BOOKS
- “Password Authentication Using Associative Memories -A Probabilistic Approach”, Lap Lambert Academic Publishing, Germany, 2012, ISBN: 978-3-659-26797-0.
- “Crypto Authentication Using Hilbert Matrices-A Novel Approach”, Lap Lambert Academic Publishing, Germany, 2014, ISBN: 978-3-8473-4755-2.
- Hadoop & R Language, Shree Publishing House, India, 2019, isbn:978-938-819-640-6
CONFERENCES
S. No. | Publication Title | Details of the Conference | Type |
1. | Extended Alternate Heterogeneous Earliest Finish Time Algorithm | Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-09. | National |
2. | Internet Protocol Security (IPSec) | Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-25. | National |
3. | Evaluating the Effectiveness of Personalized Web Search | AICTE Sponsored National Conference on – High Performance Computing and Networking,13th-14th August 2011, Rajampet, Andhra Pradesh, India. | National |
4. | Password Authentication using Context-Sensitive Associative Memory Neural Networks: A Novel Approach | Proceedings of Springer Lecture Notes of the LNICST-85 Series, part-II, pp. 464–478 at the CCSIT 2012, in January 2012 held at Bangalore, India. | International |
5. | Protocol Sensor Based Embedded Technique for Efficient Water-Saving Agriculture | Proceedings of ACNCN2012 conference on advances in communication, navigation and computer networks 17th -18th March, 2012, A.U, Visakhapatnam. | National |
6. | A Multi Cloud based Approach to Enhance data Security and Availability in Cloud Storage | Proceedings of International Conference on ComNet CIIT & ITC 2013, pp.58-63. (Published by Elsevier, with ISBN 978-81-910691-6-3), Organized by ACEEE, in Hyderabad from 08th -09th November 2013. | International |
7 | Analysis of Cyber-Criminal Profiling and Cyber-Attacks: A Comprehensive study | 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). | International |
8 | An Innovative Progress Approach for Quantity Mining of item sets | 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). | International |
9 | An Integrated Approach to Provide Security and Resist Thefts on Digital Data | 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). | International |
10 | Cloud Forensics: The Need and Challenges A Research & Fact Compendium | 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). | International |
11 | Implementation of X.509 Attribute Certificates for Cloud Environments | 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). | International |
12 | A Unified Model for Cherishing Privacy in Database System: An Approach to Overhaul Vulnerabilities | First International Conference on Networks & Soft Computing,2014, organized by Vignan’s Foundation for Science, Technology & Research, Guntur, with the Technical Sponsorship of IEEE Hyderabad Section during 19th -20th August 2014(ISBN-978-1-4799-3486-7/14). | International(IEEE) |
13 | Enhanced DES Algorithm | International Conference on Recent Trends and Research Issues in Computer Science and Engineering, held during 02nd – 03rdMay 2015. | International |
14 | Information Security using Genetic Algorithm with Penultimate and Least Significant Bits | Fifth International Conference on Advances in Information Technology and Mobile Communication – AIM 2015, held during 11th -12th July 2015, Bangalore, India. | International |
15 | MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity Thefts | 4th World Conference on Applied Sciences, Engineering & Technology 24-26 October 2015, Kumamoto University, Japan (ISBN13:978-81-930222-1-4). | International |
16 | Accelerating SQL Queries by Unravelling Performance Bottlenecks in DBMS Engine | IEEE International Conference on Energy Systems and Application (ICESA – 2015) 30th October to 01st November 2015, DYPIET Pimpri, Pune India. | International(IEEE) |
17 | Electronic Noses: Forestalling Fire Disasters: A Techniques to Prevent False Fire Alarms and Fatal Casualties | 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), held during 10th -12th December 2015 at Vickram College Of Engineering, Madurai, Tamilnadu, India. | InternationalInternational(IEEE Xplore, SCOPUS) |
18 | A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks | International Conference on Computational Intelligence and Informatics-2016(ICCII-2016), held during May 28th-30th , 2016 organized by Dept. of CSE, JNTUH College of Engineering, Hyderabad, India. | International |
19 | Revamping SQL Queries for Cost Based Optimization | International Conference on Circuits, Controls, Communication and Computing ( I4c-2016),held during 4th-6th October 2016 at M.S.Ramaiah Institute of Technology, Bangalore,India | International |
