DEPARTMENT OFFERED COURSES
@B-TECH
@M-TECH
S.NO | Name of the Faculty | Journal Name | Year & Month of Publication | Vol.No.,Issue No & Pg.No's | Title | Name of Authors(as Published) |
---|---|---|---|---|---|---|
1 | Mr.P.Srinivas Rao | International Journal of Research | Mar-17 | ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | An Evaluation of Detection of Outliers by Reverse Nearest Neighbours Method | Mr.P.Srinivas Rao |
2 | Mr.P.Srinivas Rao | International Journal of Research | Mar-17 | ISSN: 2348-6848 e-ISSN: 2348-795X Volume 04 Issue 03 | A Study on Important Considerations for Designing Fault Tolerant Systems | Mr.P.Srinivas Rao |
3 | Mr.P.Srinivas Rao | IJATIR | Mar-17 | ISSN 2348-2370 Vol.09,Issue.03 | Mixed Reality: Augmented - Virtual and Its Usage in Medical Sciences | Mr.P.Srinivas Rao |
4 | Mr.P.Srinivas Rao | International Journal of Research | Mar-17 | Volume 4 p-ISSN:2348-6848 Issue 6 | Detecting Packet Drop and Forgery Attacks in Wireless Sensor Networks | Mr.P.Srinivas Rao |
5 | Mr.K.Srinivas | International Journal of Research | Mar-17 | p-ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | Malicious Detection of Packet Dropping in Wireless Adhoc Network | Mr.K.Srinivas |
6 | Mr.R.Bharath Kumar | International Journal of Research | Mar-17 | p-ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | -Authority Identity-Based Encryption In Cloud Computing | Mr.R.Bharath Kumar |
7 | Mrs.G.Jose Mary | International Journal of Research | Mar-17 | p-ISSN: 2348-6848 e-ISSN: 2348-795X Volume 04 Issue 03 | A Study on Important Considerations for Designing Fault Tolerant Systems | Mrs.G.Jose Mary |
8 | Mrs.G.Jose Mary | International Journal of Research | Mar-17 | p-ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | Best Keyword Cover Search Using Spatial Data | Mrs.G.Jose Mary |
9 | Mrs.S.Gouthami | International Journal of Research | 3-Mar-17 | ISSN: 2348-6848 e-ISSN: 2348-795X Volume 04 Issue 03 | A Study on Important Considerations for Designing Fault Tolerant Systems | Mrs.S.Gouthami |
10 | Mrs.S.Gouthami | IJATIR | Mar-17 | ISSN 2348-2370 Vol.09,Issue.03 | Mixed Reality: Augmented - Virtual and Its Usage in Medical Sciences | Mrs.S.Gouthami |
11 | Mrs.S.Gouthami | International Journal of Research | march 2017 | ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | Identification of Path Nearby Clusters in Spatial Networks | Mrs.S.Gouthami |
12 | Mrs. L.Tarasvi | International Journal of Research | Mar-17 | ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | A Secure and Authorized Data-Deduplication Using Hybrid Cloud | Mrs. L.Tarasvi |
13 | Mrs.K.A M.Sushma | International Journal of Research | march 2017 | ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | Evaluation of Detection of Outliers by Reverse Nearest Neighbours Method | Mrs.K.A M.Sushma |
14 | Mr.M.Narender | International Journal of Research | march 2017 | ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | IP Spoofers Location Detection Using Backscatter | Mr.M.Narender |
15 | Mr B.Naresh | International Journal of Research , | Mar-17 | ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | Content -Based Publish/Subscribe Systems For Reliable Matching Service | Mr B.Naresh |
16 | Mrs.S.Sandya | International Journal of Research , | Mar-17 | ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | Secure Ranked Multi-Keyword Search in Encrypted Cloud Data | Mr.Rajender, Mrs.S.Sandya, P.Srinivas Rao |
17 | Mr.P.Anand Kumar | International Journal of Research , | Mar-17 | p-ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | Detection Of Fraud Ranking For Mobile Apps", | Mr.P.Anand Kumar |
18 | Mr.D.Upender | International Journal of Research , | Mar-17 | p-ISSN:2348-6848,e-ISSN:2348-795X,Volume 4 Issue 6 | Secure Analysis Of Data Aggregation Technique For Wireless Sensor Network | Mr.D.Upender |
S.NO | Name of the Faculty | Journal Name | Year & Month of Publication | Vol.No.,Issue No & Pg.nos | Title | Name of Authors(as Published) |
---|---|---|---|---|---|---|
1 | Mr.P.Srinivas Rao | National conference on Current Research Advances in Computer Science, | March 17, | ISBN: 978-93-5230-183-6 . | A Novel Mechanism for Fine-Grained Multi-Keyword Search over Encrypted Cloud Data" | S.Gouthami, G.Josemary, Mr.P.Srinivas Rao |
2 | Mr.P.Srinivas Rao | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | "Analysis of Context Based Diversification for Keyword Search Queries over XML Data", | Ch.Priyanka, M.Narender, Mr.P.Srinivas |
3 | Mr.P.Srinivas Rao | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | A Survey of Attacks And Countermeasures in Mobile Ad Hoc Network | Mr.K.Srinivas, L.Tarasvi, P.Srinivas Rao |
4 | Mr.P.Srinivas Rao | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | A multi-Dta Sharing in Cloud Storage using key Aggregate Searchable Encryption. | M.Narender, R.Bharath Kumar, Mr.P.Srinivas Rao |
5 | Mr.K.Srinivas | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | A Survey of Attacks And Countermeasures in Mobile Ad Hoc Network", | Mr.K.Srinivas |
