A practical approach to E-mail spam filters to protect data from advanced persistent threat JV Chandra, N Challa, SK Pasupuleti 2016 international conference on circuit, power and computing technologies …, 2016 | 52 | 2016 |
Evaluation of performance characteristics of cryptosystem using text files. C Narasimham, J Pradhan Journal of Theoretical & Applied Information Technology 4 (1), 2008 | 50 | 2008 |
Data security in cloud using RSA P Yellamma, C Narasimham, V Sreenivas 2013 Fourth International Conference on Computing, Communications and …, 2013 | 46 | 2013 |
Performance analysis of public key cryptographic systems rsa and ntru N Challa, J Pradhan International Journal of Computer Science and Network Security 7 (8), 87-96, 2007 | 42 | 2007 |
Advanced persistent threat defense system using self-destructive mechanism for cloud security JV Chandra, N Challa, SK Pasupuleti 2016 IEEE International Conference on Engineering and Technology (ICETECH), 7-11, 2016 | 32 | 2016 |
Data and information storage security from advanced persistent attack in cloud computing JV Chandra, N Challa, MA Hussain International Journal of Applied Engineering Research 9 (20), 7755-7768, 2014 | 31 | 2014 |
Intelligence based defense system to protect from advanced persistent threat by means of social engineering on social cloud platform JV Chandra, N Challa, SK Pasupuleti Indian Journal of Science and Technology, 2015 | 18 | 2015 |
Authentication and authorization mechanism for cloud security JV Chandra, N Challa, SK Pasupuletti International Journal of Engineering and Advanced Technology 8 (6), 2072-2078, 2019 | 15 | 2019 |
Cryptanalysis of multi-prime RSA with two decryption exponents KR Santosh, C Narasimham, P Shetty International Journal of Electronics and Information Engineering 4 (1), 40-44, 2016 | 15 | 2016 |
Machine learning framework to analyze against spear phishing JV Chandra, N Challa, SK Pasupuletti International Journal of Innovative Technology and Exploring Engineering 8, 12, 2019 | 9 | 2019 |
Performance evaluation of encryption techniques and uploading of encrypted data in cloud V Sreenivas, C Narasimham, K Subrahmanyam, P Yellamma 2013 Fourth International Conference on Computing, Communications and …, 2013 | 8 | 2013 |
A cloud model to implement saas V Sreenivas, S SriHarsha, C Narasimham Advanced Materials Research 341, 499-503, 2012 | 7 | 2012 |
Implementing robots in defence through motion capture with mixed reality P Yellamma, CM Bharadwaj, KRK Sai, C Narasimham Int. J. Eng. Technol 7 (232), 114-116, 2018 | 5 | 2018 |
Cryptanalysis of RSA with small prime difference using unravelled linearization S Kumar, C Narasimham International Journal of Computer Applications 61 (3), 2013 | 5 | 2013 |
Lattice based tools in cryptanalysis for public key cryptography RS Kumar, C Narasimham, SP Setty International Journal of Network Security & Its Applications 4 (2), 155, 2012 | 5 | 2012 |
Detection of deceptive phishing based on machine learning techniques JV Chandra, N Challa, SK Pasupuleti Smart Technologies in Data Science and Communication: Proceedings of SMART …, 2020 | 4 | 2020 |
Double-reflecting data perturbation method for information security M Balajee, C Narasimham Orient J Comput Sci Technol 5, 283-288, 2012 | 4 | 2012 |
Controlling and monitoring home appliances through cloud using IoT P Yellamma, A Ramya, C Narasimham PONTE 74 (2/1), 2018 | 3 | 2018 |
Classification of APT’s and Methodological Approach to Secure Cloud Services C Sasanapuri, H Chilsi, C Sudhakar, C Narasimham International Journal of Applied Engineering Research 11 (2), 1000-1005, 2016 | 3 | 2016 |
Cluster Based Feature Subset Selection (CFSS) for High-Dimensional Data C Sudhakar, CS Priya, S Chandini, C Narasimham International Journal of Applied Engineering Research 11 (2), 1369-1372, 2016 | 3 | 2016 |