20 | Cognitive Perceptive Framework with Gait Recognition Technology | 2nd International Conference on Next Generation Computing Technologies (NGCT-2016), Dehradun, India, 14-16 October 2016. | International(SCOPUS Indexed) |
21 | Bypassing Android Pattern Lock and Analysis | IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), held during 15th-17th of December, 2016 at Agni College of Technology Old Mahabalipuram Road, Thalambur, Chennai – 600 130, Tamil Nadu, India. | International(IEEE) |
22 | Forensics Analysis of Android Mobile Devices | II International Conference on Recent Advances and Innovations in Engineering (ICRAIE2016), 23-25, December – 2016, Poornima College of Engg., Jaipur, India, Sponsored by IEEE Delhi Section | International(SCOPUS Indexed) |
23 | Evolution of Higher Education in India: Ancient to Golden Era | University News: A Weekly Journal of Higher Education January 30-Febraruary 05, 2017 by Association of Indian Universities, Volume 55 N0. o5. ISSN-0566-2257. | National |
24 | Intensifying the Security of Information by the Fusion of Random Substitution Technique and Enhanced DES | First International Conference on Smart Computing and Informatics” Conducted at ANITS, VIZAG during 3- 4 March 2017. (Published in SPRINGER SIST Series Vol 1. pp. 487-496) | International(Springer) |
25 | The Design of a Secure ThreeFactor Authentication Protocol forWireless Sensor Networks | The International Conference on Nextgen Electronic Technologies, organized by the VIT University , 23- 25 March 2017 at VIT University Chennai in Chennai, India978-1-5090-5913-3/17/$31.00_c 2017 IEEE. | International(IEEE) |
26 | A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks | International Conference on Computational Intelligence and Informatics-2017(ICCII-2017) held during 25-27 September 2017 at JNTU, Hyderabad. | International(Springer) |
27 | Cogno-Detective System for Body Odor Sensing | 017 IEEE International Conference on Computational Intelligence and Computing Research, Tamilnadu College of Engineering, Coimbatore, 14 to 16 Dec 2017. | International IEEE XploreSCOPUS [Best Paper] |
28 | Smart-Trace: A Future Security Aid using Body Odor Sensing of an Individual with IoT, | 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018, Malaviya National Institute of Technology (MNIT), Jaipur, March 26-27, 2018. | International |
29 | Emotional Intelligence through Body Temperature using Hybrid Progressive Approach | International Conference on Intelligent Computing and Remote Sensing (ICICRS- 2019) C.V. Raman College of Engineering, Bhubaneswar, India, 19th and 20th July 2019. | International |
30 | Chemical Sensing through Cogno-Monitoring System for air quality evaluation | International Conference on Cybernetics, Cognition and Machine Learning Applications, 16-17 August 2019, Goa, India.(https://link.springer.com/chapter/10.1007%2F978-3-030-38445-6_3) | International(Springer) |
JOURNALS
S. No. | Publication Title | Details of the Journal | Type |
1. | A Probabilistic Approach For Authenticating Text or Graphical Passwords Using Back Propagation | International Journal Of Computer Science And Network Security (IJCSNS), VOL.11 No.5, May 2011, pp. 242-251. | International |
2. | A Study on Back Propagation Models through Hidden Units | Advances in Computational Sciences and Technology (ACST) ISSN 0973-6107 Volume 4 Number 2 (2011) pp. 213-227. | National |
3. | A Novel Approach For Intranet Mailing For Providing User Authentication | International Journal of Computer Science and Information Security (IJCSIS), pp. 158-163, Vol. 9, No. 6, June 2011. | International |
4. | A Novel Approach For Authenticating Textual Or Graphical Passwords Using Hopfield Neural Network | Advanced Computing: An International Journal (ACIJ), pp. 33-46, Vol.2, No.4, July 2011. | International |
5. | A Cryptosystem Based On Hilbert Matrix Using Cipher Block Chaining Mode | International Journal of Mathematics Trends and Technology (IJMTT), pp. 17-22, July to Aug Issue 2011. | International |
6. | Handwritten Text Image Authentication Using Back Propagation. | International Journal of Network Security & Its Applications (IJNSA), pp.121-130, Vol.3, No.5, Sep 2011. | International |
7. | Hilbert Matrix Based Cryptosystem Using A Session Key | International Journal of Engineering Research and Applications (IJERA)Vol. 1, Issue 3, pp.711-715Sep-Oct 2011. | International |
8. | A Novel Approach for Pass Word Authentication using Brain -State -In -a Box (BSB) Model | International Journal of Computer Science and Information Technologies (IJCSIT), pp. 2127-2131, Volume 2 Issue 5 September-October 2011. | International |
