BOOKS

  • “Password Authentication Using Associative Memories -A Probabilistic Approach”, Lap Lambert Academic Publishing, Germany, 2012, ISBN: 978-3-659-26797-0.
  • “Crypto Authentication Using Hilbert Matrices-A Novel Approach”, Lap Lambert Academic Publishing, Germany, 2014, ISBN: 978-3-8473-4755-2.
  • Hadoop & R Language, Shree Publishing House, India, 2019, isbn:978-938-819-640-6

CONFERENCES 

S. No. Publication Title Details of the  Conference   Type
1. Extended Alternate  Heterogeneous Earliest Finish Time Algorithm Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-09. National
2. Internet Protocol Security (IPSec) Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-25. National
3. Evaluating the Effectiveness of Personalized Web Search AICTE Sponsored National Conference on – High Performance Computing and Networking,13th-14th August 2011, Rajampet, Andhra Pradesh, India. National
4. Password Authentication using Context-Sensitive Associative Memory Neural Networks: A Novel Approach Proceedings of Springer Lecture Notes of the LNICST-85 Series, part-II, pp. 464–478 at the CCSIT 2012, in January 2012 held at Bangalore, India. International
5. Protocol Sensor Based Embedded Technique for Efficient Water-Saving Agriculture Proceedings of ACNCN2012 conference on advances in communication, navigation and computer networks 17th -18th March, 2012, A.U, Visakhapatnam. National
6. A Multi Cloud based Approach to Enhance data Security and Availability in Cloud Storage Proceedings of International Conference on ComNet CIIT & ITC 2013, pp.58-63.    (Published by Elsevier, with ISBN 978-81-910691-6-3), Organized by ACEEE, in Hyderabad from 08th -09th November 2013. International
7  Analysis of Cyber-Criminal Profiling and Cyber-Attacks: A Comprehensive study  3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th   Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
8  An Innovative Progress Approach for Quantity Mining of item sets 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th   Sept.  2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
9  An Integrated Approach to Provide Security and Resist Thefts on Digital Data 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th   Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
10  Cloud Forensics: The Need and Challenges A Research & Fact Compendium 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th   Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International
11  Implementation of X.509 Attribute Certificates for Cloud Environments 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th   Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International
12 A Unified Model for Cherishing Privacy in Database System: An Approach to Overhaul Vulnerabilities First International Conference on Networks & Soft Computing,2014, organized by Vignan’s Foundation for Science, Technology & Research, Guntur, with the Technical Sponsorship of IEEE Hyderabad Section during 19th -20th  August 2014(ISBN-978-1-4799-3486-7/14). International(IEEE)
13 Enhanced DES Algorithm International Conference on Recent Trends and Research Issues in Computer Science and Engineering, held during 02nd – 03rdMay 2015. International
14 Information Security using Genetic Algorithm with Penultimate and Least Significant Bits Fifth International Conference on Advances in Information Technology and Mobile Communication – AIM 2015,  held during  11th -12th  July 2015,  Bangalore, India. International
15 MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity Thefts 4th World Conference on Applied Sciences, Engineering & Technology 24-26 October 2015, Kumamoto University, Japan (ISBN13:978-81-930222-1-4). International
16 Accelerating SQL Queries by Unravelling Performance Bottlenecks in DBMS Engine IEEE International Conference on Energy Systems and Application (ICESA – 2015) 30th     October to 01st    November 2015, DYPIET Pimpri, Pune India. International(IEEE)
17 Electronic Noses: Forestalling Fire Disasters: A Techniques to Prevent False Fire Alarms and Fatal Casualties 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), held during 10th -12th December 2015 at Vickram College Of Engineering, Madurai, Tamilnadu, India. InternationalInternational(IEEE Xplore, SCOPUS)
18 A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks International Conference on Computational Intelligence and Informatics-2016(ICCII-2016), held during May 28th-30th , 2016 organized by Dept. of CSE, JNTUH College of Engineering, Hyderabad, India. International
19 Revamping SQL Queries for Cost Based Optimization International Conference on Circuits, Controls, Communication and Computing ( I4c-2016),held during 4th-6th October 2016 at M.S.Ramaiah Institute of Technology, Bangalore,India International
20 Cognitive Perceptive Framework with Gait Recognition Technology 2nd International Conference on Next Generation Computing Technologies (NGCT-2016), Dehradun, India, 14-16 October 2016. International(SCOPUS Indexed)
21 Bypassing Android Pattern Lock and Analysis IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), held during 15th-17th of December, 2016 at Agni College of Technology Old Mahabalipuram Road, Thalambur, Chennai – 600 130, Tamil Nadu, India. International(IEEE)
22 Forensics Analysis of Android Mobile Devices  II International Conference  on Recent Advances and Innovations in Engineering (ICRAIE2016), 23-25, December – 2016, Poornima College of Engg., Jaipur, India, Sponsored by IEEE Delhi Section  International(SCOPUS Indexed)
23 Evolution of Higher Education in India: Ancient to Golden  Era  University News: A Weekly Journal of Higher Education January 30-Febraruary 05, 2017 by Association of Indian Universities, Volume 55 N0. o5. ISSN-0566-2257. National
24 Intensifying the Security of Information by the Fusion of Random Substitution Technique and Enhanced DES First International Conference on Smart Computing and Informatics” Conducted at ANITS, VIZAG during 3- 4 March 2017. (Published in SPRINGER SIST Series Vol 1.  pp. 487-496) International(Springer)
25 The Design of a Secure ThreeFactor Authentication Protocol forWireless Sensor Networks The International Conference on Nextgen Electronic Technologies, organized by the VIT University , 23- 25 March 2017 at VIT University Chennai in Chennai, India978-1-5090-5913-3/17/$31.00_c 2017 IEEE. International(IEEE)
26 A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks International Conference on Computational Intelligence and Informatics-2017(ICCII-2017) held during 25-27 September 2017 at JNTU, Hyderabad. International(Springer)
27 Cogno-Detective System for Body Odor Sensing 017 IEEE International Conference on Computational Intelligence and Computing Research, Tamilnadu College of Engineering, Coimbatore, 14 to 16 Dec 2017. International IEEE XploreSCOPUS [Best Paper]
28 Smart-Trace: A Future Security Aid using Body Odor Sensing of an Individual with IoT, 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018, Malaviya National Institute of Technology (MNIT), Jaipur, March 26-27, 2018. International
29 Emotional Intelligence through Body Temperature using Hybrid Progressive Approach International Conference on Intelligent Computing and Remote Sensing (ICICRS- 2019)  C.V. Raman College of Engineering, Bhubaneswar, India, 19th and 20th  July 2019. International
30 Chemical Sensing through Cogno-Monitoring System for air quality evaluation International Conference on Cybernetics, Cognition and Machine Learning Applications, 16-17 August 2019, Goa, India.(https://link.springer.com/chapter/10.1007%2F978-3-030-38445-6_3) International(Springer)

