BOOKS

  • “Password Authentication Using Associative Memories -A Probabilistic Approach”, Lap Lambert Academic Publishing, Germany, 2012, ISBN: 978-3-659-26797-0.
  • “Crypto Authentication Using Hilbert Matrices-A Novel Approach”, Lap Lambert Academic Publishing, Germany, 2014, ISBN: 978-3-8473-4755-2.

Conferences

S.No. Publication Title Details of the Conference Type
1 Extended Alternate Heterogeneous Earliest Finish Time Algorithm Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-09. National
2 Internet Protocol Security (IPSec) Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-25. National
3 Evaluating the Effectiveness of Personalized Web Search AICTE Sponsored National Conference on – High Performance Computing and Networking, 13th-14th August 2011, Rajampet, Andhra Pradesh, India. National
4 Password Authentication using Context-Sensitive Associative Memory Neural Networks: A Novel Approach Proceedings of Springer Lecture Notes of the LNICST-85 Series, part-II, pp. 464–478 at the CCSIT 2012, in January 2012 held at Bangalore, India. International
5 Protocol Sensor Based Embedded Technique for Efficient Water-Saving Agriculture Proceedings of ACNCN2012 conference on advances in communication, navigation and computer networks 17th -18th March, 2012, A.U, Visakhapatnam. National
6 A Multi Cloud based Approach to Enhance data Security and Availability in Cloud Storage Proceedings of International Conference on ComNet CIIT & ITC 2013, pp.58-63. (Published by Elsevier, with ISBN 978-81-910691-6-3), Organized by ACEEE, in Hyderabad from 08th -09th November 2013. International
7 Analysis of Cyber-Criminal Profiling and Cyber-Attacks: A Comprehensive study 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
8 An Innovative Progress Approach for Quantity Mining of item sets 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
9 An Integrated Approach to Provide Security and Resist Thefts on Digital Data 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
10 Cloud Forensics: The Need and Challenges A Research & Fact Compendium 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International
11 Implementation of X.509 Attribute Certificates for Cloud Environments 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International
12 A Unified Model for Cherishing Privacy in Database System: An Approach to Overhaul Vulnerabilities First International Conference on Networks & Soft Computing,2014, organized by Vignan’s Foundation for Science, Technology & Research, Guntur, Andhra Pradesh with the Technical Sponsorship of IEEE Hyderabad Section during 19th -20th August 2014(ISBN-978-1-4799-3486-7/14). International
13 Enhanced DES Algorithm International Conference on Recent Trends and Research Issues in Computer Science and Engineering, held during 02nd – 03rd May 2015 International
14 Information Security using Genetic Algorithm with Penultimate and Least Significant Bits Fifth International Conference on Advances in Information Technology and Mobile Communication – AIM 2015, held during  11th -12th July 2015, Bangalore, India. International
15 MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity Thefts 4th World Conference on Applied Sciences, Engineering & Technology 24-26 October 2015, Kumamoto University, Japan (ISBN13:978-81-930222-1-4). International
16 Accelerating SQL Queries by Unravelling Performance Bottlenecks in DBMS Engine IEEE International Conference on Energy Systems and Application (ICESA – 2015) 30th October to 01st November 2015, DYPIET Pimpri, Pune India International
17 Electronic Noses: Forestalling Fire Disasters: A Techniques to Prevent False Fire Alarms and Fatal Casualties 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), held during 10th -12th December 2015 at Vickram College Of Engineering, Madurai, Tamilnadu, India. International [IEEE Xplore, SCOPUS,]
18 A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks International Conference on Computational Intelligence and Informatics-2016(ICCII-2016), held during May 28th-30th , 2016 organized by Dept. of CSE, JNTUH College of Engineering, Hyderabad, India. International