6 | Mr.R.Bharath Kumar | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | ."Multi-Authority Identity-Based Encryption in Cloud Computing", | T.sampath, M.Narender, Mr.R.Bharath Kumar |
7 | Mr.R.Bharath Kumar | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | A multi-Data Sharing in Cloud Storage using key Aggregate Searchable Encryption." | M.Narender, R.Bharath Kumar, Mr.P.Srinivas Rao |
8 | Mrs.G.Jose Mary | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | A Novel Mechanism for Fine-Grained Multi-Keyword Search over Encrypted Cloud Data | S.Gouthami, G.Josemary, Mr.P.Srinivas Rao |
9 | Mrs.S.Gouthami | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | A Novel Mechanism for Fine-Grained Multi-Keyword Search over Encrypted Cloud Data | S.Gouthami, G.Josemary, Mr.P.Srinivas Rao |
10 | Mrs. L.Tarasvi | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | A Survey of Attacks And Countermeasures in Mobile Ad Hoc Network", | Mr.K.Srinivas, L.Tarasvi, P.Srinivas Rao |
11 | Mr.M.Narender | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | Multi-Authority Identity-Based Encryption in Cloud Computing", | Mr.M.Narender |
12 | Mr.M.Narender | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | "Analysis of Context Based Diversification for Keyword Search Queries over XML Data", | Ch.Priyanka, M.Narender, Mr.P.Srinivas |
13 | Mr.M.Narender | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | A multi-Dta Sharing in Cloud Storage using key Aggregate Searchable Encryption." | M.Narender, R.Bharath Kumar, Mr.P.Srinivas Rao |
14 | Mr.T.Sampath | National conference on Current Research Advances in Computer Science | March 17, | ISBN: 978-93-5230-183-6 . | Multi-Authority Identity-Based Encryption in Cloud Computing", | T.sampath, M.Narender and Mr.R.Bharath Kumar |
S. No. | Name Of Faculty | Title | Type |
---|---|---|---|
1. | Dr.Jayadev Gyani | ➽ A Comprehensive Model for Detecting Fake Profiles in Online Social Networks ➽ Making Facebook More Secure |
Journal |
2. | Dr. S. Kirubakaran | ➽ An Improved SIP Protocol in Heterogeneous Mobile Network for Efficient Communication ➽ Auto-BugTriager for Software Development and Maintenance in Domain Specific Environment |
Journal |
3. | Mr.P.Srinivas Rao | ➽ An Evaluation of Detection of Outliers by Reverse Nearest Neighbours Method ➽ A Study on Important Considerations for Designing Fault Tolerant Systems ➽ Mixed Reality: Augmented – Virtual and Its Usage in Medical Sciences ➽ Detecting Packet Drop and Forgery Attacks in Wireless Sensor Networks ➽ A Semantic Life Style Friend Finder Recommendation Services ➽ A Comprehensive Model for Detecting Fake Profiles in Online Social Networks ➽ Making Facebook More Secure. ➽ Secure Ranked Multi-Keyword Search in Encrypted Cloud Data ➽ Best Keyword Cover Search Using Spatial Data ➽ Malicious Detection of Packet Dropping in Wireless Adhoc Network ➽ Multi-Authority Identity-Based Encryption In Cloud Computing" ➽ Identification of Path Nearby Clusters in Spatial Networks ➽ IP Spoofers Location Detection Using Backscatter ➽ Secure Analysis Of Data Aggregation Technique For Wireless Sensor Network ➽ Data Integrity Auditing for Secure Sharing in Cloud with Group User Revocation ➽ A Secure and Authorized Data-Deduplication Using Hybrid Cloud ➽ Content -Based Publish/Subscribe Systems For Reliable Matching Service ➽ Mixed Reality: Augmented – Virtual and Its Usage in Medical Sciences ➽ Detection Of Fraud Ranking For Mobile Apps |
Journal |
4. | Mr.K.Srinivas | ➽ Malicious Detection of Packet Dropping in Wireless Adhoc Network | Journal |
5. | Mr.R.Bharath Kumar | ➽ Multi-Authority Identity-Based Encryption In Cloud Computing" ➽ Data Integrity Auditing for Secure Sharing in Cloud with Group User Revocation |
Journal |
6. | Mrs.G.Jose Mary | ➽ A Study on Important Considerations for Designing Fault Tolerant Systems ➽ Best Keyword Cover Search Using Spatial Data |
Journal |
7. | Mrs.S.Gouthami | ➽ A Study on Important Considerations for Designing Fault Tolerant Systems ➽ Mixed Reality: Augmented – Virtual and Its Usage in Medical Sciences ➽ Identification of Path Nearby Clusters in Spatial Networks |
Journal |
8. | Mr B.Naresh | ➽ Content -Based Publish/Subscribe Systems For Reliable Matching Service | Journal |
9. | Mrs. L.Tarasvi | ➽ A Secure and Authorized Data-Deduplication Using Hybrid Cloud | Journal |
10. | Mrs.K.A M.Sushma | ➽ An Evaluation of Detection of Outliers by Reverse Nearest Neighbours Method | Journal |
11. | Mr.M.Narender | ➽ IP Spoofers Location Detection Using Backscatter ➽ A Semantic Life Style Friend Finder Recommendation Services ➽ Detecting Packet Drop and Forgery Attacks in Wireless Sensor Networks ➽ Detecting Packet Drop and Forgery Attacks in Wireless Sensor Networks |
Journal |
12. | Mrs.S.Sandhya | ➽ Secure Ranked Multi-Keyword Search in Encrypted Cloud Data | Journal |
13. | Mr.P.Anand | ➽ Detection Of Fraud Ranking For Mobile Apps | Journal |
13. | Mr.D.Upender | ➽ Secure Analysis Of Data Aggregation Technique For Wireless Sensor Network | Journal |