17 |
Novel Approach for the propagation and detection of active worm in a Virtual System |
2015 IEEE InAdvances in Computer Science and its Applications (ISSN 2166-2924) 146-150,Vol. 1, No. 1, March 2012, Copyright ©World Science Publisher, United States. |
International(Free) |
18 |
Survey on Computer Crime Scene Investigation Forensic Tools |
International Journal of Computer Trends and Technology (IJCTT)- Volume3, pp. 278-281, Issue2- 2012 |
International |
19 |
Document Clustering in Web Search Engine |
International Journal of Computer Trends and Technology (IJCTT)- volume3, pp. 290-293,Issue2- 2012. |
International |
20 |
Evaluation of Watermarking Techniques |
International Journal of Mathematics Trends and Technology (IJMTT)- Volume3, pp. 82-85, Issue2- 2012. |
International
|
21 |
CRT and ART Based Watermarking Scheme in DCT Domain |
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, April 2012. |
International |
22 |
Survey on Hard Disk Duplication |
Advances in Mechanical Engineering and its Applications,pp.17-21,Vol. 1, No. 2, 2012, World Science Publisher, United States. |
International(Free) |
23 |
Enhancing Security of Biometric Systems using Watermarking |
International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-12/269-275. |
International |
24 |
Security Evaluation of Signature Recognition System |
International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-7/222-230. |
International |
25 |
Security Evaluation of Finger print based Authentication Systems |
International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/158-175. |
International |
26 |
Improve QOS In Wireless Sensor Network By Using BPA Algorithm |
International Journal of Advances in Science and Technology, Vol. 4, No.3, pp. 38-48 , March 2012. |
International |
27 |
ARM Based USB Flash Drives for Data Communication Without using USB Cables and USB Ports |
Advances in Computer Science and its Applications (ACSA),pp. 228-230,Vol. 1, No. 3, 2012. |
International(Free) |
28 |
Design of an Intelligent Spy Robot for Military Based Appliances |
International Journal of Computer Information Systems (IJCIS), Vol. 4, No.5, pp. 1-5,May 2012. |
International |
29 |
A Survey on Password Authentication Using Gödel Number |
International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp. 534-538. |
International |
30 |
Design of a Rescue Robot Assist at Fire Disaster |
International Journal of Computer Applications (IJCA) (0975 – 888) Volume 47– No.10, pp.25-30, June 2012. |
International(0.814 IF) |
31 |
CDMA and MAI Problem Elimination Methods |
International Journal of Scientific and Research Publications (IJSRP), Volume 2, Issue 7, pp.1-13, July 2012. |
International |
32 |
A Novel Approach of Techniques for Building Intrusion Tolerant Server Systems |
International Journal of Research in Engineering Science & Technology (IJREST), Volume 1, Issue 1, pages, 1 – 5,July-August 2012. |
International |
33 |
A Survey On Keystroke Authentication By Using Local Search Algorithm |
Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 5, September- October 2012, pp.256-259. |
International |
34 |
A Novel Approach of Intrusion Detection using Classification Rules |
International Journal of Advanced Computer Communications and Control Vol. 01, No. 01, December 2012, pp. 19-21. |
International |
35 |
An Enhanced Multilevel Authentication Scheme Using Graphical Passwords |
International Journal of Engineering Sciences & Emerging Technologies, June 2013, Volume 5, Issue 2, pp.104-118. |
International(0.51 IF) |
36 |
A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords |
International Journal of Computer Applications (0975 – 8887),Volume 71– No.10, May 2013, pp. 42-54. |
International(0.8 IF) |
37 |
An Enhanced Mutual Authentication Scheme Using One Time Passwords |
International Journal of Computer Networks and Security, ISSN: 2051-6878, Vol.,23 Issue.1,pp. 1113-1122. |
International(2.51IF) |
38 |
