PUBLICATIONS

    BOOKS

  • Password Authentication Using Associative Memories - A Probabilistic Approach, Lap Lambert Academic Publishing, Germany, 2012, ISBN: 978-3-659-26797-0.
  • Crypto Authentication Using Hilbert Matrices - A Novel Approach, Lap Lambert Academic Publishing, Germany, 2014, ISBN: 978-3-8473-4755-2.
  • Hadoop & R Language, Shree Publishing House, INDIA, 2019, ISBN: 978-938-819-640-6.
  • Data Warehousing and Data Mining, Shree Publishing House, INDIA, 2020, ISBN: 978-93-88196-53-6.
  • Qualitative and Quantitative Parametric Substantiation for Recognition of Text in Ancient Documents, Lambert Publications, India, 2020, ISBN: 978-81-948321-6-4.
  • Log Analysis Methods for Cloud Forensics: For Assisting Cybercrime Investigations in Cloud Environments, LAP LAMBERT Academic Publishing (September 6, 2023), ISBN-13: 978-6206755517
  • Privacy in Cyber Physical Systems: A Primer for Practitioners, Notion Press (30 October 2023), ISBN: 979-8891861725.
  • S.no Publication Title Details of the Conference Type
    1 Extended Alternate Heterogeneous Earliest Finish Time Algorithm Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-09. National
    2 Internet Protocol Security (IPSec) Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-25. National
    3 Evaluating the Effectiveness of Personalized Web Search AICTE Sponsored National Conference on – High Performance Computing and Networking,13th-14th August 2011, Rajampet, Andhra Pradesh, India. National
    4 Password Authentication using Context-Sensitive Associative Memory Neural Networks: A Novel Approach Proceedings of Springer Lecture Notes of the LNICST-85 Series, part-II, pp. 464–478 at the CCSIT 2012, in January 2012 held at Bangalore, India. National
    5 Protocol Sensor Based Embedded Technique for Efficient Water-Saving Agriculture Proceedings of ACNCN2012 conference on advances in communication, navigation and computer networks 17th -18th March, 2012, A.U, Visakhapatnam. National
    6 A Multi Cloud based Approach to Enhance data Security and Availability in Cloud Storage Proceedings of International Conference on ComNet CIIT & ITC 2013, pp.58-63. (Published by Elsevier, with ISBN 978-81-910691-6-3), Organized by ACEEE, in Hyderabad from 08th -09th November 2013. International
    7 Analysis of Cyber-Criminal Profiling and Cyber-Attacks: A Comprehensive study 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
    8 An Innovative Progress Approach for Quantity Mining of item sets 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
    9 An Integrated Approach to Provide Security and Resist Thefts on Digital Data 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
    10 Cloud Forensics: The Need and Challenges A Research & Fact Compendium 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International
    11 Implementation of X.509 Attribute Certificates for Cloud Environments 3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International
    12 A Unified Model for Cherishing Privacy in Database System: An Approach to Overhaul Vulnerabilities First International Conference on Networks & Soft Computing,2014, organized by Vignan’s Foundation for Science, Technology & Research, Guntur, with the Technical Sponsorship of IEEE Hyderabad Section during 19th -20th August 2014(ISBN-978-1-4799-3486-7/14). International
    13 Enhanced DES Algorithm International Conference on Recent Trends and Research Issues in Computer Science and Engineering, held during 02nd – 03rdMay 2015. International
    14 Information Security using Genetic Algorithm with Penultimate and Least Significant Bits Fifth International Conference on Advances in Information Technology and Mobile Communication – AIM 2015, held during 11th -12th July 2015, Bangalore, India. International
    15 MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity Thefts 4th World Conference on Applied Sciences, Engineering & Technology 24-26 October 2015, Kumamoto University, Japan (ISBN13:978-81-930222-1-4). International
    16 Accelerating SQL Queries by Unravelling Performance Bottlenecks in DBMS Engine IEEE International Conference on Energy Systems and Application (ICESA – 2015) 30th October to 01st November 2015, DYPIET Pimpri, Pune India. International
Read More