Follow
D. Lalitha Bhaskari
D. Lalitha Bhaskari
Professor, Computer Science & Systems Engineering, Andhra University College of Engineerin(A
Verified email at andhrauniversity.edu.in - Homepage
Title
Cited by
Cited by
Year
Intrusion detection using random forests classifier with SMOTE and feature reduction
A Tesfahun, DL Bhaskari
2013 International Conference on Cloud & Ubiquitous Computing & Emerging …, 2013
1182013
Different obfuscation techniques for code protection
CK Behera, DL Bhaskari
Procedia Computer Science 70, 757-763, 2015
642015
Effective hybrid intrusion detection system: A layered approach.
A Tesfahun, DL Bhaskari
International Journal of Computer Network & Information Security 7 (3), 2015
342015
Cloud forensics-a framework for investigating cyber attacks in cloud environment
SKA Manoj, DL Bhaskari
Procedia Computer Science 85, 149-154, 2016
322016
A comprehensive analysis of spoofing
PR Babu, DL Bhaskari, CH Satyanarayana
International Journal of Advanced Computer Science and Applications 1 (6), 2010
312010
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures
A Tesfahun, DL Bhaskari
Automatic Control and Computer Sciences 50 (1), 54-62, 2016
262016
An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol.
RS Ranjani, DL Bhaskari, PS Avadhani
Int. J. Netw. Secur. 17 (5), 510-516, 2015
222015
Identification of leaf diseases in tomato plant based on wavelets and PCA
DND Harini, DL Bhaskari
World Congress on Information and Communication Technologies, 978-1, 2011
162011
“A study on blockchain technology”
DLB P. S. G. Aruna Sri
International Journal of Engineering & Technology 7 (2), 418-421, 2018
102018
Image mining issues and methods related to image retrieval system.
DND Harini, DL Bhaskari
International Journal of Advanced Research in Computer Science 2 (4), 2011
102011
Current trends in group key management
RS Ranjani, DL Bhaskari, PS Avadhani
International Journal of Advanced Computer Science and Applications 2 (11), 2011
102011
A Combinatorial Approach for Information Hiding Using Steganography And GÖdelization Techniques
DL Bhaskari, PS Avadhani, A Damodaram
Journal of IJSCI (International Journal of Systemics, Cybernatics and …, 2007
102007
Image retrieval system based on feature extraction and relevance feedback
DND Harini, DL Bhaskari
Proceedings of the CUBE International Information Technology Conference, 69-73, 2012
92012
Blockchain technology for secure medical data sharing using consensus mechanism
PSGA Sri, DL Bhaskari
Materials Today: Proceedings, 2020
72020
Self-modifying code: a provable technique for enhancing program obfuscation
CK Behera, DL Bhaskari
International Journal of Secure Software Engineering (IJSSE) 8 (3), 24-41, 2017
72017
Botnet detection and countermeasures-a survey
A Tesfahun, DL Bhaskari
International Journal of Emerging Trends & Technology in Computer Science …, 2013
72013
An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol
K Rao, PS Avadhani, DL Bhaskari, K Sarma
International Journal of Research in Engineering and Science (IJRES) 1 (1 …, 2013
72013
Plethora of cyber forensics
N Sridhar, DL Bhaskari, PS Avadhani
International Journal of Advanced Computer Science and Applications 2 (11), 2011
72011
A new encryption method for secure transmission of images
BVR Devi, DL Bhaskari, PP Roja, PS Avadhani
International Journal on Computer Science and Engineering 2 (9), 2801-2804, 2010
72010
A Security Mechanism for library management system using low cost RFID tags
V NagaLakshmi, I Rameshbabu, DL Bhaskari
Journal of Systemics, Cybernetics and Informatics 5 (1), 92-96, 2007
72007
The system can't perform the operation now. Try again later.
Articles 1–20