publication

S.NoYearTotal Number of PublicationsTotal Number of Journal PublicationsTotal Number of Conference Publication
12020241014
22019281513
3201840337
42017503218
5201632266
62015181602
S. No.AuthorsTitle of the paperName of the JournalVolumeIssueISSN
1M. Nikhitha, M.A. JabbarA Systematic Literature Review on Intrusion Detection System using Machine LearningRecent Advances in Electrical and Electronic Engineering1382352-0965
2A. Rajinikanth, M. A. JabbarLung cancer prediction using random forestRecent Patents on Computer Science1241874-4796
3Siddharth SelvarajanMining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithmIET Information Security911751-8717
4Rajanikanth A, Sangeetha GupthaTwitter based capital market analysis using cloud statisticsIJSKD1121941-6253
5Ashwani KumarDesign of secure image fusion technique using cloud for private preserving and copyright protectionInternational Journal of Cloud Applications and Computing (IJCAC)642156-1834
6Sangeeta Gupta,Ashwani KumarSecret Image Digitization Over Public Cloud Through Cbtv Based Image FusionInternational Journal of Innovative Technology and Exploring Engineering (IJITEE)8102278-3075
7Thimmapuram Madhuri,Gouse Baig MohammadA Supervised Learning Based Recommender System for Breast Cancer Prognosis in IndiaInternational Journal of Control and Automation1262005-4297
8Vanaja Malgari,Raman Dugyala.A Survey on Data Security in Distributed Cloud ComputingJournal of Emerging Technologies and Innovative Research652349-5162
9V.B.Pravalika,Nageswararao sirisalaDespeckling and Analysing Land Use Land Cover of Synthetic Aperture Radar ImageInternational Journal of Innovative Technology and Exploring Engineering8102278-3075
10Nageswararao sirisalaA Machine Learning way to Build Trust on Social NetworkInternational Journal of Engineering & Advanced Technology922249-8958
11Nikhitha, M.A,JabbarK nearest neighbor based model for intrusion detection systemInternational Journal of Recent Technology and Engineering822277-3878
12V.B.Pravalika,Nageswararao sirisalaA Survey on Despeckling Of Synthetic Aperture Radar ImagesInternational Journal of Computer Sciences and Engineering742347-2693
13Khan, Shahebaz Ahmed,M.A. JabbarPrediction of by-diseases in diabetic patients using associative classification with improved classifier accuracy for decision support systemInternational Journal of Engineering and Advanced Technology862249-8958
14Shahebaz Ahmed Khan,M.A.JabbarImproved classification techniques to predict the co-disease in diabetic mellitus patients using discretization and apriori algorithmInternational Journal of Innovative Technology and Exploring Engineering8112278-3075
15Shahebaz Ahmed Khan,M.A.JabbarCo-disease prediction in diabetic patients using ensemble learning for decision support systemInternational Journal of Recent Technology and Engineering832277-3878
16C.Kavitha, Nageswararao SirsilaTrust Computation in Online Social NetworksInternational Journal of Computer Science and Engneering742347-2693
17Nikitha Kumari, Prabhakar KandukuriDynamic Data Analysis and decision making on twitter dataInternational Journal of Innovative Technology and Exploring Engineering914010-4015
18Nikitha Kumari and Sangeeta GuptaComparative Analysis of Pre-Processed Social Media Data Generation in Modern WorldInternational Journal of Emerging Technologies and Innovative Research (JETIR)66199-203
19Mr. Gouse Baig Mohammad, Dr. Prabhakar KandukuriDetection of Position Falsification Attack in VANETs using ACOInternational Journal of Control and Automation126715-724
S. No.AuthorsTitle of the paperName of the ConferenceSponsered byPlace
1Ashwani KumarA Secure Technique of Image Fusion using Cloud based Copyright Protection for Data DistributionIEEE 8th International Advance Computing Conference (IACC)IEEEGreater Noida
2M. A. Jabbar, Rajanikanth ACyber security: Future Challenge for a safer and secure smart city 2nd Smart cities Symposium (SCS 2019)IETBahrain
3B Suresh KumarFacial Recognition using Aggregation and random classification methodICEATIndonasia
4A Rajini, M. A. JabbarA Survey on Lung Cancer prediction system using machine learningICECAIEEECoimbatore
