A comprehensive study and comparison of various methods on data leakages BR Koti, DGVSR Kumar, DY Srinivas International Journal of Advanced Research in Computer Science 8 (7), 627-631, 2017 | 11* | 2017 |
Smart Grid Communication and information technologies for cyber security, data privacy, and policy issues BRK GVS Raj Kumar , AVH Sai Prasad , B. Padma Sustainable Networks in Smart Grid, 1-29, 2022 | 9 | 2022 |
Secret image sharing technique based on bitwise XOR RB Koti, KN Kumar, GVSR Kumar International Journal of Science, Engineering and Computer Technology 6 (5), 138, 2016 | 5 | 2016 |
Information leakage detection and protection of leaked information by using the MAC-IP binding technique BR Koti, GVSR Kumar International Journal of Engineering & Technology 7 (1.7), 230-235, 2018 | 4 | 2018 |
Influence of social information networks and their propagation BR Koti, GVSR Kumar, KN Kumar, Y Srinivas Security in IoT Social Networks, 83-108, 2021 | 1 | 2021 |
Identification of Guilt Agent and Leaked Data by Using MAC-IP BR Koti, GVSR Kumar, Y Srinivas International Journal of Applied Engineering Research 12 (22), 12237-12245, 2017 | 1 | 2017 |
Distributed semantic architecture for smart grids: an industrial approach DS Krishna, BR Koti, PM Rao Sustainable Networks in Smart Grid, 149-177, 2022 | | 2022 |
Automatic Number Plate Recognition using Region-based Convolution Neural Network and LSTM DBRK Dr. S. Praveen Kumar, Dr. Sreenu Ponnada, K.Bhargav International Journal of Grid and Distributed Computing 13 (1), 1724–1732, 2020 | | 2020 |
Identification of Information Leakage and Guilt Agent by using MAC-IP Binding and Recursive Partitioning Algorithm to Modulate the Uncertainty in the Organization’s Network DKNK B. Raja Koti, Dr. G V S Raj Kumar International Journal of Innovative Technology and Exploring Engineering 9 …, 2019 | | 2019 |
A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model DKNK B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas Journal International Journal of Advanced Computer Science and Applications …, 2018 | | 2018 |
Using public key cryptography and digital signatures to ensure data security in cloud computing BR KOTI, SN VARSHINI, K SAI, NYVR MOHAN, GSAI ROHITH | | |