19 Revamping SQL Queries for Cost Based Optimization International Conference on Circuits, Controls, Communication and Computing ( I4c-2016),held during 4th-6th October 2016 at M.S.Ramaiah Institute of Technology, Bangalore,India International
20 Cognitive Perceptive Framework with Gait Recognition Technology 2nd International Conference on Next Generation Computing Technologies (NGCT-2016), Dehradun, India, 14-16 October 2016 International (SCOPUS Indexed) 
21 Bypassing Android Pattern Lock and Analysis IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), held during 15th-17th of December, 2016 at Agni College of Technology Old Mahabalipuram Road, Thalambur, Chennai – 600 130, Tamil Nadu, India  International
22 Forensics Analysis of Android Mobile Devices II International Conference  on Recent Advances and Innovations in Engineering (ICRAIE2016), 23-25, December – 2016, Poornima College of Engg., Jaipur, India, Sponsored by IEEE Delhi Section International (SCOPUS Indexed)
23 Inhibiting Cognitive Bias in Forensic Investigation Using DNA Smart Card with IO II International Conference on Sustainable Computing Techniques in Engineering, Science and Management (SCESM 2017) International (SCOPUS Indexed) 
24 Evolution of Higher Education in India: Ancient to Golden Era University News: A Weekly Journal of Higher Education January 30-Febraruary 05, 2017 by Association of Indian Universities, Volume 55 N0. o5. ISSN-0566-2257 National

JOURNALS

S.No. Publication Title Details of the Journal Type
1 A Probabilistic Approach For Authenticating Text or Graphical Passwords Using Back Propagation International Journal Of Computer Science And Network Security (IJCSNS), VOL.11 No.5, May 2011, pp. 242-251. International
2 A Study on Back Propagation Models through Hidden Units Advances in Computational Sciences and Technology (ACST) ISSN 0973-6107 Volume 4 Number 2 (2011) pp. 213-227. National
3 A Novel Approach For Intranet Mailing For Providing User Authentication International Journal of Computer Science and Information Security (IJCSIS), pp. 158-163,Vol. 9, No. 6, June 2011. International
4 A Novel Approach For Authenticating Textual Or Graphical Passwords Using Hopfield Neural Network Advanced Computing: An International Journal (ACIJ), pp. 33-46, Vol.2, No.4, July 2011. International
5 A Cryptosystem Based On Hilbert Matrix Using Cipher Block Chaining Mode International Journal of Mathematics Trends and Technology (IJMTT), pp. 17-22, July to Aug Issue 2011. International
6 Handwritten Text Image Authentication Using Back Propagation. International Journal of Network Security & Its Applications (IJNSA), pp.121-130, Vol.3, No.5, Sep 2011. International
7 Hilbert Matrix Based Cryptosystem Using A Session Key International Journal of Engineering Research and Applications (IJERA) Vol. 1, Issue 3, pp.711-715 Sep-Oct 2011. International
8 A Novel Approach for Pass Word Authentication using Brain -State -In -a Box (BSB) Model International Journal of Computer Science and Information Technologies (IJCSIT), pp. 2127-2131, Volume 2 Issue 5 September-October 2011. International
9 A Novel Approach for Pass Word Authentication Using Bidirectional Associative Memory Advanced Computing: An International Journal (ACIJ), pp.123-135, volume 2 No. 6, November2011. International
10 Performance Evaluation of Password Authentication using Associative Neural Memory Models International Journal of Advanced Information Technology (IJAIT) Vol. 2, No.1, pp. 75-85, February 2012. International
11 Security Evaluation of Online Signature Verification System using Webcams International Journal of Computer Applications (0975 – 8887) Volume 41– No.15, pp. 28-33,March 2012. International (0.814IF)
12 A Novel Approach for Enhancing Security in Smart Cards using Biometrics International Journal of Computer Applications (0975 – 8887) Volume 42– No.8, pp.38-42, March 2012. International (0.814IF)
13 A Novel Method for Enhancing Biometric Systems Security using Watermarking Global Journal of computer application and technology GJCAT, Vol 2 (1), 2012, 969-976, ISSN: 2249-1945. International
