Follow
D. Lalitha Bhaskari
D. Lalitha Bhaskari
Professor, Computer Science & Systems Engineering, Andhra University College of Engineerin(A
Verified email at andhrauniversity.edu.in - Homepage
Title
Cited by
Cited by
Year
Intrusion detection using random forests classifier with SMOTE and feature reduction
A Tesfahun, DL Bhaskari
2013 International conference on cloud & ubiquitous computing & emerging …, 2013
1552013
Different obfuscation techniques for code protection
CK Behera, DL Bhaskari
Procedia Computer Science 70, 757-763, 2015
912015
A comprehensive analysis of spoofing
PR Babu, DL Bhaskari, CH Satyanarayana
International Journal of Advanced Computer Science and Applications 1 (6), 2010
432010
Cloud forensics-a framework for investigating cyber attacks in cloud environment
SKA Manoj, DL Bhaskari
Procedia Computer Science 85, 149-154, 2016
412016
Effective hybrid intrusion detection system: A layered approach
A Tesfahun, DL Bhaskari
International Journal of Computer Network and Information Security 7 (3), 35, 2015
372015
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures
A Tesfahun, DL Bhaskari
Automatic Control and Computer Sciences 50, 54-62, 2016
352016
“A study on blockchain technology”
DLB P. S. G. Aruna Sri
International Journal of Engineering & Technology 7 (2), 418-421, 2018
242018
An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol.
RS Ranjani, DL Bhaskari, PS Avadhani
Int. J. Netw. Secur. 17 (5), 510-516, 2015
222015
WITHDRAWN: Blockchain technology for secure medical data sharing using consensus mechanism
PSGA Sri, DL Bhaskari
Materials Today: Proceedings, 2020
162020
Identification of leaf diseases in tomato plant based on wavelets and PCA
DND Harini, DL Bhaskari
World Congress on Information and Communication Technologies, 978-1, 2011
162011
Plethora of cyber forensics
N Sridhar, DL Bhaskari, PS Avadhani
International Journal of Advanced Computer Science and Applications 2 (11), 2011
142011
A Combinatorial Approach for Information Hiding Using Steganography And GÖdelization Techniques
DL Bhaskari, PS Avadhani, A Damodaram
Int. J. Syst. Cybern. Inform 10, 21-24, 2007
132007
Image retrieval system based on feature extraction and relevance feedback
DND Harini, DL Bhaskari
Proceedings of the CUBE International Information Technology Conference, 69-73, 2012
122012
Current trends in group key management
RS Ranjani, DL Bhaskari, PS Avadhani
International Journal of Advanced Computer Science and Applications 2 (11), 2011
102011
Image mining issues and methods related to image retrieval system.
DND Harini, DL Bhaskari
International Journal of Advanced Research in Computer Science 2 (4), 2011
92011
Telugu and Hindi Script Recognition using Deep Learning Techniques
DLB P.Sujatha
International Journal of Innovative Technology & Exploring Engineering …, 2019
82019
Botnet detection and countermeasures-a survey
A Tesfahun, DL Bhaskari
International Journal of Emerging Trends & Technology in Computer Science …, 2013
82013
Self-modifying code: a provable technique for enhancing program obfuscation
CK Behera, DL Bhaskari
International Journal of Secure Software Engineering (IJSSE) 8 (3), 24-41, 2017
72017
Fuzzy C-means and fuzzy TLBO for fuzzy clustering
P Gopala Krishna, D Lalitha Bhaskari
Proceedings of the Second International Conference on Computer and …, 2016
72016
A new encryption method for secure transmission of images
BVR Devi, PP Roja, DL Bhaskari, PS Avadhani
International Journal on Computer Science and Engineering 2 (09), 2801-2804, 2010
72010
The system can't perform the operation now. Try again later.
Articles 1–20