9. | A Novel Approach for Pass Word Authentication Using Bidirectional Associative Memory | Advanced Computing: An International Journal (ACIJ), pp.123-135, volume 2 No. 6, November2011. | International |
10 | Performance Evaluation of Password Authentication using Associative Neural Memory Models | International Journal of Advanced Information Technology (IJAIT) Vol. 2, No.1, pp. 75-85, February 2012. | International |
11. | Security Evaluation of Online Signature Verification System using Webcams | International Journal of Computer Applications (0975 – 8887) Volume 41– No.15, pp. 28-33,March 2012. | International(0.814IF) |
12. | A Novel Approach for Enhancing Security in Smart Cards using Biometrics | International Journal of Computer Applications (0975 – 8887) Volume 42– No.8, pp.38-42, March 2012. | International(0.814IF) |
13. | A Novel Method for Enhancing Biometric Systems Security using Watermarking | Global Journal of computer application and technology GJCAT, Vol. 2 (1), 2012, 969-976, ISSN: 2249-1945. | International |
14. | Security Evaluation of Finger Print based Authentication Systems | Global Journal of computer application and technology (GJCAT), Vol. 2 (1), 2012, 986-992, ISSN: 2249-1945. | International |
15. | User Authentication in ATM Using Fingerprint Biometrics | Global Journal of computer application and technology GJCAT, Vol. 2 (1), 2012, 993-996, ISSN: 2249-1945. | International |
16. | A Novel Method of SAR Image Regularization with Fast Approximate Discrete Minimization | Advances in Digital Multimedia (ISSN 2166-2916) 64-79, Vol. 1, No. 2, June 2012. | International(Free) |
17. | Novel Approach for the propagation and detection of active worm in a Virtual System | Advances in Computer Science and its Applications (ISSN 2166-2924) 146-150,Vol. 1, No. 1, March 2012, Copyright ©World Science Publisher, United States. | International(Free) |
18. | Survey on Computer Crime Scene Investigation Forensic Tools | International Journal of Computer Trends and Technology (IJCTT)- Volume3, pp. 278-281, Issue2- 2012. | International |
19. | Document Clustering in Web Search Engine | International Journal of Computer Trends and Technology (IJCTT)- volume3, pp. 290-293,Issue2- 2012. | International |
20. | Evaluation of Watermarking Techniques | International Journal of Mathematics Trends and Technology (IJMTT)- Volume3, pp. 82-85, Issue2- 2012. | International |
21. | CRT and ART Based Watermarking Scheme in DCT Domain | International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, April 2012. | International |
22. | Survey on Hard Disk Duplication | Advances in Mechanical Engineering and its Applications,pp.17-21,Vol. 1, No. 2, 2012, World Science Publisher, United States. | International(Free) |
23. | Enhancing Security of Biometric Systems using Watermarking | International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-12/269-275. | International |
24 | Security Evaluation of Signature Recognition System | International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-7/222-230. | International |
25 | Security Evaluation of Finger print based Authentication Systems | International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/158-175. | International |
26 | Improve QOS In Wireless Sensor Network By Using BPA Algorithm | International Journal of Advances in Science and Technology, Vol. 4, No.3, pp. 38-48 , March 2012. | International |
27 | ARM Based USB Flash Drives for Data Communication Without using USB Cables and USB Ports | Advances in Computer Science and its Applications (ACSA),pp. 228-230,Vol. 1, No. 3, 2012. | International(Free) |
28 | Design of an Intelligent Spy Robot for Military Based Appliances | International Journal of Computer Information Systems (IJCIS), Vol. 4, No.5, pp. 1-5,May 2012. | International |
29 | A Survey on Password Authentication Using Gödel Number | International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp. 534-538. | International |
30 | Design of a Rescue Robot Assist at Fire Disaster | International Journal of Computer Applications (IJCA) (0975 – 888) Volume 47– No.10, pp.25-30, June 2012. | International(0.814 IF) |
31 | CDMA and MAI Problem Elimination Methods | International Journal of Scientific and Research Publications (IJSRP), Volume 2, Issue 7, pp.1-13, July 2012. | International |
32 | A Novel Approach of Techniques for Building Intrusion Tolerant Server Systems | International Journal of Research in Engineering Science & Technology (IJREST), Volume 1, Issue 1, pages, 1 – 5,July-August 2012. | International |
