Implementation and Mitigation for Cyber Attacks with proposed OCR Process Model R Banoth, G Arunakranthi, P Vachhani, S Kalaria, R Rathod NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO, 2149-2160, 2021 | 14 | 2021 |
Big Data Analytics for Cyber Security using binary crow search algorithm based Deep Neural Network R Banoth, AK Godishala 2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-5, 2022 | 4 | 2022 |
A Special Acknowledgement based Routing for Mesh Network. B Raj Kumar, G Aruna Kranthi, B Phaniraja International Journal of Advanced Research in Computer Science 3 (1), 2012 | 4 | 2012 |
A Healthcare Monitoring System for Predicting Heart Disease through Recurrent Neural Network R Banoth, AK Godishala, R Veena, H Yassin 2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-7, 2022 | 3 | 2022 |
Next Generation Smart Wardrobe Management System using IoT R Banoth, A Godishala, H Yassin, R Veena 2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-4, 2022 | 3 | 2022 |
Evolution for a secured path using NexGen firewalls B Rajkumar, G Arunakranthi 2022 OPJU International Technology Conference on Emerging Technologies for …, 2023 | 2 | 2023 |
A Comprehensive Guide to Information Security Management and Audit R Banoth, G Narsimha, AK Godishala CRC Press, 2022 | 2 | 2022 |
A location guard approach: An efficacious scheme to alleviate DoS attacks KS Dr B Rajkumar, G Arunakranthi International Journal of Advanced Research in Computer Science 2 (4), 542 - 546, 2011 | 2 | 2011 |
Investigation of Superpixel Image Segmentation AK Godishala, H Yassin, DTC Lai, R Veena 2022 OPJU International Technology Conference on Emerging Technologies for …, 2023 | | 2023 |
A channel of communication through secured 3-party AQKDP G Ramesh, G Arunakranthi, K Goutham, M Satish Materials Today: Proceedings 80, 1723-1726, 2023 | | 2023 |
Breast Cancer Tumor Image Classification Using Deep Learning Image Data Generator AK Godishala, H Yassin, R Veena, DTC Lai 2022 7th International Conference on Image, Vision and Computing (ICIVC …, 2022 | | 2022 |
Vulnerability Analysis and Defense against attacks: Implications of Trust-based cross-layer security protocol for mobile adhoc networks DBR Dr R Naveen Kumar, G Arunakranthi International conference on Information Technology for real world problems …, 2009 | | 2009 |