JOURNALS

S. No. Publication Title Details of the  Journal  Type
1. A Probabilistic Approach For Authenticating Text or Graphical Passwords Using Back Propagation International Journal Of Computer Science And Network Security (IJCSNS), VOL.11 No.5, May 2011, pp. 242-251. International
2. A Study on Back Propagation Models through Hidden Units Advances in Computational Sciences and Technology (ACST) ISSN 0973-6107 Volume 4 Number 2 (2011) pp. 213-227. National
3. A Novel Approach For Intranet Mailing For Providing User Authentication International Journal of Computer Science and Information Security (IJCSIS), pp. 158-163, Vol. 9, No. 6, June 2011. International
4. A Novel Approach For Authenticating Textual Or Graphical Passwords Using Hopfield Neural Network Advanced Computing: An International Journal (ACIJ), pp. 33-46, Vol.2, No.4, July 2011. International
5. A Cryptosystem Based On Hilbert Matrix Using Cipher Block Chaining Mode International Journal of Mathematics Trends and Technology (IJMTT), pp. 17-22, July to Aug Issue 2011. International
6. Handwritten Text Image Authentication Using Back Propagation. International Journal of Network Security & Its Applications (IJNSA), pp.121-130, Vol.3, No.5, Sep 2011. International
7. Hilbert Matrix Based Cryptosystem Using A Session Key International Journal of Engineering Research and Applications (IJERA)Vol. 1, Issue 3, pp.711-715Sep-Oct 2011. International
8. A Novel Approach for Pass Word Authentication using Brain -State -In -a Box (BSB) Model International Journal of Computer Science and Information Technologies (IJCSIT), pp. 2127-2131, Volume 2 Issue 5 September-October 2011. International
9. A Novel Approach for Pass Word Authentication Using Bidirectional Associative Memory Advanced Computing: An International Journal (ACIJ), pp.123-135, volume 2 No. 6, November2011. International
10 Performance Evaluation of Password Authentication using Associative Neural Memory Models International Journal of Advanced Information Technology (IJAIT) Vol. 2, No.1, pp. 75-85, February 2012. International
11. Security Evaluation of Online Signature Verification System using Webcams International Journal of Computer Applications (0975 – 8887) Volume 41– No.15,  pp. 28-33,March 2012. International(0.814IF)
12. A Novel Approach for Enhancing Security in Smart Cards using Biometrics International Journal of Computer Applications (0975 – 8887) Volume 42– No.8, pp.38-42, March 2012. International(0.814IF)
13. A Novel Method for Enhancing Biometric Systems Security using Watermarking Global Journal of computer application and technology GJCAT, Vol. 2 (1), 2012, 969-976, ISSN: 2249-1945. International
14. Security Evaluation of Finger Print based Authentication Systems Global Journal of computer application and technology (GJCAT), Vol. 2 (1), 2012, 986-992, ISSN: 2249-1945. International
15. User Authentication in ATM Using Fingerprint Biometrics Global Journal of computer application and technology GJCAT, Vol. 2 (1), 2012, 993-996, ISSN: 2249-1945. International
16. A Novel Method of SAR Image Regularization with Fast Approximate Discrete Minimization Advances in Digital Multimedia (ISSN 2166-2916) 64-79, Vol. 1, No. 2, June 2012. International(Free)
17. Novel Approach for the propagation and detection of active worm in a Virtual System Advances in Computer Science and its Applications (ISSN 2166-2924) 146-150,Vol. 1, No. 1, March 2012, Copyright ©World Science Publisher, United States. International(Free)
18. Survey on Computer Crime Scene Investigation Forensic Tools International Journal of Computer Trends and Technology (IJCTT)- Volume3, pp. 278-281, Issue2- 2012. International
19. Document Clustering in Web Search Engine International Journal of Computer Trends and Technology (IJCTT)- volume3, pp. 290-293,Issue2- 2012. International
20. Evaluation of Watermarking Techniques International Journal of Mathematics Trends and Technology (IJMTT)- Volume3, pp. 82-85, Issue2- 2012. International
