Follow
Dr. B Raja Koti
Title
Cited by
Cited by
Year
A comprehensive study and comparison of various methods on data leakages
BR Koti, DGVSR Kumar, DY Srinivas
International Journal of Advanced Research in Computer Science 8 (7), 627-631, 2017
11*2017
Smart Grid Communication and information technologies for cyber security, data privacy, and policy issues
BRK GVS Raj Kumar , AVH Sai Prasad , B. Padma
Sustainable Networks in Smart Grid, 1-29, 2022
92022
Secret image sharing technique based on bitwise XOR
RB Koti, KN Kumar, GVSR Kumar
International Journal of Science, Engineering and Computer Technology 6 (5), 138, 2016
52016
Information leakage detection and protection of leaked information by using the MAC-IP binding technique
BR Koti, GVSR Kumar
International Journal of Engineering & Technology 7 (1.7), 230-235, 2018
42018
Influence of social information networks and their propagation
BR Koti, GVSR Kumar, KN Kumar, Y Srinivas
Security in IoT Social Networks, 83-108, 2021
12021
Identification of Guilt Agent and Leaked Data by Using MAC-IP
BR Koti, GVSR Kumar, Y Srinivas
International Journal of Applied Engineering Research 12 (22), 12237-12245, 2017
12017
Distributed semantic architecture for smart grids: an industrial approach
DS Krishna, BR Koti, PM Rao
Sustainable Networks in Smart Grid, 149-177, 2022
2022
Automatic Number Plate Recognition using Region-based Convolution Neural Network and LSTM
DBRK Dr. S. Praveen Kumar, Dr. Sreenu Ponnada, K.Bhargav
International Journal of Grid and Distributed Computing 13 (1), 1724–1732, 2020
2020
Identification of Information Leakage and Guilt Agent by using MAC-IP Binding and Recursive Partitioning Algorithm to Modulate the Uncertainty in the Organization’s Network
DKNK B. Raja Koti, Dr. G V S Raj Kumar
International Journal of Innovative Technology and Exploring Engineering 9 …, 2019
2019
A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model
DKNK B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas
Journal International Journal of Advanced Computer Science and Applications …, 2018
2018
Using public key cryptography and digital signatures to ensure data security in cloud computing
BR KOTI, SN VARSHINI, K SAI, NYVR MOHAN, GSAI ROHITH
The system can't perform the operation now. Try again later.
Articles 1–11