33 | A Survey On Keystroke Authentication By Using Local Search Algorithm | Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 5, September- October 2012, pp.256-259. | International |
34 | A Novel Approach of Intrusion Detection using Classification Rules | International Journal of Advanced Computer Communications and Control Vol. 01, No. 01, December 2012, pp. 19-21. | International |
35 | An Enhanced Multilevel Authentication Scheme Using Graphical Passwords | International Journal of Engineering Sciences & Emerging Technologies, June 2013, Volume 5, Issue 2, pp.104-118. | International(0.51 IF) |
36 | A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords | International Journal of Computer Applications (0975 – 8887),Volume 71– No.10, May 2013, pp. 42-54. | International(0.8 IF) |
37 | An Enhanced Mutual Authentication Scheme Using One Time Passwords | International Journal of Computer Networks and Security, ISSN: 2051-6878, Vol.,23 Issue.1,pp. 1113-1122. | International(2.51IF) |
38 | A Novel Timer and Counter Synchronized Challenge-Response Based One-Time Password Authentication | International Journal of Computer Networks And Security, ISSN: 2051-6878, Vol.23, Issue.1, pp. 1123-1128. | International(2.51IF) |
39 | Improving the message capacity by using CDMA Watermarking Scheme | Advances in Computer Science and its Applications (ACSA) Vol. 2, No. 3, 2013, ISSN 2166-2924. | International(Free) |
40 | BSC: A Novel Scheme for Providing Security using Biometric Smart Card | International Journal of Computer Applications (0975 – 8887) Volume 80 – No1, October 2013 | International(0.8 IF) |
41 | A Novel Symmetric Key Cryptography using Multiple Random Secret Keys | International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013 | International(0.8 IF) |
42 | A Fusion of PLSB and SVD based
Image Watermarking Approach |
International Journal of Advanced Computer Communications and Control, Volume 02, No. 02, April 2014 | International |
43 | An Evolution of the Pixel Embedding
Techniques in Image Based Adaptive Steganography |
Journal of Web Engineering & Technology (JoWET), Volume 1, Issue 1, Jan-April 2014, pp.1-18. | International |
44 | Prevention of Fire Accidents In Villages Using Wireless Sensor Networks | International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, pp. 3968-3971. | International(2.9 IF) |
45 | Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions | International Journal of Computer Applications (0975 – 8887), Volume 112 – No. 9, February 2015 | International(0.8 IF) |
46 | Analysis of Canonical Character Segmentation Technique for Ancient Telugu Text Documents | Journal of Theoretical and Applied Information Technology, 20th December 2015. Vol.82. No.2, pp. 311-320 | InternationalScopus Indexed |
47 | Performance Evaluation Of Quantitative Metrics on Ancient Text Documents Using MIGT | Journal of Theoretical and Applied Information Technology, 31st December 2015. Vol.82. No.3 pp. 360-365 | InternationalScopus Indexed |
48 | Gesture Recognition Technology to Annihilate Burglaries amid ATM Transactions | International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 08 | Dec-2015, pp. 2293-2297 | International |
49 | Optical Character Recognition Technique Algorithms | Journal of Theoretical and Applied Information Technology, 20th January 2016. Vol.83. No.2, pp. 275-282 | InternationalScopus Indexed |
50 | A Study on Developing Groundwater Information System (GWIS) for Sustainable Management of Groundwater Resources-A Case Study from Visakhapatnam Urban Region | International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 2185-2190. | International(6.39 IF) |
51 | Variable Modulation Schemes for AWGN Channel based Device to Device Communication | Indian Journal of Science and Technology, Vol 9(20), May 2016, pp.1-6. | InternationalScopus Indexed |
52 | Design of WSN based Water Quality Monitoring System in a Mining District | International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp.1183-1188 | International(6.39 IF) |
53 | Providing A Secure Group Communication By Using A Novel Key Transfer Protocol and by Generating Multiple Session Keys | International Journal of Advance Research in Science and Engineering (IJARSE), Volume 5 Issue 10, October 2016, pp.36-45. | International(2.83 IF) |
54 | Survey on Android Forensic Tools and Methodologies | International Journal of Computer Applications (0975 – 8887) Volume 154 – No.8, November 2016. | International(0.8 IF) |