A Novel Timer and Counter Synchronized Challenge-Response Based One-Time Password Authentication |
International Journal of Computer Networks And Security, ISSN: 2051-6878, Vol.23, Issue.1, pp. 1123-1128. |
International(2.51IF) |
39 |
Improving the message capacity by using CDMA Watermarking Scheme |
Advances in Computer Science and its Applications (ACSA) Vol. 2, No. 3, 2013, ISSN 2166-2924. |
International(Free) |
40 |
BSC: A Novel Scheme for Providing Security using Biometric Smart Card |
International Journal of Computer Applications (0975 – 8887) Volume 80 – No1, October 2013 |
International(0.8 IF) |
41 |
A Novel Symmetric Key Cryptography using Multiple Random Secret Keys |
International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013 |
International(0.8 IF) |
42 |
A Fusion of PLSB and SVD based
Image Watermarking Approach |
International Journal of Advanced Computer Communications and Control, Volume 02, No. 02, April 2014 |
International |
43 |
An Evolution of the Pixel Embedding
Techniques in Image Based Adaptive Steganography |
Journal of Web Engineering & Technology (JoWET), Volume 1, Issue 1, Jan-April 2014, pp.1-18. |
International |
44 |
Prevention of Fire Accidents In Villages Using Wireless Sensor Networks |
International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, pp. 3968-3971. |
International(2.9 IF) |
45 |
Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions |
International Journal of Computer Applications (0975 – 8887), Volume 112 – No. 9, February 2015 |
International(0.8 IF) |
46 |
Analysis of Canonical Character Segmentation Technique for Ancient Telugu Text Documents |
Journal of Theoretical and Applied Information Technology, 20th December 2015. Vol.82. No.2, pp. 311-320 |
InternationalScopus Indexed |
47 |
Performance Evaluation Of Quantitative Metrics on Ancient Text Documents Using MIGT |
Journal of Theoretical and Applied Information Technology, 31st December 2015. Vol.82. No.3 pp. 360-365 |
InternationalScopus Indexed |
48 |
Gesture Recognition Technology to Annihilate Burglaries amid ATM Transactions |
International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 08 | Dec-2015, pp. 2293-2297 |
International |
49 |
Optical Character Recognition Technique Algorithms |
Journal of Theoretical and Applied Information Technology, 20th January 2016. Vol.83. No.2, pp. 275-282 |
International(6.39 IF) |
50 |
A Study on Developing Groundwater Information System (GWIS) for Sustainable Management of Groundwater Resources-A Case Study from Visakhapatnam Urban Region |
International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 2185-2190. |
International(6.39 IF) |
51 |
Variable Modulation Schemes for AWGN Channel based Device to Device Communication |
Indian Journal of Science and Technology, Vol 9(20), May 2016, pp.1-6 |
InternationalScopus Indexed |
52 |
Design of WSN based Water Quality Monitoring System in a Mining District |
International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp.1183-1188 |
International(6.39 IF) |
53 |
Providing A Secure Group Communication By Using A Novel Key Transfer Protocol and by Generating Multiple Session Keys |
International Journal of Advance Research in Science and Engineering (IJARSE), Volume 5 Issue 10, October 2016, pp.36-45. |
International(2.83 IF) |
54 |
Survey on Android Forensic Tools and Methodologies |
International Journal of Computer Applications (0975 – 8887) Volume 154 – No.8, November 2016 |
International(0.8 IF) |
55 |
A Hybrid Cryptographic System for Secured Device to Device Communication |
International Journal of Electrical and Computer Engineering (IJECE), Volume 6, No 6: December 2016,pp. 2962~2970 |
InternationalScopus Indexed |
56 |
Evolution of Higher Education in India: Ancient to Golden Era |
University News: Association of Indian Universities, Volume 55 N0. 05, January 30-Febraruary 05 2017. |
National |
57 |
Utilization of SC-FDMA And OFDMA Based Uplink and Downlink Resources In LTE-A Network Assisted Device To Device Communication For Effective Spectrum Management |
