A survey on intrusion detection system for software defined networks (SDN) Y Hande, A Muddana Research Anthology on Artificial Intelligence Applications in Security, 467-489, 2021 | 50 | 2021 |
A survey on access control models in cloud computing RK Aluvalu, L Muddana Emerging ICT for Bridging the Future-Proceedings of the 49th Annual …, 2015 | 50 | 2015 |
Comprehensive survey on clustering-based efficient data dissemination algorithms for VANET RS Hande, A Muddana 2016 International Conference on Signal Processing, Communication, Power and …, 2016 | 32 | 2016 |
Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud KK Chennam, L Muddana, RK Aluvalu 2017 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | 29 | 2017 |
HASBE Access Control Model with Secure Key Distribution and Efficient Domain Hierarchy for Cloud Computing. R Aluvalu, V Kamliya, L Muddana International Journal of Electrical & Computer Engineering (2088-8708) 6 (2), 2016 | 29 | 2016 |
A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing RK Aluvalu, L Muddana 2016 IEEE International Conference on Computational Intelligence and …, 2016 | 21 | 2016 |
SDN based load balancing technique in internet of vehicle using integrated whale optimization method SA Darade, M Akkalakshmi, DN Pagar AIP Conference Proceedings 2469 (1), 2022 | 15 | 2022 |
Initial centroids for k-means using nearest neighbors and feature means MA Lakshmi, G Victor Daniel, D Srinivasa Rao Soft Computing and Signal Processing: Proceedings of ICSCSP 2018, Volume 1 …, 2019 | 15 | 2019 |
Intrusion detection system using deep learning for software defined networks (SDN) Y Hande, A Muddana 2019 International Conference on Smart Systems and Inventive Technology …, 2019 | 10 | 2019 |
Software-defined network-based intrusion detection system Y Hande, A Muddana, S Darade Innovations in Electronics and Communication Engineering: Proceedings of the …, 2018 | 8 | 2018 |
Cloud security in crypt database server using fine grained access control KK Chennam, MA Lakshmi International Journal of Electrical and Computer Engineering 6 (3), 915, 2016 | 8 | 2016 |
An efficient two stage encryption for securing personal health records in cloud computing KK Chennam, L Muddana International Journal of Services Operations and Informatics 9 (4), 277-296, 2018 | 7 | 2018 |
Denoising of Images Using Deep Convolutional Autoencoders for Brain Tumor Classification. R Vankayalapati, AL Muddana Revue d'Intelligence Artificielle 35 (6), 2021 | 6 | 2021 |
Circular convolution-based feature extraction algorithm for classification of high-dimensional datasets R Tajanpure, A Muddana Journal of Intelligent Systems 30 (1), 1026-1039, 2021 | 5 | 2021 |
Optimization of autonomous vehicle speed control mechanisms using hybrid DDPG-SHAP-DRL-stochastic algorithm C Syavasya, AL Muddana Advances in Engineering Software 173, 103245, 2022 | 4 | 2022 |
Load balancing strategy in software defined network by improved whale optimization algorithm SA Darade, M Akkalakshmi Journal of High Speed Networks 27 (2), 151-167, 2021 | 4 | 2021 |
Improving classification performance of neuro fuzzy classifier by imputing missing data B Tarle, M Akkalaksmi Int J Comput 18 (4), 495-501, 2019 | 4 | 2019 |
Privacy and access control for security of Credit Card records in the cloud using partial shuffling KK Chennam, L Mudanna 2016 IEEE International Conference on Computational Intelligence and …, 2016 | 4 | 2016 |
Energy efficient polynomial based group key management protocol for secure group communications in MANET G Narayana, M Akkalakshmi, A Damodaram Int J Appl Eng Res 11 (9), 6701-6705, 2016 | 4 | 2016 |
A Study on Software Defined Networking YS Hande, M Akkalakshmi International Journal of Innovative Research in Computer and Communication …, 2015 | 4 | 2015 |