Fault tolerant workflow scheduling based on replication and resubmission of tasks in Cloud Computing SK Jayadivya, JS Nirmala, MSS Bhanu International Journal on Computer Science and Engineering 4 (6), 996, 2012 | 55 | 2012 |
Detection of economic denial of sustainability using time spent on a web page in cloud A Koduru, TR Neelakantam 2013 IEEE International Conference on Cloud Computing in Emerging Markets …, 2013 | 38 | 2013 |
A comparative study of the secret sharing algorithms for secure data in the cloud SJ Nirmala, SMS Bhanu, AA Patel International Journal on Cloud Computing: Services and Architecture (IJCCSA …, 2012 | 33 | 2012 |
UbCadet: detection of compromised accounts in twitter based on user behavioural profiling S Pv, SMS Bhanu Multimedia Tools and Applications 79 (27), 19349-19385, 2020 | 30 | 2020 |
A hyper-heuristic approach for efficient resource scheduling in grid SMS Bhanu, NP Gopalan International Journal of Computers Communications & Control 3 (3), 249-258, 2008 | 30 | 2008 |
Catfish-PSO based scheduling of scientific workflows in IaaS cloud SJ Nirmala, SMS Bhanu Computing 98, 1091-1109, 2016 | 26 | 2016 |
Behaviour profiling of reactions in facebook posts for anomaly detection PV Savyan, SMS Bhanu 2017 Ninth International Conference on Advanced Computing (ICoAC), 220-226, 2017 | 24 | 2017 |
ESKEA: enhanced symmetric key encryption algorithm based secure data storage in cloud networks with data deduplication S Elkana Ebinazer, N Savarimuthu, S Mary Saira Bhanu Wireless Personal Communications 117, 3309-3325, 2021 | 23 | 2021 |
Data collection techniques for forensic investigation in cloud TR Sree, SMS Bhanu Digital Forensic Science, 2020 | 23 | 2020 |
Auto-scale: automatic scaling of virtualised resources using neuro-fuzzy reinforcement learning approach T Veni, SMS Bhanu International Journal of Big Data Intelligence 3 (3), 145-153, 2016 | 20 | 2016 |
Analyzing user behavior using keystroke dynamics to protect cloud from malicious insiders MB Bondada, SMS Bhanu 2014 IEEE international conference on cloud computing in emerging markets …, 2014 | 19 | 2014 |
Qos based scheduling of workflows in cloud computing SK Jayadivya, SMS Bhanu About ICCC-2012 1, 47, 2012 | 19 | 2012 |
HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce TR Sree, SMS Bhanu Security and Communication Networks 9 (17), 4341-4357, 2016 | 18 | 2016 |
Detection of HTTP flooding attacks in cloud using fuzzy bat clustering T Raja Sree, S Mary Saira Bhanu Neural Computing and Applications 32 (13), 9603-9619, 2020 | 15 | 2020 |
A survey on code injection attacks in mobile cloud computing environment JN OS, SMS Bhanu 2018 8th International Conference on Cloud Computing, Data Science …, 2018 | 15 | 2018 |
A survey on dynamic energy management at virtualization level in cloud data centers T Veni, S Bhanu Computer Science & Information Technology 3, 107-117, 2013 | 15 | 2013 |
Two layered protection for sensitive data in cloud KK Hingwe, SMS Bhanu 2014 international conference on advances in computing, communications and …, 2014 | 14 | 2014 |
Mobility and battery power prediction based job scheduling in mobile grid environment SS Vaithiya, SM Saira Bhanu International Conference on Parallel Distributed Computing Technologies and …, 2011 | 13 | 2011 |
Detection of http flooding attacks in cloud using dynamic entropy method TR Sree, SMS Bhanu Arabian Journal for Science and Engineering 43 (12), 6995-7014, 2018 | 12 | 2018 |
A survey on data integrity checking and enhancing security for cloud to fog computing KU Maheswari, SMS Bhanu, S Nickolas 2020 2nd International Conference on Innovative Mechanisms for Industry …, 2020 | 11 | 2020 |