5D. Raman, S. ShrawanA Novel Architecture to cloud based SCADA SystemsCON-RACS 2019DSTHyderabad
6G. S. Prasada ReddyData Analytics on Railway Disasters Information using python analytics library pandasInternational Conference on Engineering and Advancement in Technology (ICEAT)IEEEHyderabad
7P. B. Shailaja Rani,Ashwani KumarDigital Image Forgery Detection Techniques: A Comprehensive Review2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA)IEEE Coimbatore
8Ramu Kuchipudi,Ahmed Abdul Moiz Qyser,An Enhanced Efficiency of Key Management Method for Wireless Sensor Networks Using Mobile AgentsSpringer Advanced in Intelligent Systems and ComputingspringerHyderabad
9B MahaLakshmi,Ganesh Deshmukh, V.N.L.N MurthyImage Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm2019 Fifth International Conference on Image Information Processing (ICIIP)IEEEShimla
10Shrawan Kumar,S.Rajeswari,M SrikanthA New Approach for Authorship Verification Using Information Retrieval FeaturesLecture Notes in Networks and Systems Volume 74, 2019, Pages 23-29SpringerHyderabad
11Raghavendra Rao Sankaramanchi,V Kamakshi Prasad,Kumar chandra Singarapu,shrawan kumarIntegrating and introducing CERN and NCBI data science to understand quantum realm computationsApplied Nanotechnology and Nanoscience International Conference – ANNIC 2018 , Berlin GermanyIOP Conf. Series: Journal of Physics: Conf. Series 1310 (2019) 012010Berlin, Germany
12Sai Satyanarayana Reddy Seelam,Shrawan kumar,Chand M GopiA New Term Weight Measure for Gender and Age Prediction of the Authors by analyzing their Written Texts2018 IEEE 8th International Advance Computing Conference (IACC), Noida IndiaIEEE Noida
13Dr Raman Dugyala,N Hanuman Reddy,Shrawan KumarA Novel Architecture to Cloud based SCADA systemsCONRACS 2019Hyderabad
14K. Aishwarya, B. Suresh Kumar, Dr. S. Viswanadha RajuFacial Recognition using Aggregation and random forest classification methodInternational Conference on Physics and Photonics Processes in Nano SciencesIOP Conf. Series: Journal of Physics: Conf. Series 1310 (2019) 012010Berlin, Germany
S. No.AuthorsTitle of the paperName of the JournalVolumeIssueISSN
1D.VaishnaviLBP and GLCM based Image forgery recognitionInternatinal Journal of Engineering & Technology742394-6962
2Raman Dugyala,N.Hanuman ReddyDecentralized Secure Online Digital Data RegistrationsInternational Journal of Engineering & Technology742394-6962
3B.Suresh Kumar,Dr.H.Venkateswara ReddyData labeling method based on Cluster similarity using Rough Entropy for Categorical Data Clustering International Journal of Engineering & Technology742394-6962
4M.A.JabbarData Plane Security Slutions in a Mobile Adhoc Network:A SurveyJournal of Engineering and Applied Sciences136 1818-7803
5Dr.Akhil JabbarCo-Disease Prediction using Multileyer Perception and Classification from Diabetic Medical data setsInternational Journal of Engineering & Technology742394-6962
6M.A.JabbarThe Future of Health care:Machine LearningInternational Journal of Engineering & Technology742394-6962
7Seelam Sai Satyanarayana Reddy,M.A.JabbarFramework for Safe Direction -Finding for Protected Multimedia contents in Clud computing EmvironmentInternational Journal of Pure and Applied Mathematics118161314-3395
8Haripriya,M.A.Jabbar A Novel Intrusion Detection System Using Artificial Neural Networks and Feature subset selectionInternational Journal of Engineering & Technology742394-6962
9RajiniKanth Aluvalu,M.A.JabbarRiskaware Access control model for trust based collaborative organizations in cloud International Journal of Engineering & Technology742394-6962
10D.VaishnaviTowards Cloud of Things frm Internet of ThingsInternational Journal of Engineering & Technology 742394-6962
11D.VaishnaviVisual Feature Based Image Forgery DetectionInternational Journal of Engineering & Technology742394-6962
12V.Uma MaheswariLocal Directional Threshold based Binary Patterns for Facial Expression Recognition and AnalysisInternational Journal of Engineering & Technology742394-6962
13V.Uma MaheswariA Survey on Local Textural Patterns for Facial feature Extractioninternational Journal of Computer vision and Image Processing822155-6997
