Investigation and analysis of Location Based Authentication and Security Services of Wireless LAN’s and Mobile Devices P Sanyasi, JG Naidu published in IJCA 146 (8), 12-17, 2016 | 6 | 2016 |
A novel approach to troubleshoot security attacks in local area networks YVS Murthy, G Jagadish, K Mrunalini, K Siva, PVV Satyanarayana, ... IJCSNS International Journal of Computer Science and Network Security 11 (9 …, 2011 | 6 | 2011 |
A Secure Framework for Communicating Multimedia Data in Cover Images using Hybrid Steganography Algorithms in Wireless Local Area Network PSN Jagadish G International Journal of Innovative Technology and Exploring Engineering …, 2019 | 2 | 2019 |
A novel prototype to secure network using malware detection framework against malware attack in wireless network G Jagadish et al. IJARIIT 5 (2), 286-292, 2019 | 2* | 2019 |
Human Emotion Classification Using Fuzzy and PCA Approach SR Mishra, B Ravikiran, KSM Sudhan, N Anudeep, G Jagdish Proceedings of the International Conference on Frontiers of Intelligent …, 2014 | 2 | 2014 |
Unconstrained optimization for maximizing ultimate tensile strength of pulsed current micro plasma arc welded inconel 625 sheets K Siva Prasad, YV Srinivasa Murthy, C Srinivasa Rao, D Nageswara Rao, ... Proceedings of the International Conference on Information Systems Design …, 2012 | 2 | 2012 |
A Novel Approach on Secure Data Transfer for General Transactions using Secret Sharing Scheme JG J sharmila International Journal of Computer and Applications 172 (8), 10-13, 2017 | 1* | 2017 |
Cellular Automata and their Applications: A Review SMJG Vasantha Murali Krishna IJCA 184 (5), 21-31, 2022 | | 2022 |
A COMPREHENSIVE SURVEY OF BEST PRACTICES OF MOVING SENSITIVE DATA USING CRYPTOGRAPHIC ASPECTS FOR SECURING COMMUNICATION IN WIRELESS IOT AND WIRED UNSECURE NETWORKS ST jagadish gurrala Journal of Crtical Reviews 7 (11), 3397-3406, 2020 | | 2020 |
CRACK DETECTION ON CONCRETE SURFACES USING IMAGE PROCESSING UB G. JAGADISH, K.SRI VARSHA, P. SURYA TEJA, T. AKHIL IJRAR 7 (1), 417-421, 2020 | | 2020 |
ARMY DATA ENCODE USING VISUAL CRYPTOGRAPHY MG Jagadish Andhra University, 2020 | | 2020 |
Scalable Methodology to Hide Audio Data in Cover Image using RGB and Gray Color based Key Positioning Image Steganography PSN Jagadish Gurrala International Journal of Innovative Technology and Exploring Engineering 8 …, 2019 | | 2019 |
Analysis of Existing Text Hiding Algorithms for Image Steganography Using TLNUS and AES J Gurrala, PS Naidu Smart Computing and Informatics, 1-11, 2018 | | 2018 |
Analysis of Existing Text Hiding Algorithms for Image Steganography Using TLNUS and AES J Gurrala, PS Naidu Smart Computing and Informatics, 1-11, 2018 | | 2018 |
A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique AR Mohanthy, J Gurrala Computer Communication, Networking and Internet Security: Proceedings of …, 2017 | | 2017 |
A Study of Low Power Consumable Frameworks for Hiding Audio signals in Image Container Using Different Steganography techniques Using ARM Controller Devices For Smart Living PSN Jagadish Gurrala IJCTA 9 (32), 261-269, 2016 | | 2016 |
Year of Publication: 2016 PS Naidu, J Gurrala | | 2016 |
Enhanced Three Tier Security Scheme for Data Transfer in Mobile Sensor Networks by Using Mobile Sinks J Gurrala Journal of Computing Technologies 5 (5), 200-208, 2015 | | 2015 |
A Novel Approach of Cluster based Routing in Mobile Ad hoc Networks J Gurrala, P Usha, SR Mishra International Journal of Computer Applications 107 (2), 2014 | | 2014 |
Optimal Covering Problem for a MANET through Geometric Theory J Gurrala, J Singampalli Proceedings of the International Conference on Frontiers of Intelligent …, 2014 | | 2014 |