21. CRT and ART Based Watermarking Scheme in DCT Domain International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, April 2012. International
22. Survey on Hard Disk Duplication Advances in Mechanical Engineering and its Applications,pp.17-21,Vol. 1, No. 2, 2012, World Science Publisher, United States. International(Free)
23. Enhancing Security of Biometric Systems using Watermarking International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-12/269-275. International
24 Security Evaluation of Signature Recognition System International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-7/222-230. International
25 Security Evaluation of Finger print based Authentication Systems International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/158-175. International
26 Improve QOS In Wireless Sensor Network By Using BPA Algorithm International Journal of Advances in Science and Technology, Vol. 4, No.3, pp. 38-48   , March 2012. International
27 ARM Based USB Flash Drives for Data Communication Without using USB Cables and USB Ports Advances in Computer Science and its Applications (ACSA),pp. 228-230,Vol. 1, No. 3, 2012. International(Free)
28 Design of an Intelligent Spy Robot for Military Based Appliances International Journal of Computer Information Systems (IJCIS), Vol. 4, No.5,  pp. 1-5,May 2012. International
29 A Survey on Password Authentication Using Gödel Number International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp. 534-538. International
30 Design of a Rescue Robot Assist at Fire Disaster International Journal of Computer Applications (IJCA) (0975 – 888)   Volume 47– No.10, pp.25-30, June 2012. International(0.814 IF)
31 CDMA and MAI Problem Elimination Methods International Journal of Scientific and Research Publications (IJSRP), Volume 2, Issue 7, pp.1-13, July 2012. International
32 A Novel Approach of Techniques for Building Intrusion Tolerant Server Systems International Journal of Research in Engineering Science & Technology (IJREST), Volume 1, Issue 1, pages, 1 – 5,July-August 2012. International
33 A Survey On Keystroke Authentication By Using Local Search Algorithm Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 5, September- October 2012, pp.256-259. International
34 A Novel Approach of Intrusion Detection using Classification Rules International Journal of Advanced Computer Communications and Control Vol. 01, No. 01, December 2012, pp. 19-21. International
35 An Enhanced Multilevel Authentication Scheme Using Graphical Passwords International Journal of Engineering Sciences & Emerging Technologies, June 2013,  Volume 5, Issue 2, pp.104-118. International(0.51 IF)
36 A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords International Journal of Computer Applications (0975 – 8887),Volume 71– No.10, May 2013, pp. 42-54. International(0.8 IF)
37 An Enhanced Mutual Authentication Scheme Using One Time Passwords International Journal of Computer Networks and Security, ISSN: 2051-6878, Vol.,23 Issue.1,pp. 1113-1122. International(2.51IF)
38 A Novel Timer and Counter Synchronized  Challenge-Response Based One-Time Password Authentication International Journal of Computer Networks And Security, ISSN: 2051-6878, Vol.23, Issue.1, pp. 1123-1128. International(2.51IF)
39 Improving the message capacity by using CDMA Watermarking Scheme Advances in Computer Science and its Applications (ACSA) Vol. 2, No. 3, 2013, ISSN 2166-2924. International(Free)
40 BSC: A Novel Scheme for Providing Security using Biometric Smart Card International Journal of Computer Applications (0975 – 8887) Volume 80 – No1, October 2013 International(0.8 IF)
41 A Novel Symmetric Key Cryptography using Multiple Random Secret Keys International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013 International(0.8 IF)
42 A Fusion of PLSB and SVD based