14V.Muni SekharContent-Aware Reversible Data Hiding:URHSSpringer
15B.Seetharamulu,M.A.JabbarPrediction of Breast Cancer using Big Data AnalyticsInternational Journal of Engineering & Technology742394-6962
16A.Bhanu prasadCmparative Study n Modern Approaches of Recommender SystemInternational Journal of Engineering & Technology742394-6962
17Rajanikanth AluvaluRisk aware Access Control model for Trust Based collaborative organizations in cloudInternational Journal of Engineering & Technology74.62394-6962
18Jabbar AkhilRisk aware Access Control model for Trust Based collaborative organizations in cloudInternational Journal of Engineering & Technology74.62394-6962
19G.Prased Reddy R-Language Based Analytics System For Monitoring Railway DisastersInternational Journal of Engineering & Technology74.62394-6962
20Vemula Harish R-Language Based Analytics System For Monitoring Railway DisastersInternational Journal of Engineering & Technology74.62394-6962
21M.A Jabbarcyber Pysical System For Smart Cities Development International Journal of Engineering & Technology74.62394-6962
22Rajanikanth Aluvalucyber Pysical System For Smart Cities Development International Journal of Engineering & Technology74.62394-6962
23shobaraniTravel data sequence from Multi-Source recommendation system International Journal of Engineering & Technology74.62394-6962
24Ravullan arun kumar Travel data sequence from Multi-Source recommendation system International Journal of Engineering & Technology74.62394-6962
25Dr.AnandamTravel data sequence from Multi-Source recommendation system International Journal of Engineering & Technology74.62394-6962
26shobarania study on techniques of facial recognization and IOT cam vulnerabilites :A survey International Journal of Engineering & Technology74.62394-6962
27Ravullan arun kumar a study on techniques of facial recognization and IOT cam vulnerabilites :A survey International Journal of Engineering & Technology74.62394-6962
28seelam nagarjuna reddya study on techniques of facial recognization and IOT cam vulnerabilites :A survey International Journal of Engineering & Technology74.62394-6962
29Rajanikanth AluvaluAn Recursiveor k fEffivient Parametric Model-Based Framework for recursive frequency/spectrum estimation of nonstionary signal International Journal of Engineering & Technology74.62394-6962
30mvv prasad An Recursiveor k fEffivient Parametric Model-Based Framework for recursive frequency/spectrum estimation of nonstionary signal International Journal of Engineering & Technology74.62394-6962
31Dr.Suresh An Recursiveor k fEffivient Parametric Model-Based Framework for recursive frequency/spectrum estimation of nonstionary signal International Journal of Engineering & Technology74.62394-6962
32Nagesware Rao Sirisala fuzzyic logic Aware QoS Multicadting in MANETs with load balance International Journal of Engineering & Technology74.62394-6962
33M.A Jabbar sensors In IoEInternational Journal of Engineering & Technology74.62394-6962
S. No.AuthorsTitle of the paperName of the ConferenceSponsered byPlace
1M.A.JabbarA Novel Intelligent ensemble ClassifierSoft Cmputing and Pattern Recognition SpringerHyderabad
2Ramesh ShahabadkarSecure Framework of Authentication Mechanism Over Cloud EnvironmentAdvances in Intelligent Systems and computingSpringerLviv, Ukraine
3RajiniKanth AluvaluA Survey on Access control Models in Cloud ComputingAdvances in Intelligent Systems and computingSpringerLviv, Ukraine
4M.A.JabbarA Novel Intelligent ensemble Classifier for Network Intrusion Detection SystemSoft Cmputing and Pattern Recognition SpringerHyderabad
5Sai Satyanarayana ReddyA New Term Weight measure for Gender and Age Prediction of the Authors by analyzing their Written texts2018 IEEE 8th International Advance Computing Conference (IACC)IEEEGreater Noida, India
6Ashwani kumarA Secure Technique of Image Fusion Using Cloud Based Cpyright Protection for Data Distribution 2018 IEEE 8th International Advance Computing Conference (IACC)IEEEGreater Noida, India
7A.BhanuPrasadAuthor Verification Using Rich Set of Linguistic FeaturesAdvances in Intelligent Systems and computingSpringerLviv, Ukraine.
