V. Naga Lakshmi

ORCID: 0000-0003-1514-3592
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Digital and Cyber Forensics
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Geochemistry and Geologic Mapping
  • Access Control and Trust
  • Advanced Authentication Protocols Security
  • IPv6, Mobility, Handover, Networks, Security
  • Soil Moisture and Remote Sensing
  • Security and Verification in Computing
  • Innovation in Digital Healthcare Systems
  • Energy and Environment Impacts
  • Spam and Phishing Detection
  • Information and Cyber Security
  • Artificial Intelligence in Healthcare
  • Groundwater and Watershed Analysis
  • Water Quality Monitoring Technologies
  • Peer-to-Peer Network Technologies
  • Mineral Processing and Grinding

GITAM University
2011-2024

Indian Institute of Rice Research
2022

University of Hyderabad
2012-2019

Distributed Denial of Service (DDoS) attacks are distributed at a faster rate, and they considered to be fatal threats over the Internet. Moreover, several deep learning approaches insufficient attain maximum efficiency appropriate detection due complexity diversity DDoS attack traffic under fast fast-speed network environment since providing with individual performance. Hence, an ensemble model is developed for mitigation hybrid optimization algorithm ensure good detective performance...

10.1080/1448837x.2024.2335797 article EN Australian Journal of Electrical & Electronics Engineering 2024-04-21

IPSec provides a framework of protocols for protecting transmissions over an IP network. This allows the creation secure VPN existing Internet, with data fully encrypted and when transferred between two points. resides at network level can be implemented regardless applications used, giving remote users full access to their robust data, voice, or video applications. A big advantage IPsec is that security arrangements handled without requiring changes individual user computers. defines...

10.1109/itng.2011.73 article EN 2011-04-01

Increased population growth, industrialization, and modern culture create a variety of consequences, including environmental pollution, heavy metal accumulation, decreasing energy resources. This perilous position necessitates the development long-term resources strategies to address threats power shortages. In this study, an investigation into use castor seed oil cake waste tyres as feed material for copyrolysis process yielding maximum production was performed. The experiments were...

10.1155/2022/2215883 article EN cc-by Journal of Chemistry 2022-08-25

Purpose In the cloud-computing environment, privacy preservation and enabling security to cloud data is a crucial demanding task. both commercial academic world, of important sensitive needs be safeguarded from unauthorized users improve its security. Therefore, several key generations, encryption decryption algorithms are developed for in environment. Still, outsourced remains with problems like minimum security, time consumption increased computational complexity. The purpose this research...

10.1108/ijpcc-06-2022-0240 article EN International Journal of Pervasive Computing and Communications 2022-10-11

Cloud computing is a rapidly advancing paradigm that enables users to access various services and resources anytime, anywhere. With this advancement, security has become major concern for business organisations individuals, hence, it essential ensure the are provided with high data security. Numerous researches have focused on devising effective techniques enhance However, increasing connectivity, still remains be challenge. This paper devises novel protection scheme in cloud by using...

10.1142/s0219649223500624 article EN Journal of Information & Knowledge Management 2023-11-18

The redesign of cloud storage with the amalgamation cooperative and an immutable unhackable distributed database blockchain thrives towards a strong CIA triad secured data provenance. conspiracy ideology associated traditional has economized like Storj Sia, decentralized storage, which allows renting unused hard drive space getting monetary compensation in exchange cryptocurrency. In this article, authors explain how confidentiality, integrity availability can be progressed along...

10.4018/ijdst.2018100103 article EN International Journal of Distributed Systems and Technologies 2018-08-08

With the present technology, users are generating huge data by using various applications based on usage is transferred to database. Database technology provides an efficient, easy and secured procedures for managing information systematically. All operations of manipulation maintenance done Management System (DBMS) with Computer Networks which has become a powerful medium fast exchange access. Ensuring security database very critical issue any organization. Mainly threats include action...

10.1109/iciss49785.2020.9316042 article EN 2020-12-03

The importance and usage of the distributed cloud is increasing rapidly over a traditionally centralized for storing exchanging digital assets between untrusted parties in many business sectors. Storing considered superior to traditional computing terms environmentally friendly, cost, security other technical dimensions. In this article, contemporary architecture DistProv proposed where an open source IPFS used store transfer consignor consignee. These two are sensitive documents secured by...

10.4018/ijossp.2019070101 article EN International Journal of Open Source Software and Processes 2019-07-01

Abstract The world is becoming increasingly digital at the moment. Every day, a significant amount of data generated by everyone who uses internet nowadays. are critical for carrying out day-to-day operations, as well assisting corporate management in achieving their objectives and making best judgments possible based on information gathered. BigData process merging many hardware software solutions to deal with extremely huge amounts that surpass storage capability. It’s large will be...

10.1088/1742-6596/2089/1/012031 article EN Journal of Physics Conference Series 2021-11-01

10.33564/ijeast.2020.v05i01.113 article EN International Journal of Engineering Applied Sciences and Technology 2020-05-31

10.5281/zenodo.1317959 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2018-07-20

A total of 1010 germplasm accessions collected from different parts India were mass screened for their reaction to Whitebacked planthopper, (Horvath) by standard seedbox screening technique during 2016-2018 at ICAR-Indian Institute Rice Sogatella furcifera Research, Hyderabad.43 exhibited a damage score (DS) ranging 1.39 5.0 and designated as resistant moderately WBPH, 967 susceptible (DS 5.1 9.0).Two IC 75864 (DS-1.39),IC viz., 215295 (DS-2.65)were 41 3.1 5.0).The selected assessed feeding...

10.55362/ije/2022/3599 article EN Indian Journal of Ecology 2022-06-15

The cloud computing is used to compute the resources that provide a means of processing deposition or acquisition data safely through network. Even though customers are feeling convenient from computing, providing security confidential end would still not make them believe use resources. sector needs policies be set and secured technologies needed accessed as they could misused by vulnerabilities. These vulnerabilities increase number attacks which impact on system security. There huge...

10.1109/icais50930.2021.9395972 article EN 2021-03-25
Coming Soon ...