14 Security Evaluation of Finger Print based Authentication Systems Global Journal of computer application and technology(GJCAT), Vol 2 (1), 2012, 986-992, ISSN: 2249-1945. International
15 User Authentication in ATM Using Fingerprint Biometrics Global Journal of computer application and technology GJCAT, Vol 2 (1), 2012, 993-996, ISSN: 2249-1945. International
16 A Novel Method of SAR Image Regularization with Fast Approximate Discrete Minimization Advances in Digital Multimedia (ISSN 2166-2916) 64-79, Vol. 1, No. 2, June 2012. International (Free)
17 Novel Approach for the propagation and detection of active worm in a Virtual System Advances in Computer Science and its Applications (ISSN 2166-2924) 146-150,Vol. 1, No. 1, March 2012, Copyright ©World Science Publisher, United States. International (Free)
18 Survey on Computer Crime Scene Investigation Forensic Tools International Journal of Computer Trends and Technology (IJCTT)- volume3, pp. 278-281, Issue2- 2012. International
19 Document Clustering in Web Search Engine International Journal of Computer Trends and Technology (IJCTT)- volume3, pp. 290-293,Issue2- 2012. International
20 Evaluation of Watermarking Techniques International Journal of Mathematics Trends and Technology (IJMTT)- Volume3, pp. 82-85, Issue2- 2012. International
21 CRT and ART Based Watermarking Scheme in DCT Domain International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, April 2012. International
22 Survey on Hard Disk Duplication Advances in Mechanical Engineering and its Applications,pp.17-21,Vol. 1, No. 2, 2012, World Science Publisher, United States. International (Free)
23 Enhancing Security of Biometric Systems using Watermarking International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-12/269-275. International
24 Security Evaluation of Signature Recognition System International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-7/222-230. International
25 Security Evaluation of Finger print based Authentication Systems International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/158-175. International
26 Improve QOS In Wireless Sensor Network By Using BPA Algorithm International Journal of Advances in Science and Technology, Vol. 4, No.3, pp. 38-48 , March 2012. International (Free)
27 ARM Based USB Flash Drives for Data Communication Without using USB Cables and USB Ports Advances in Computer Science and its Applications (ACSA),pp. 228-230,Vol. 1, No. 3, 2012. International (Free)
28 Design of an Intelligent Spy Robot for Military Based Appliances International Journal of Computer Information Systems(IJCIS), Vol. 4, No.5, pp. 1-5,May 2012. International
29 A Survey on Password Authentication Using Gödel Number International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp. 534-538. International
30 Design of a Rescue Robot Assist at Fire Disaster International Journal of Computer Applications(IJCA) (0975 – 888) Volume 47– No.10, pp.25-30, June 2012. International (0.814 IF
31 CDMA and MAI Problem Elimination Methods International Journal of Scientific and Research Publications(IJSRP), Volume 2, Issue 7, pp.1-13,July 2012. International
32 A Novel Approach of Techniques for Building Intrusion Tolerant Server Systems International Journal of Research in Engineering Science & Technology (IJREST),Volume 1, Issue 1, pages,1 – 5,July-August 2012. International
33 A Survey On Keystroke Authentication By Using Local Search Algorithm Journal of Engineering Research and Applications (IJERA),Vol. 2, Issue 5, September- October 2012, pp.256-259. International
34 A Novel Approach of Intrusion Detection using Classification Rules International Journal of Advanced Computer Communications and Control Vol. 01, No. 01, December 2012, pp. 19-21. International
35 An Enhanced Multilevel Authentication Scheme Using Graphical Passwords International Journal of Engineering Sciences & Emerging Technologies, June 2013, Volume 5, Issue 2, pp.104-118. International (0.51 IF)
36 A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords International Journal of Computer Applications (0975 – 8887),Volume 71– No.10, May 2013, pp. 42-54. International (0.8 IF)