55 | A Hybrid Cryptographic System for Secured Device to Device Communication | International Journal of Electrical and Computer Engineering (IJECE), Volume 6, No 6: December 2016,pp. 2962~2970 | InternationalScopus Indexed |
56 | Evolution of Higher Education in India: Ancient to Golden Era | University News: Association of Indian Universities, Volume 55 N0. 05, January 30-Febraruary 05 2017. | National |
57 | Utilization of SC-FDMA And OFDMA Based Uplink and Downlink Resources In LTE-A Network Assisted Device To Device Communication For Effective Spectrum Management | ARPN Journal of Engineering and Applied Sciences, VOL. 12, NO. 5, MARCH 2017 | InternationalScopus Indexed |
58 | Inhibiting Cognitive Bias in Forensic Investigation Using DNA Smart Card with IOT | International Journal of Computer Technology and Applications(IJCTA), Volume 10, Number 14, pp 251-255, May 2017 | International(Indexed in SCOPUS) |
59 | Robust and indiscernible multimedia watermarking using light weight mutational methodology | Traitement du signal30 June 2017, Volume 34, Issue 1-2, pp: 45-55 | International(Indexed in SCOPUS )IF 0.057 |
60 | A Taxonomical Review on MANET Networks for IoT based Air Pollution Controls | International Journal of Computer Science And Technology (IJCST) Vol. 8, Issue 3, July – Sept 2017 | International (0.6 IF) |
61 | A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controlling Network Architecture | International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 07 July -2017 | International |
62 | A Fault Tolerant Framework to Detect Routing Failures in Air Pollution Monitoring MANET Using 2ACK | International Journal of Scientific & Engineering Research Volume 8, Issue 9, September-2017 | InternationalIndexed by Thomson Reuters |
63 | Cryptanalysis of Design and Analysis of aProvably Secure Multi-server Authentication Scheme | International Journal of Network Security, Vol.20, No.2, PP.1-8, Mar. 2018 | International(Indexed in SCOPUS) |
64 | A Novel Feature Selection based Classification Model for Disease Severity Prediction on Alzheimer’s Database | Journal of Advanced research in Dynamic Control Systems Volume: 10 , Issue: 4Pages: 245-255 ISSN: 1943-023X, Apr,2018 | International(Indexed in SCOPUS ) IF 0.13 |
65 | A novel integrated approach using Euclid’s and fuzzy logic for secure communication | Int. J. Information Privacy, Security and Integrity, Vol. 3, No. 4, 2018(Inder Science) | International( Free) |
66 | Despeckle Of SAR Images Using AdaptiveThreshold In Non Sub Sampled ShearletTransform Domain | Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 10, 09-Special Issue, April 2018, pp. 765-772. | International( Free)(Indexed in SCOPUS ) |
67 | A Review of Blockchain Technologyand Its Application in Internet of Things | International Journal of Management, Technology And Engineering, Volume 8, Issue12 , December 2018 | International( Free) |
69 | EPNN Based High Secure Intensive Hidden Digital Watermark Application in Telemedicine | Advances in Modelling and Analysis A, Vol. 56, No. 1, March, 2019, pp. 21-25
|
International(Indexed in SCOPUS ) |
70 | Optimized AODV Routing Algorithm in MANET for Maximizing the Network Lifetime | International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019 | International(Indexed in SCOPUS ) |
71 | An Iterative Probabilistic Non-Local Filter Based Denoising Framework For SAR And Medical Images | Journal of Critical Reviews, ISSN- 2394-5125 Vol 6, Issue 6, December 2019, pp. 386-392. | International (Indexed in SCOPUS )( Free) |
72 | A Hybrid Segmentation based majority voting based classification framework for Alzheimer Disease prediction | Journal of Critical Reviews, ISSN: 2394-5125
pp. : 376-385 Issue6,Volume 6,2019 |
International(Indexed in SCOPUS) (Free ) |
73 | A Secure Biometrics-Based User Authenticated Key Agreement Protocol for Multi-Server Environments | International Journal of Advanced Science and Technology Vol. 29, No. 9s, March 2020, pp. 517-532 | International(Indexed in SCOPUS )( Free) |
74 | Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN | Journal of Evolutionary Intelligence, Springer Professional, Special Issue, 28 April 2020, published by Springer Verlag | International(Indexed in SCOPUS ) |
75 | Future Internet for Service Oriented Applications | InternationFchemal Journal of Innovative Technology and Exploring Engineering Vol.- 9 Issue-6 published April 2020,pp-1996-2001,ISSN: 2278-3075. | International(Indexed in SCOPUS ) |
76 | Packet Crafting Tools for Cyber Crime Security Attacks | International Journal of Computer Applications, Foundation of Computer Science (FCS), NY, USA, Vol.-176 Issue-31 published June 2020, pp-28-30, ISSN: 0975 – 8887 | International |