ARPN Journal of Engineering and Applied Sciences, VOL. 12, NO. 5, MARCH 2017 |
InternationalScopus Indexed |
58 |
Inhibiting Cognitive Bias in Forensic Investigation Using DNA Smart Card with IOT |
International Journal of Computer Technology and Applications(IJCTA), Volume 10, Number 14, pp 251-255, May 2017 |
International(Indexed in SCOPUS) |
59 |
Robust and indiscernible multimedia watermarking using light weight mutational methodology |
Traitement du signal30 June 2017, Volume 34, Issue 1-2, pp: 45-55 |
International(Indexed in SCOPUS )IF 0.057 |
60 |
A Taxonomical Review on MANET Networks for IoT based Air Pollution Controls |
International Journal of Computer Science And Technology (IJCST) Vol. 8, Issue 3, July – Sept 2017 |
International (0.6 IF) |
61 |
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controlling Network Architecture |
International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 07 July -2017 |
International |
62 |
A Fault Tolerant Framework to Detect Routing Failures in Air Pollution Monitoring MANET Using 2ACK |
International Journal of Scientific & Engineering Research Volume 8, Issue 9, September-2017 |
InternationalIndexed by Thomson Reuters |
63 |
Cryptanalysis of Design and Analysis of aProvably Secure Multi-server Authentication Scheme |
International Journal of Network Security, Vol.20, No.2, PP.1-8, Mar. 2018 |
International(Indexed in SCOPUS) |
64 |
A Novel Feature Selection based Classification Model for Disease Severity Prediction on Alzheimer’s Database |
Journal of Advanced research in Dynamic Control Systems Volume: 10 , Issue: 4Pages: 245-255 ISSN: 1943-023X, Apr,2018 |
International(Indexed in SCOPUS ) IF 0.13 |
65 |
A novel integrated approach using Euclid’s and fuzzy logic for secure communication |
Int. J. Information Privacy, Security and Integrity, Vol. 3, No. 4, 2018(Inder Science) |
International( Free) |
66 |
Despeckle Of SAR Images Using AdaptiveThreshold In Non Sub Sampled ShearletTransform Domain |
Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 10, 09-Special Issue, April 2018, pp. 765-772. |
International( Free)(Indexed in SCOPUS ) |
67 |
A Review of Blockchain Technologyand Its Application in Internet of Things |
International Journal of Management, Technology And Engineering, Volume 8, Issue12 , December 2018 |
International( Free) |
68 |
EPNN Based High Secure Intensive Hidden Digital Watermark Application in Telemedicine |
Advances in Modelling and Analysis A, Vol. 56, No. 1, March, 2019, pp. 21-25 |
International(Indexed in SCOPUS ) |
69 |
A Novel Symmetric Key Cryptography using Multiple Random Secret Keys |
International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013 |
International(0.8 IF) |
70 |
Optimized AODV Routing Algorithm in MANET for Maximizing the Network Lifetime |
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019 |
International(Indexed in SCOPUS ) |
71 |
An Iterative Probabilistic Non-Local Filter Based Denoising Framework For SAR And Medical Images |
Journal of Critical Reviews, ISSN- 2394-5125 Vol 6, Issue 6, December 2019, pp. 386-392. |
International (Indexed in SCOPUS )( Free) |
72 |
A Hybrid Segmentation based majority voting based classification framework for Alzheimer Disease prediction |
Journal of Critical Reviews, ISSN: 2394-5125
pp. : 376-385 Issue6,Volume 6,2019 |
International(Indexed in SCOPUS) (Free ) |
73 |
A Secure Biometrics-Based User Authenticated Key Agreement Protocol for Multi-Server Environments |
International Journal of Advanced Science and Technology Vol. 29, No. 9s, March 2020, pp. 517-532 |
International(Indexed in SCOPUS )( Free) |
74 |
Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN |
Journal of Evolutionary Intelligence, Springer Professional, Special Issue, 28 April 2020, published by Springer Verlag |
International(Indexed in SCOPUS ) |
75 |
Future Internet for Service Oriented Applications |