Image Watermarking Approach

International Journal of Advanced Computer Communications and Control, Volume 02, No. 02, April 2014 International
43 An Evolution of the Pixel Embedding

Techniques in Image Based Adaptive Steganography

Journal of Web Engineering & Technology    (JoWET), Volume 1, Issue 1, Jan-April 2014, pp.1-18. International
44 Prevention of Fire Accidents In Villages Using Wireless Sensor Networks International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, pp. 3968-3971. International(2.9 IF)
45 Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions International Journal of Computer Applications (0975 – 8887), Volume 112 – No. 9, February 2015 International(0.8 IF)
46 Analysis of Canonical Character Segmentation Technique for Ancient Telugu Text Documents Journal of Theoretical and Applied Information Technology, 20th December 2015. Vol.82. No.2, pp. 311-320 InternationalScopus Indexed
47 Performance Evaluation Of Quantitative Metrics on Ancient Text Documents Using MIGT Journal of Theoretical and Applied Information Technology, 31st December 2015. Vol.82. No.3 pp. 360-365 InternationalScopus Indexed
48 Gesture Recognition Technology to Annihilate Burglaries amid ATM Transactions International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 08 | Dec-2015, pp. 2293-2297 International
49 Optical Character Recognition  Technique Algorithms Journal of Theoretical and Applied Information Technology, 20th January 2016. Vol.83. No.2, pp. 275-282 InternationalScopus Indexed
50 A Study on Developing Groundwater Information System (GWIS) for Sustainable Management of Groundwater Resources-A Case Study from Visakhapatnam Urban Region International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 2185-2190. International(6.39 IF)
51 Variable Modulation Schemes for AWGN Channel based Device to Device Communication Indian Journal of Science and Technology, Vol 9(20), May 2016, pp.1-6. InternationalScopus Indexed
52  Design of WSN based Water Quality Monitoring System in a Mining District International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp.1183-1188 International(6.39 IF)
53 Providing A Secure Group Communication By Using A Novel Key Transfer Protocol and by Generating Multiple Session Keys International Journal of Advance Research in Science and Engineering (IJARSE), Volume 5 Issue 10, October 2016, pp.36-45. International(2.83 IF)
54 Survey on Android Forensic Tools and Methodologies International Journal of Computer Applications (0975 – 8887) Volume 154 – No.8, November 2016. International(0.8 IF)
55 A Hybrid Cryptographic System for Secured Device to Device Communication International Journal of Electrical and Computer Engineering (IJECE), Volume 6, No 6: December 2016,pp. 2962~2970 InternationalScopus Indexed
56 Evolution of Higher Education in India: Ancient to Golden  Era University News: Association of Indian Universities, Volume 55 N0. 05, January 30-Febraruary 05 2017. National
57 Utilization of SC-FDMA And OFDMA Based Uplink and Downlink Resources In LTE-A Network Assisted Device To Device Communication For Effective Spectrum Management ARPN Journal of Engineering and Applied Sciences, VOL. 12, NO. 5, MARCH 2017 InternationalScopus Indexed
58 Inhibiting Cognitive Bias in Forensic Investigation Using DNA Smart Card with IOT International Journal of Computer Technology and Applications(IJCTA), Volume 10, Number 14, pp 251-255, May 2017 International(Indexed in SCOPUS)
59 Robust and indiscernible multimedia watermarking using light weight mutational methodology Traitement du signal30 June 2017, Volume 34, Issue 1-2, pp: 45-55 International(Indexed in SCOPUS )IF 0.057
