Clustering Methods

Proceedings of the 2nd International Conference on Intelligent Computing and Control Systems, ICICCS 2018
2019 | Conference paper
EID:

2-s2.0-85063793083

Contributors: Chandran, T.R.; Reddy, A.V.; Janet, B.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

Sentiment Analysis of US Airlines Tweets using LSTM/RNN

IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC)
2019 | Journal article
Contributors: Monika, R.; Deivalakshmi, S.; Janet, B.
Source: check_circle
Web of Science Researcher Profile Sync

Smart City Applications

Novel Practices and Trends in Grid and Cloud Computing
2019 | Book
Source: Self-asserted source
B. Janet
grade
Preferred source (of 2)‎

The human body: A digital twin of the cyber physical systems

Advances in Computers
2019 | Journal article
Source: Self-asserted source
B. Janet

The human body: A digital twin of the cyber physical systems

Advances in Computers
2019 | Book chapter
EID:

2-s2.0-85073984677

Contributors: Barnabas, J.; Raj, P.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

Enhancing online security using selective DOM approach to counter phishing attacks

Concurrency and Computation: Practice and Experience
2019-10-22 | Journal article
Part of ISSN: 1532-0626
Part of ISSN: 1532-0634
Source: Self-asserted source
B. Janet
grade
Preferred source (of 3)‎

A Novel Deep Neural Network Model for Image Classification

‘International Journal of Engineering and Advanced Technology (IJEAT)
2019-08-02 | Journal article
Source: Self-asserted source
B. Janet

A Novel Data Classifier using Social Spider Optimization

International Journal of Innovative Technology and Exploring Engineering (IJITEE)
2019-06-01 | Journal article
Part of ISSN: 2278-3075
Source: Self-asserted source
B. Janet

A novel and efficient classifier using spiking neural network

The Journal of Supercomputing
2019-05 | Journal article
Source: Self-asserted source
B. Janet
grade
Preferred source (of 3)‎

A Novel Bio-Inspired Algorithm Based on Social Spiders for Improving Performance and Efficiency of Data Clustering

Journal of Intelligent Systems
2018 | Journal article
Source: Self-asserted source
B. Janet

A Novel Bio-Inspired Algorithm Based on Social Spiders for Improving Performance and Efficiency of Data Clustering

Journal of Intelligent Systems
2018 | Book
EID:

2-s2.0-85042349329

Contributors: Thalamala, R.C.; Venkata Swamy Reddy, A.; Janet, B.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

An analysis of the balance between security and utility of mobile applications

2018 International Conference on Circuits and Systems in Digital Enterprise Technology, ICCSDET 2018
2018 | Journal article
Source: Self-asserted source
B. Janet

An analysis of the balance between security and utility of mobile applications

2018 International Conference on Circuits and Systems in Digital Enterprise Technology, ICCSDET 2018
2018 | Conference paper
EID:

2-s2.0-85072827549

Contributors: Nimmi, K.; Janet, B.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

An effective implementation of Social Spider Optimization for text document clustering using single cluster approach

Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2018
2018 | Journal article
Source: Self-asserted source
B. Janet

An effective implementation of Social Spider Optimization for text document clustering using single cluster approach

Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2018
2018 | Conference paper
EID:

2-s2.0-85059854049

Contributors: Chandran, T.R.; Reddy, A.V.; Janet, B.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

Behaviour analysis of HTTP based slow denial of service attack

Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2017
2018 | Journal article
Source: Self-asserted source
B. Janet

Behaviour analysis of HTTP based slow denial of service attack

Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2017
2018 | Conference paper
EID:

2-s2.0-85046358982

Contributors: Muraleedharan, N.; Janet, B.
Source: Self-asserted source
B. Janet via Scopus - Elsevier

Performance analysis of information retrieval models on word pair index structure

Advances in Intelligent Systems and Computing
2018 | Journal article
Source: Self-asserted source
B. Janet
Items per page:
Page 1 of 2

Peer review (44 reviews for 26 publications/grants)

Review activity for Applied sciences. (3)
Review activity for Cluster computing. (2)
Review activity for Cluster computing. (1)
Review activity for Cogent engineering. (1)
Review activity for Computers & electrical engineering. (1)
Review activity for Computers & security. (2)
Review activity for Computers and electronics in agriculture. (2)
Review activity for Computers in biology and medicine. (1)
Review activity for Concurrency and computation. (1)
Review activity for Cybernetics and systems. (2)
Review activity for Electronics letters. (1)
Review activity for Future internet. (1)
Review activity for Healthcare. (2)
Review activity for IEEE access : (5)
Review activity for IET wireless sensor systems. (1)
Review activity for Intelligent transportation systems, IEEE transactions on. (3)
Review activity for International journal of artificial intelligence and machine learning. (4)
Review activity for International journal of environmental research and public health (2)
Review activity for International journal of information management data insights. (1)
Review activity for International journal of information retrieval research. (1)
Review activity for Journal of ambient intelligence & humanized computing (1)
Review activity for Journal of ambient intelligence and humanized computing. (1)
Review activity for Journal of experimental & theoretical artificial intelligence. (2)
Review activity for Journal of information security and applications. (1)
Review activity for Mathematics. (1)
Review activity for Symmetry. (1)