InternationFchemal Journal of Innovative Technology and Exploring Engineering Vol.- 9 Issue-6 published April 2020,pp-1996-2001,ISSN: 2278-3075. |
International(Indexed in SCOPUS ) |
76 |
Packet Crafting Tools for Cyber Crime Security Attacks |
International Journal of Computer Applications, Foundation of Computer Science (FCS), NY, USA, Vol.-176 Issue-31 published June 2020, pp-28-30, ISSN: 0975 – 8887 |
International |
77 |
A Secure and Light Weight Privacy Preserving Data Aggregation Algorithm for Wireless Sensor Networks |
Journal of Green Engineering, issue 12, pp. 13329-13336, Dec. 2020. ISSN: 2245-4586
Link |
International (Indexed in SCOPUS) |
78 |
Chemical Sensing Through Cogno-Monitoring System for Air Quality Evaluation |
Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough, Studies in Computational Intelligence 885, Link |
International Springer-Verlag GmbH Germany |
79 |
Multi-Level and Mutual Log Integrity Preservation Approach for Cloud Forensics using Public Key Infrastructure |
International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256), Vol.9, Issue.1, February 2021 Edition |
International (Indexed in SCOPUS) |
80 |
Smell Print: CMS-SEN Model for Odor Perception |
International Journal of Scientific Research in Computer Science and Engineering Vol.9, Issue.4, pp.01-07, August (2021) E-ISSN: 2320-7639
DOI: Link |
International (Indexed in SCOPUS) |
81 |
Human Identification with their VOC distribution through CMS–SEN Model |
Soft Computing (2021) 25:13015–13025
Link |
International Springer-Verlag GmbH Germany |
82 |
Spectrum Of Research Challenges In Design Optimizations In Cyber Physical Systems |
Advances and Applications in Mathematical Sciences, Volume 20, Issue 11, September 2021, Pages 2585-2594, Mili Publications |
International UGC Care, Web of Science (ESCI) |
83 |
Automatic identification of drug sensitivity of cancer cell with novel regression-based ensemble convolution neural network model |
Soft Computing (2022) 26:5399–5408
Link |
International Springer-Verlag GmbH Germany, part of Springer Nature 2022 |
84 |
Novel Heuristic Hybrid Model To Handle Automatic Prediction Of Cancer Disease Classification Over Cancer Drug Data Sets |
Indian Journal of Computer Science and Engineering (IJCSE)
DOI: Link Vol. 13 No. 4 Sep-Oct 2022, e-ISSN: 0976-5166, p-ISSN: 2231-3850 |
International |
85 |
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model |
International Journal of Information Security and Privacy, Volume 16 Issue 2, Nov 18, 2022
DOI: Link |
International (Indexed In: Compendex (Elsevier Engineering Index), INSPEC, SCOPUS, Web of Science (ESCI)) |
86 |
Novel and Heuristic MolDoc Scoring Procedure for Identification of Staphylococcus Aureus |
International Journal of Intelligent Systems and Applications in Engineering (IJISAE Int J Intell Syst Appl Eng, vol. 11, no. 2s, pp. 125 –, Jan. 2023. ISSN: 2147-67992. |
International (Scopus indexing) |
87 |
Application of Distributed Constraint Optimization Technique for Privacy Preservation in Cyber-Physical Systems |
Springer, Cham, Feb 4, 2023, Online ISBN-978-3-031-18497-0, DOI Link. |
International |
88 |
Role of Privacy Metrics in Next-Generation smart cities |
Journal of Propulsion Technology, ISSN: 1001-4055, Vol.44 No.4(2023) |
Scopus indexing |
89 |
Comprehensive Analysis on Drug Resistance Prediction, Protein-Protein Interaction, RNA Interaction on Drugs Using Machine Learning Techniques |
Eur. Chem. Bull. Dec-2021, 10(issue 4), 262-279, Section A-Research paper ISSN 2063-5346. |
International |
90 |
Cancer Disease Treatment Classification Using Extended Rough-based Intuitionistic Fuzzy C-means Learning Methodology |
Tuijin Jishu/Journal of Propulsion Technology ISSN: 1001-4055 Vol. 44 No. 3 (2023). |
International |
91 |
A Review on Machine Learning Based Routing Protocols for Delay Tolerant Networks |
IOS Press- Intelligent Decision Technologies 17 (May, 2023) 287–299. DOI: 10.3233/IDT-220018 |
SCOPUS, Web of Science (ESCI) |