60 A Taxonomical Review on MANET Networks for IoT based Air Pollution Controls International Journal of Computer Science And Technology (IJCST) Vol. 8, Issue 3, July – Sept 2017 International (0.6 IF)
61 A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controlling Network Architecture International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 07  July -2017 International
62 A Fault Tolerant Framework to Detect Routing Failures in Air Pollution Monitoring MANET Using 2ACK International Journal of Scientific & Engineering Research Volume 8, Issue 9, September-2017 InternationalIndexed by Thomson Reuters
63 Cryptanalysis of Design and Analysis of aProvably Secure Multi-server Authentication Scheme International Journal of Network Security, Vol.20, No.2, PP.1-8, Mar. 2018 International(Indexed in SCOPUS)
64 A Novel Feature Selection based Classification Model for Disease Severity Prediction on Alzheimer’s Database Journal of Advanced research in Dynamic Control Systems Volume: 10 , Issue: 4Pages: 245-255 ISSN: 1943-023X, Apr,2018 International(Indexed in SCOPUS ) IF 0.13
65 A novel integrated approach using Euclid’s and fuzzy logic for secure communication Int. J. Information Privacy, Security and Integrity, Vol. 3, No. 4, 2018(Inder Science) International( Free)
66 Despeckle Of SAR Images Using AdaptiveThreshold In Non Sub Sampled ShearletTransform Domain Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X,       Vol. 10, 09-Special Issue, April 2018, pp. 765-772. International( Free)(Indexed in SCOPUS )
67 A Review of Blockchain Technologyand Its Application in Internet of Things International Journal of Management, Technology And Engineering, Volume 8, Issue12 , December 2018 International( Free)
69 EPNN Based High Secure Intensive Hidden Digital Watermark Application in Telemedicine Advances in Modelling and Analysis A, Vol. 56, No. 1, March, 2019, pp. 21-25

 

International(Indexed in SCOPUS )
70 Optimized AODV Routing Algorithm in MANET for Maximizing the Network Lifetime International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019 International(Indexed in SCOPUS )
71 An Iterative Probabilistic Non-Local Filter Based Denoising Framework For SAR And Medical Images Journal of Critical Reviews, ISSN- 2394-5125 Vol 6, Issue 6, December 2019, pp. 386-392. International (Indexed in SCOPUS )( Free)
72 A Hybrid Segmentation based majority voting based classification framework for Alzheimer Disease prediction Journal of Critical Reviews, ISSN: 2394-5125

pp. : 376-385 Issue6,Volume 6,2019

International(Indexed in SCOPUS)  (Free )
73  A Secure Biometrics-Based User Authenticated Key Agreement Protocol for Multi-Server Environments International Journal of Advanced Science and Technology Vol. 29, No. 9s, March 2020, pp. 517-532 International(Indexed in SCOPUS )( Free)
74 Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN Journal of Evolutionary Intelligence, Springer Professional, Special Issue, 28 April 2020, published by Springer Verlag International(Indexed in SCOPUS )
75 Future Internet for Service Oriented Applications InternationFchemal Journal of Innovative Technology and Exploring Engineering Vol.- 9 Issue-6 published April 2020,pp-1996-2001,ISSN: 2278-3075. International(Indexed in SCOPUS )
76 Packet Crafting Tools for Cyber Crime Security Attacks International Journal of Computer Applications, Foundation of Computer Science (FCS), NY, USA, Vol.-176 Issue-31 published June 2020, pp-28-30, ISSN: 0975 – 8887 International