37 An Enhanced Mutual Authentication Scheme Using One Time Passwords International Journal of Computer Networks and Security, ISSN: 2051-6878, Vol.,23 Issue.1,pp. 1113-1122. International (2.51IF)
38 A Novel Timer and Counter Synchronized Challenge-Response Based One-Time Password Authentication International Journal of Computer Networks And Security, ISSN: 2051-6878, Vol.23, Issue.1, pp. 1123-1128. International (2.51IF)
39 Improving the message capacity by using CDMA Watermarking Scheme Advances in Computer Science and its Applications (ACSA) Vol. 2, No. 3, 2013, ISSN 2166-2924. International
40 BSC: A Novel Scheme for Providing Security using Biometric Smart Card International Journal of Computer Applications (0975 – 8887) Volume 80 – No1, October 2013 International (0.8 IF)
41 A Novel Symmetric Key Cryptography using Multiple Random Secret Keys International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013 International (0.8 IF)
42 A Fusion of PLSB and SVD based Image Watermarking Approach International Journal of Advanced Computer Communications and Control, Volume 02, No. 02, April 2014 International
43 An Evolution of the Pixel Embedding Techniques in Image Based Adaptive Steganography Journal of Web Engineering & Technology  (JoWET), Volume 1, Issue 1, Jan-April 2014, pp.1-18. International
44 Prevention of Fire Accidents In Villages Using Wireless Sensor Networks International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, pp. 3968-3971. International (2.9 IF)
45 Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions International Journal of Computer Applications (0975 – 8887), Volume 112 – No. 9, February 2015 International (0.8 IF)
46 Analysis of Canonical Character Segmentation Technique for Ancient Telugu Text Documents Journal of Theoretical and Applied Information Technology, 20th December 2015. Vol.82. No.2, pp. 311-320 International Scopus Indexed
47 Performance Evaluation Of Quantitative Metrics on Ancient Text Documents Using MIGT Journal of Theoretical and Applied Information Technology ,31st December 2015. Vol.82. No.3 pp. 360-365 International Scopus Indexed
48 Gesture Recognition Technology to Annihilate Burglaries amid ATM Transactions International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 08 | Dec-2015, pp. 2293-2297 International
49 Optical Character Recognition Technique Algorithms Journal of Theoretical and Applied Information Technology,20th January 2016. Vol.83. No.2, p.p275-282 International Scopus Indexed
50 A Study on Developing Groundwater Information System (GWIS) for Sustainable Management of Groundwater Resources-A Case Study from Visakhapatnam Urban Region International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 2185-2190. International (6.39 IF)
51 Variable Modulation Schemes for AWGN Channel based Device to Device Communication Indian Journal of Science and Technology, Vol 9(20), May 2016, pp.1-6. International Scopus Indexed
52 Design of WSN based Water Quality Monitoring System in a Mining District International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp.1183-1188. International (6.39 IF)
53 Providing A Secure Group Communication By Using A Novel Key Transfer Protocol and by Generating Multiple Session Keys International Journal of Advance Research in Science and Engineering (IJARSE), Volume 5 Issue 10, October 2016, pp.36-45. International (2.83 IF)
54 Survey on Android Forensic Tools and Methodologies International Journal of Computer Applications (0975 – 8887) Volume 154 – No.8, November 2016 International (0.8 IF)
55 A Hybrid Cryptographic System for Secured Device to Device Communication International Journal of Electrical and Computer Engineering (IJECE), Volume 6, No 6: December 2016,pp. 2962~2970 International Scopus Indexed
56 Evolution of Higher Education in India: Ancient to Golden Era University News: Association of Indian Universities, Volume 55 N0. 05, January 30-Febraruary 05 2017. National
57 Utilization of SC-FDMA And OFDMA Based Uplink and Downlink Resources In LTE-A Network Assisted Device To Device Communication For Effective Spectrum Management ARPN Journal of Engineering and Applied Sciences, VOL. 12, NO. 5, MARCH 2017 International Scopus Indexed