shashi mogalla
shashi mogalla
Professor of Computer Science and Engineering, Andhra University
No verified email
Cited by
Cited by
Data structures and program design in C
R Kruse, CL Tondo
Pearson Education India, 2007
Atmospheric temperature prediction using support vector machines
Y Radhika, M Shashi
International journal of computer theory and engineering 1 (1), 55-58, 2009
Authentication schemes for session passwords using color and images
M Sreelatha, M Shashi, M Anirudh, MS Ahamer, VM Kumar
International Journal of Network Security & Its Applications 3 (3), 111-119, 2011
Periodic Pattern Mining-Algorithms and Applications
GNVG Sirisha, M Shashi, GV Padma Raju
Global Journal of Computer Science and Technology 13 (13-C), 19, 2013
Cluster feature-based incremental clustering approach (CFICA) for numerical data
AM Sowjanya, M Shashi
International Journal of Computer Science and Network Security 10 (9), 73-79, 2010
An efficient approach to colossal pattern mining
D Madhavi, M Shashi
International Journal of Computer Science & Network Security (IJCSNS) 10 (1 …, 2010
Sequential mining equips e-health with knowledge for managing diabetes
SB Rahaman, M Shashi
4th International Conference on New Trends in Information Science and …, 2010
A rough set based subspace clustering technique for high dimensional data
BJ Lakshmi, M Shashi, KB Madhuri
Journal of King Saud University-Computer and Information Sciences 32 (3 …, 2020
Vectorization of text documents for identifying unifiable news articles
AK Singh, M Shashi
Int. J. Adv. Comput. Sci. Appl 10, 2019
An efficient algorithm for density based subspace clustering with dynamic parameter setting
BJ Lakshmi, KB Madhuri, M Shashi
International Journal of Information Technology and Computer Science 9 (6 …, 2017
A well known tool based graphical authentication technique
S Malempati, S Mogalla
proceedings of the conference CCSEA, 97-104, 2011
Mining frequent patterns of stock data using hybrid clustering
DVS Shalini, M Shashi, AM Sowjanya
2011 Annual IEEE India Conference, 1-4, 2011
Intrusion prevention by image based authentication techniques
M Sreelatha, M Shashi, MR Teja, M Rajashekar, K Sasank
2011 International Conference on Recent Trends in Information Technology …, 2011
An ancient Indian board game as a tool for authentication
S Malempati, S Mogalla
International journal of Network Security and It’s Applications, IJNSA 3 (4 …, 2011
A cluster feature-based incremental clustering approach to mixed data
AM Sowjanya, M Shashi
Journal of Computer Science 7 (12), 1875, 2011
A normalized measure for estimating classification rules for multi-class imbalanced datasets
S Rodda, S Mogalla
International Journal of Engineering Science and Technology 3 (4), 3216-3220, 2011
Deep transductive transfer learning framework for zero-day attack detection
N Sameera, M Shashi
ICT Express 6 (4), 361-367, 2020
A survey on machine learning for cyber security
A Lakshmanarao, M Shashi
Int. J. Sci. Technol. Res 9 (1), 499-502, 2020
A comprehensive literature survey of context-aware recommender systems
SD Seifu, S Mogalla
International Journal of Advanced Research in Computer Science and Software …, 2016
Mining closed interesting subspaces to discover conducive living environment of migratory animals
GNVG Sirisha, M Shashi
Proceedings of the 4th International Conference on Frontiers in Intelligent …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20