Follow
muddana lakshmi
muddana lakshmi
Verified email at gitam.edu - Homepage
Title
Cited by
Cited by
Year
A survey on intrusion detection system for software defined networks (SDN)
Y Hande, A Muddana
Research Anthology on Artificial Intelligence Applications in Security, 467-489, 2021
502021
A survey on access control models in cloud computing
RK Aluvalu, L Muddana
Emerging ICT for Bridging the Future-Proceedings of the 49th Annual …, 2015
502015
Comprehensive survey on clustering-based efficient data dissemination algorithms for VANET
RS Hande, A Muddana
2016 International Conference on Signal Processing, Communication, Power and …, 2016
322016
Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud
KK Chennam, L Muddana, RK Aluvalu
2017 2nd IEEE International Conference on Recent Trends in Electronics …, 2017
292017
HASBE Access Control Model with Secure Key Distribution and Efficient Domain Hierarchy for Cloud Computing.
R Aluvalu, V Kamliya, L Muddana
International Journal of Electrical & Computer Engineering (2088-8708) 6 (2), 2016
292016
A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing
RK Aluvalu, L Muddana
2016 IEEE International Conference on Computational Intelligence and …, 2016
212016
SDN based load balancing technique in internet of vehicle using integrated whale optimization method
SA Darade, M Akkalakshmi, DN Pagar
AIP Conference Proceedings 2469 (1), 2022
152022
Initial centroids for k-means using nearest neighbors and feature means
MA Lakshmi, G Victor Daniel, D Srinivasa Rao
Soft Computing and Signal Processing: Proceedings of ICSCSP 2018, Volume 1 …, 2019
152019
Intrusion detection system using deep learning for software defined networks (SDN)
Y Hande, A Muddana
2019 International Conference on Smart Systems and Inventive Technology …, 2019
102019
Software-defined network-based intrusion detection system
Y Hande, A Muddana, S Darade
Innovations in Electronics and Communication Engineering: Proceedings of the …, 2018
82018
Cloud security in crypt database server using fine grained access control
KK Chennam, MA Lakshmi
International Journal of Electrical and Computer Engineering 6 (3), 915, 2016
82016
An efficient two stage encryption for securing personal health records in cloud computing
KK Chennam, L Muddana
International Journal of Services Operations and Informatics 9 (4), 277-296, 2018
72018
Denoising of Images Using Deep Convolutional Autoencoders for Brain Tumor Classification.
R Vankayalapati, AL Muddana
Revue d'Intelligence Artificielle 35 (6), 2021
62021
Circular convolution-based feature extraction algorithm for classification of high-dimensional datasets
R Tajanpure, A Muddana
Journal of Intelligent Systems 30 (1), 1026-1039, 2021
52021
Optimization of autonomous vehicle speed control mechanisms using hybrid DDPG-SHAP-DRL-stochastic algorithm
C Syavasya, AL Muddana
Advances in Engineering Software 173, 103245, 2022
42022
Load balancing strategy in software defined network by improved whale optimization algorithm
SA Darade, M Akkalakshmi
Journal of High Speed Networks 27 (2), 151-167, 2021
42021
Improving classification performance of neuro fuzzy classifier by imputing missing data
B Tarle, M Akkalaksmi
Int J Comput 18 (4), 495-501, 2019
42019
Privacy and access control for security of Credit Card records in the cloud using partial shuffling
KK Chennam, L Mudanna
2016 IEEE International Conference on Computational Intelligence and …, 2016
42016
Energy efficient polynomial based group key management protocol for secure group communications in MANET
G Narayana, M Akkalakshmi, A Damodaram
Int J Appl Eng Res 11 (9), 6701-6705, 2016
42016
A Study on Software Defined Networking
YS Hande, M Akkalakshmi
International Journal of Innovative Research in Computer and Communication …, 2015
42015
The system can't perform the operation now. Try again later.
Articles 1–20