S. No.AuthorsTitle of the paperName of the JournalVolumeIssueISSN
1K. SrinivasImproved Image Tamper localisation using chaotic maps and self-recoveryJ. Vis. Commun. Image R.6811047-3203
2S. Sai Satyanayana Reddy, Ch. MamathaContemporary supply chain and inventory data management using data analyticsInternational Journal of Machanical Engineering and Technology8120976-6340
3Y Vijayabhaskar ReddyEfficient web- information retrieval systems and web search engines: A SurveyInternational Journal of Machanical Engineering and Technology8120976-6340
4S. Sai Satyanayana Reddy, G. S. Prasada ReddyDrone control vehicle for prospective protective protected shippingInternational Journal of Civil Engineering and Technology880976-6308
5S. Sai Satyanayana Reddy, S. Nagarjuna ReddyFramework for efficient authentication mechanism for genuine users payload transmission in cybernetic locationsInternational Journal of Civil Engineering and Technology880976-6308
6B Suresh KumarCooperative coaching in remote P2P network frameworksInternational Journal of Applied Engineering Research12210973-4562
7S. Ramesh ShahbadkarEnhanced query expansion for web information retrievalInternational Journal of Civil Engineering and Technology880976-6308
8S. Ramesh Shahbadkar, S. Sai SatyanayanaSensor based vehicle motion recognition in portable computing machines for wireless networksInternational Journal of Machanical Engineering and Technology8120976-6340
9S. Ramesh ShahbadkarStratum based approach for securing multimedia content transmission over large scale P2PInternational Journal of Computer Applications4211206-212X
10M. A. JabbarPrediction of heart disease using k-nearest neighbor and particle swarm optimizationBiomed Res-India2890970-938X
11M. A. JabbarImproved Image Tamper localisation using chaotic maps and self-recoveryImperial Journal of Interdiciplinary Research (IJIR)372454-1362
12S. Ramesh ShahbadkarE-Market revolution using Internet of Things device in cloud payment management International Journal of Machanical Engineering and Technology8120976-6340
13S. Nageshwar Rao Sirisalapreserving user privacy in location - based services on mobile applicationsInternational journal of research4142348 - 6848
14S. Nageshwar Rao SirisalaSignificantly extending the network lifetime by using secure and energy efficient protocolIJSRSET382394-4099
15K. srinivasFragile watermwrking schemes for image authentication: a surveyInt. J. Mach. Learn. & Cyber
16Rajanikanth AluvaluHandling classrooms with students having heterogeneous learning abilitiesJournal of engineering education transformations3032349-2473
17M Pravarsha ReddyPolicies, processes, procedures and measurement in software quality assurance: A State-of-art surveyIJISET472348-7968
18A RameshLoad balancing technique in cloud computing environmentIJMET8120976-6340
19Raman DugyalaA Road map to security in IoTIJAER12190973-4562
20Vaishnavi DarmalingamIllusion map based image splicing detectionInternational Journal of Control Theory Applications29745-572
21G. S. Prasada ReddyR - Language based analytics system for monitoring railway disastersInternational Journal of Engineering and Technology912227-524X
22P. Buddha ReddyEfficient multifarious plans used in wireless mesh networksInternational Journal of Civil Engineering and Technology8120976-6308
23P. Buddha ReddyAnalysis of big data with neural networkInternational Journal of Civil Engineering and Technology8120976-6308
24V. AnandamProcurement interaction minimize test arrangement formation of software testing using Cuckoo search methodsInternational Journal of Engineering and Technology912227-524X
