Smart Home Intruder Detection System RN Sagar, SP Sharmila, BV Suma International Journal of Advanced Research in Computer Engineering …, 2017 | 12 | 2017 |
A secured authentication system using an effective keystroke dynamics G Jagadamba, SP Sharmila, T Gouda Emerging Research in Electronics, Computer Science and Technology …, 2014 | 12 | 2014 |
A complete ontological survey of cloud forensic in the area of cloud computing SK Mohiddin, SB Yalavarthi, S Sharmila Proceedings of Sixth International Conference on Soft Computing for Problem …, 2017 | 9 | 2017 |
VMSSS: A proposed model for cloud forensic in cloud computing using VM snapshot server S Sharmila, C Aparna Soft Computing for Problem Solving: SocProS 2017, Volume 1, 483-493, 2019 | 6 | 2019 |
Customizing AOSP for different Embedded Devices KV Charan, SP Sharmila, AS Manjunath Computing for Sustainable Global Development (INDIACom), 259-264, 2014 | 5 | 2014 |
A Secured Authentication using Keystroke Dynamics G Jagadamba, SP Sharmila Lecture Notes in Electrical Engineering 248, 253-260, 2014 | 2 | 2014 |
An Operative Application of Distributed Ledger Technology for Banking Domain SP Sharmila, HP Moger International Journal of Computer Science and Mobile Computing 10 (DOI: 10 …, 2021 | 1 | 2021 |
Tools and framework for cyber-physical agricultural systems SK Mohiddin, S Sharmila, V Sharma Agri 4.0 and the Future of Cyber-Physical Agricultural Systems, 37-53, 2024 | | 2024 |
Integration of Mobile Edge Computing in Wireless Technology SK Mohiddin, S Sharmila, V Sharma Wireless Communication Technologies, 1-18, 2024 | | 2024 |
Wireless Technology for Providing Safety in Vanets SK Mohiddin, S Sharmila, V Sharma Wireless Communication Technologies, 19-35, 2024 | | 2024 |
Zero Emission: Challenges and Modern Solutions SK Mohiddin, S Sharmila, MCP Saheb Energy Efficient Vehicles, 19-32, 2024 | | 2024 |
Tracing footprints of anti-forensics and assuring secured data transmission in the cloud using an effective ECCDH and Kalman Filter S Sharmila, C Aparna Journal of Network and Computer Applications 221, 103762, 2024 | | 2024 |
Generation of Attack Graph using MulVal Tool S P Sharmila., Shashwath Prakash., Narendra S Chaudhari. 4th International Conference on Machine Learning, Image Processing, Network …, 2023 | | 2023 |
A Distinguished Method for Network Intrusion Detection using Random Initialized Viterbi Algorithm in Hidden Markov Model SP Sharmila, P Shukla, Narendra S Chaudhari. 2022 OITS International Conference on Information Technology (OCIT), 273-277, 2022 | | 2022 |
A Study on Analysis of Malware in Android Applications Veeraj R Singh., S P Sharmila., Narendra S Chaudhari. International Journal for Research in Applied Science & Engineering …, 2022 | | 2022 |
Conceptual Study of Prevalent Methods for Cyber-Attack Prediction SP Sharmila, NS Chaudhari Expert Clouds and Applications: Proceedings of ICOECA 2022, 631-641, 2022 | | 2022 |
Classification Model for Phishing e-mails with a Datamining Approach SP Sharmila, K Balaji Rao International Journal of Engineering Research in Computer Science and …, 2021 | | 2021 |
Detection of Phishing Websites Using deep Learning Context PNM Poornashree, Sharmila S P, Chaithanya Prakash K P International Journal of Computer Science & Communication,, 30-34, 2020 | | 2020 |
Detection of Phishing Websites using Deep Learning Context SP Sharmila, Poornashree ICCNSC 2020, 2020 | | 2020 |
Rescue Android Application M Namitha, SP Sharmila, Priyanka 2nd National Conference on “Engineering Trends an d Aadvances in …, 2017 | | 2017 |