Follow
Arunakranthi G
Arunakranthi G
Ph.D scholar
Verified email at ubd.edu.bn
Title
Cited by
Cited by
Year
 Implementation and Mitigation for Cyber Attacks with proposed OCR Process Model
R Banoth, G Arunakranthi, P Vachhani, S Kalaria, R Rathod
NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO, 2149-2160, 2021
142021
Big Data Analytics for Cyber Security using binary crow search algorithm based Deep Neural Network
R Banoth, AK Godishala
2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-5, 2022
42022
A Special Acknowledgement based Routing for Mesh Network.
B Raj Kumar, G Aruna Kranthi, B Phaniraja
International Journal of Advanced Research in Computer Science 3 (1), 2012
42012
A Healthcare Monitoring System for Predicting Heart Disease through Recurrent Neural Network
R Banoth, AK Godishala, R Veena, H Yassin
2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-7, 2022
32022
Next Generation Smart Wardrobe Management System using IoT
R Banoth, A Godishala, H Yassin, R Veena
2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-4, 2022
32022
Evolution for a secured path using NexGen firewalls
B Rajkumar, G Arunakranthi
2022 OPJU International Technology Conference on Emerging Technologies for …, 2023
22023
A Comprehensive Guide to Information Security Management and Audit
R Banoth, G Narsimha, AK Godishala
CRC Press, 2022
22022
A location guard approach: An efficacious scheme to alleviate DoS attacks
KS Dr B Rajkumar, G Arunakranthi
International Journal of Advanced Research in Computer Science 2 (4), 542 - 546, 2011
22011
Investigation of Superpixel Image Segmentation
AK Godishala, H Yassin, DTC Lai, R Veena
2022 OPJU International Technology Conference on Emerging Technologies for …, 2023
2023
A channel of communication through secured 3-party AQKDP
G Ramesh, G Arunakranthi, K Goutham, M Satish
Materials Today: Proceedings 80, 1723-1726, 2023
2023
Breast Cancer Tumor Image Classification Using Deep Learning Image Data Generator
AK Godishala, H Yassin, R Veena, DTC Lai
2022 7th International Conference on Image, Vision and Computing (ICIVC …, 2022
2022
Vulnerability Analysis and Defense against attacks: Implications of Trust-based cross-layer security protocol for mobile adhoc networks
DBR Dr R Naveen Kumar, G Arunakranthi
International conference on Information Technology for real world problems …, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–12