25Ch SravanSurvey on security issues in platform-as-a-service methodInternational Journal of Computer Science and Mobile Computing642320-088X
26S Sai satyanarayana Reddy, S. Ramesh ShahbadkarSensor based spontaneous water level recognition in smart cities environmentInternational Journal of Civil Engineering and Technology8120976-6308
27S Sai satyanarayana ReddyA dynamic programming approach to data discovery and analysis of big dataInternational Journal of Civil Engineering and Technology8120976-6308
28S. VenogopalApplying load separation method in structured peer to peer overlay networks IJESC6122321-3361
29S. Nageshwar Rao SirisalaPreserving user privacy in location-based services on mobile applicationsInternational Lournal of research4142348-795X
30G. Mallikarjuna Reddy, V. Harish KumarPre processing in big data analytics usng regular expressionsIJSETR642278-7798
31M. A. Ranjith KumarVarious task scheduling algorithms in cloudsInternational Journal of Engineering and Management Research722394-6962
32V. AnandamAn efficient auditing scheme for shared data with supporting multicloudInternational Journal of Advanced research and Innovation822319-9253
S. No.AuthorsTitle of the paperName of the ConferenceSponsered byPlace
1M.A.Jabbar, A. Rajanikanth, S. Sai Satyanarayana Reddycluster based ensemble classification for intrusion detection systemICMLC 9th international conference on machine learning and computingACMSingapore
2Sagar Gujjunoori, S. Sai Satyanarayana Reddy, Gouthaman K VTracking and size estimation of objects in motionInternational conference on machine vision and information technologyIEEE
3Dr. S. Sai Satyanarayana ReddyTowards an extensible Web Usage Mining Framework for Actionable KnowledgeInternational conference on inventive communication and computational technologies IEEE
4Prabhakar K, A. Ananda Rao, K. Venu Gopala Rao, S. S. Satyanarayana Reddy, M. GopichandCost effective model based regression testingWorld congress on engineering WCELondon
5Murlidher Mourya, Ganesh DeshmukhSelecting the factors to predicate school failure by using Data Mining techniquesNational conference on emerging trends in computer engineering and technologyMIT AOE Alandi(D)Pune
6Medha LoharEmergency blood requirement systemNational conference on emerging trends in computer engineering and technologyMIT AOE Alandi(D)Pune
7Ganesh Deshmukh, Murlidhar MouryaFibonacci search tree of order 'N' construction and implementation National conference on emerging trends in computer engineering and technologyMIT AOE Alandi(D)Pune
8M.A.Jabbar, A. Rajanikanth, S. Sai Satyanarayana ReddyRFAODE: A novel ensemble intrusion detection system7th International conference on advances in computing & communicationsELSEVIER
9Rajanikanth Aluvala , M.A.Jabbarperformance evaluation of clustering algorithms for dynamic VM allocation in cloud computing2017 International conference on smart technology for smart nationIEEE
10M.A.Jabbar, Rajanikanth AluvalaSmart cities in india: are we smart enough?2017 International conference on smart technology for smart nationIEEE
11Indu Yekkala, M.A.Jabbarprediction of heart disease using ensemble learning and particle swarm optimization2017 International conference on smart technology for smart nationIEEE
12Bruhadeshwar Bezawada, Kishore kothapalli, Dugyala Ramansymmetric key based secure resource sharingSPRINGERsingapore
13Dugyala Raman, Bruhadeshwar Bezawada, T.V.Rajinikanthstatic program behavior tracing for program similarity quantificationfirst international conference on computational intelligence and informatics, advances in intelligent systems and computingSPRINGERsingapore
14M.A.Jabbar, Ghanshyam S. Bopche, B.L.Deekshatuludiversity-aware, cost-effective network security hardening using attack graphSPRINGERsingapore
