- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Digital and Cyber Forensics
- Chaos-based Image/Signal Encryption
- Internet Traffic Analysis and Secure E-voting
- Geochemistry and Geologic Mapping
- Access Control and Trust
- Advanced Authentication Protocols Security
- IPv6, Mobility, Handover, Networks, Security
- Soil Moisture and Remote Sensing
- Security and Verification in Computing
- Innovation in Digital Healthcare Systems
- Energy and Environment Impacts
- Spam and Phishing Detection
- Information and Cyber Security
- Artificial Intelligence in Healthcare
- Groundwater and Watershed Analysis
- Water Quality Monitoring Technologies
- Peer-to-Peer Network Technologies
- Mineral Processing and Grinding
GITAM University
2011-2024
Indian Institute of Rice Research
2022
University of Hyderabad
2012-2019
Distributed Denial of Service (DDoS) attacks are distributed at a faster rate, and they considered to be fatal threats over the Internet. Moreover, several deep learning approaches insufficient attain maximum efficiency appropriate detection due complexity diversity DDoS attack traffic under fast fast-speed network environment since providing with individual performance. Hence, an ensemble model is developed for mitigation hybrid optimization algorithm ensure good detective performance...
IPSec provides a framework of protocols for protecting transmissions over an IP network. This allows the creation secure VPN existing Internet, with data fully encrypted and when transferred between two points. resides at network level can be implemented regardless applications used, giving remote users full access to their robust data, voice, or video applications. A big advantage IPsec is that security arrangements handled without requiring changes individual user computers. defines...
Increased population growth, industrialization, and modern culture create a variety of consequences, including environmental pollution, heavy metal accumulation, decreasing energy resources. This perilous position necessitates the development long-term resources strategies to address threats power shortages. In this study, an investigation into use castor seed oil cake waste tyres as feed material for copyrolysis process yielding maximum production was performed. The experiments were...
Purpose In the cloud-computing environment, privacy preservation and enabling security to cloud data is a crucial demanding task. both commercial academic world, of important sensitive needs be safeguarded from unauthorized users improve its security. Therefore, several key generations, encryption decryption algorithms are developed for in environment. Still, outsourced remains with problems like minimum security, time consumption increased computational complexity. The purpose this research...
Cloud computing is a rapidly advancing paradigm that enables users to access various services and resources anytime, anywhere. With this advancement, security has become major concern for business organisations individuals, hence, it essential ensure the are provided with high data security. Numerous researches have focused on devising effective techniques enhance However, increasing connectivity, still remains be challenge. This paper devises novel protection scheme in cloud by using...
The redesign of cloud storage with the amalgamation cooperative and an immutable unhackable distributed database blockchain thrives towards a strong CIA triad secured data provenance. conspiracy ideology associated traditional has economized like Storj Sia, decentralized storage, which allows renting unused hard drive space getting monetary compensation in exchange cryptocurrency. In this article, authors explain how confidentiality, integrity availability can be progressed along...
With the present technology, users are generating huge data by using various applications based on usage is transferred to database. Database technology provides an efficient, easy and secured procedures for managing information systematically. All operations of manipulation maintenance done Management System (DBMS) with Computer Networks which has become a powerful medium fast exchange access. Ensuring security database very critical issue any organization. Mainly threats include action...
The importance and usage of the distributed cloud is increasing rapidly over a traditionally centralized for storing exchanging digital assets between untrusted parties in many business sectors. Storing considered superior to traditional computing terms environmentally friendly, cost, security other technical dimensions. In this article, contemporary architecture DistProv proposed where an open source IPFS used store transfer consignor consignee. These two are sensitive documents secured by...
Abstract The world is becoming increasingly digital at the moment. Every day, a significant amount of data generated by everyone who uses internet nowadays. are critical for carrying out day-to-day operations, as well assisting corporate management in achieving their objectives and making best judgments possible based on information gathered. BigData process merging many hardware software solutions to deal with extremely huge amounts that surpass storage capability. It’s large will be...
A total of 1010 germplasm accessions collected from different parts India were mass screened for their reaction to Whitebacked planthopper, (Horvath) by standard seedbox screening technique during 2016-2018 at ICAR-Indian Institute Rice Sogatella furcifera Research, Hyderabad.43 exhibited a damage score (DS) ranging 1.39 5.0 and designated as resistant moderately WBPH, 967 susceptible (DS 5.1 9.0).Two IC 75864 (DS-1.39),IC viz., 215295 (DS-2.65)were 41 3.1 5.0).The selected assessed feeding...
The cloud computing is used to compute the resources that provide a means of processing deposition or acquisition data safely through network. Even though customers are feeling convenient from computing, providing security confidential end would still not make them believe use resources. sector needs policies be set and secured technologies needed accessed as they could misused by vulnerabilities. These vulnerabilities increase number attacks which impact on system security. There huge...