15M.A.Jabbar, Rajanikanth Aluvala, S.Sai Satyanarayana Reddyintrusion detection system using bayesian network and feature subset selectionIEEE International conference on computational intelligence and computing researchIEEE
16CH.Krishna Keerthi, M.A.Jabbar, B.Seetharamulucyber physical systems(CPS): Security issues, challenges and solutionsIEEE International conference on computational intelligence and computing researchIEEE
17M.A.Jabbarcountermeasures for conflicting behavior attack in a trust management framework for a mobile Ad hoc networkIEEE International conference on computational intelligence and computing researchIEEE
18R. Arun KumarSecurity concerns and Issues in wireless Sensor Networks, Network Attacks and measure using Symmetric and Asymmetric keys: A Technical ReviewInternational Journal of Science and Innovative Engineering & Technology
S. No.AuthorsTitle of the paperName of the JournalVolumeIssueISSN
1Nagarjuna Reddy Seelam, Sai satyanarayana Reddy Seelam Babu Reddy MukkalaOptimal Decision Tree Based Unsupervised Learning Method for Data Clusteringinaas102DOI: 10.22266/ijies2017.0430.14
2Prashanthi Muddam, D.RamanGraphical Password Authentication for Secure Online Servicesirjet38 2395-0056
3Nageswararao Sirisala, C.Shoba BinduRecommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc NetworksIJCNIS83NA
4Usha Sree, S.Nageshwara RaoQoS Based Routing In MANETsIJCNWC64 2250-3501
5Nageswara Rao Sirisala, C.Shoba BinduA Novel QoS Trust Computation in MANETs Using Fuzzy Petri Netsinaas102DOI: 10.22266/ijies2017.0430.13
6RajaniKanth Aluvalu, Tirthraj ChauhanCrime Predictive Model Using Big Data AnalyticsAnale. Seria Informatica142NA
7RajaniKanth Aluvalu, Lakshmi MuddanaRisk Aware Hierarchical Attribute Set-Based Encryption (RA-HASBE) Access Control ModelAnale. Seria Informatica1422349-2473
8KMVV Prasad, RajaniKanth AluvaluBenefits and challenges of Open Book Examination as Assessment Model for Engineering CoursesJEET 2394-1707
9Dharmalingam Vaishnavi, T.S. SubashiniA Secure Robust Image Watermarking System Using Normalization and Arnold ScramblingIJONS185832-841
10CH Sravan Kumar, P Buddha Reddy, K SrinivASStorage and Computation on Big Data: A Comparative Studycomputerscience91 0974-6471
11P. Buddha Reddy, CH Sravan Kumar, K. SrinivasA Simplified Data Processing in MapReduceIJCSIT730975-9646
12s Shoba Rani, Dr. D. Nagendra Rao, Dr. S Vastal, R. ChennakeshavuluA novel approach on memory less BFGS neural network training algorithmIOSR-JCE18692-94
13Morthala Sravani, Para Upendar, V. SudharshanA Survey on Distortion Resistant Routing Framework in Wireless Multi Hop NetworksIJRECS562321-5485
14Dr. V. AnandamEfficient Study of Domain-Based Transactions Ranges Program MechanismIJCST720976-8491
15V. Vijaya Bhaskara Reddy, D. Rammohan Reddy, Devarasetti BikshaluUser Data Pattern Discovery and Pre-Processing and Pattern AnalysisIJSETR514 2319-8885
16B. Seetharamulu, Dr. G. V. UmaSecure Data Access in P2P Cloud Using ABACAIJSH662249-7315
17B. Seetharamulu, G.V. UmaAttribute Base Access Control to Secure the Patient Health Record in CloudAJOIT1511682-3915
18G. Mallikarjuna Reddy, N. AnilBabu, R. ArunKumar, Ganesh DeshmukhMaintenance and Understandability of Aspect Oriented ProgrammingIJCTT3622231-2803
19G. Mallikarjuna Reddy, Ganesh Deshmukh, R. ArunKumar, N. AnilBabuEnhanced Big Data Quality Ftrame WorkIJCSIT730975-9646
20Y.Vijaya Bhaskar Reddy, S. Nagarjuna Reddy, K.Kotaiah SwamyA Novel Approach to Data Discovery and Analysis of Big Dataijsetr5142319-8885
21B.Mahalakshmi, Ch.Sravan KumarAn Overview in Disrupted Transposition Cipher for Security Enhancementijoca143230975-8887
22S. Nagarjuna Reddy, Y.Vijaya Bhaskar ReddyA Mechanism for Providing Security to Data in Cloud Based on Range Query ProcessingIJCTER252455-1392
23K.Samata, A.Bhanu PrasadAn Efficient Scalable System of Botnet Detection for Efficient Transmission of Dataijsetr5202319-8885
24Anvesh K, CH Sravan KumarLock based QOS Aware Data Fusion in MANETSIJCTT3622231-2803
25Y.Indu, V.Uma MaheswariContext Aware Similarity Measure Selection: Mining of Wearable Implantable Body Sensor Network Data with Logical ReasoningIJETNANA0975-4024
26Upendar PaaraGroup Key Agreement with Local ConnectivityIJSETR517 2319-8885
S. No.AuthorsTitle of the paperName of the ConferenceSponsered byPlace
1Ramesh Shahabadkar Mukesh KamathDiagnosis of Compromised Accounts for Online Social Performance Profile NetworkWiSPNETRNS Institute of TechnologyBangalore
2Dr. H. Venkateswara ReddyB. Suresh KumarDr. S. Viswanadha RajuData labeling method based on Cluster similarity using Rough Entropy for Categorical Data ClusteringITBCMSIndia
3Dr. V. AnandamEffective Information Retrieval SystemNC-DATES2K16CMR ENGINEERING COLLEGEHyderabad
4D. Vaishnavi Dr. T. S. SubashiniRecognizing Image Splicing Forgeries using Histogram Features3rd MEC IC on Big Data and Smart City
5RajaniKanth Aluvalu Lakshmi MuddanaA Dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computingComputational Intelligence and Computing Research
6Nabila Farnaaz M.A. JabbarRandom Forest Modeling for Network Intrusion Detection SystemInformation ProcessingIndia
S. No.AuthorsTitle of the paperName of the JournalVolumeIssueISSN
1Prof.V.AnandamComponent Based Software Engineering SystemsIJERA2248-9622
2N Maanasa MR D RamanDefense Against Cross-site Request Forgery VulnerabilitiesIJOEET23
3K. Suma Rani D. RamanA Study of Cross Site Scripting Compulsion Against Web ApplicationsIJOEET23
4Nageswara Rao Sirisala C. Shoba BinduFuzzy Based Quality of Service Trust Model for Multicast Routing in Mobile Adhoc NetworksIJOAER10120973-4562
5V. AnandamSoftware Quality ManagementIJARCSSE572277- 128X
6Manadhi Santhosh Kumar S. VenugopalRobust Technique For Background Subtraction Using K-Means AlgorithmIJESR552277-2685
7V.Sachin S. VenugopalAn Efficient And Delay Tolerant Peer-To-Peer File Sharing In Disconnected MANETSIJESR552277-2685
8D.Mahalakshmi K.Aruna D.VaishnaviA Denoising Framework Using Linear And Non-Linear FiltersIJOAER10510973-4562
9A Nagendraiah, B. SureshkumarAllocating The Appliance Dynamically For Cloud Using Virtual RepositoryIJESR55 2277-2685
10R.Kireeti S.Shoba RaniThird Party Auditing For Secure Cloud StorageIJRCSE522321-5585
11Raju, Pooja SrivastvasCloud Computing on Virtual Drivers in Cloud Online Services using Data Theftijatir7122348-2370
12Raju S. Shalini, Pooja SrivastvasFast Data Collection for High Dimensional Data in Data MiningIJR282348-6848
13B.Seetharamulu, Dr. G.V. UmaRanked Query Support in Untrusted Cloud without Reveal Sensitive DataIJOCEIRT252349-7084
14B.Seetharamulu,Dr. G.V. UmaCloud Storage Using Convergent Encryption TechniqueIJOAER10790973-4562
15D.Vaishnavi, T.S.SubashiniFragile Watermarking scheme based on Wavelet Edge Features JEET1975-0102
16Mr. Murlidher Mourya, Mr. J. Phani PrasadA Study on Market Basket Analysis using Data-set Considering and Intersection PruningIJARCCE472278-1021
S. No.AuthorsTitle of the paperName of the ConferenceSponsered byPlace
1Nageswararao Sirisala, C.Shoba BinduUncertain Rule Based Fuzzy QoS Trust Model in MANETsAdvanced Computing and CommunicationsIEEEIndia
2Prof. V. AnandamComponent Based Software Engineering SystemsDevelopments, Advances & Trends in Engineering SciencesSPRINGERHyderabad