Department | : | Computer Science and Engineering |
Qualification | : | B.E., M.Tech., Ph.D |
Phone(Office) | : | |
Mobile | : | 9618719229 |
: | asnchakravarthy@jntucek.ac.in | |
Date of Birth | : | 25/05/1980 |
Date of Joining | : | 01/01/2013 |
Subjects Taught | : | C & Data Structures, Design & Analysis of Algorithms, Operating Systems & System Programming, Advanced Computer Architecture, Distributed Systems, Artificial Intelligence, Computer Organization, Software Engineering, Data Mining and Data Ware Housing, Computer Communications, Human Computer Interaction, Network Security & Cryptography, Advanced Computer Networks, Computer Forensics, E-Commerce, Advanced Operating Systems, Cyber Crime Investigations and Digital Forensics, Operating Systems Administration and Security, Principles of Secure Coding, Principles of Cyber Security, Cloud Computing, Wireless Network Security |
Research Area | : | Computer Networks, Steganography, Watermarking, Data Security, Password Authentication, Biometrics, Cyber Security, Cloud Privacy and Digital Forensics. |
Teaching Experience | : | 21 Years |
Research Experience | : | 15 Years |
Industry/Professional Experience | : | |
Personal Webpage | : |
JOURNALPUBLICATIONS:
S. No. Publication Title Details of the Journal
Type
1. A Probabilistic Approach For Authenticating Text or Graphical
Passwords Using Back Propagation International Journal Of Computer Science And Network Security (IJCSNS), VOL.11 No.5, May 2011, pp. 242-251. International
2. A Study on Back Propagation Models through Hidden Units Advances in Computational Sciences and Technology (ACST) ISSN 09736107 Volume 4 Number 2 (2011) pp.
213-227. National
3. A Novel Approach For Intranet Mailing For Providing User
Authentication International Journal of Computer
Science and Information Security (IJCSIS), pp. 158-163, Vol. 9, No. 6, June 2011. International
4. A Novel Approach For Authenticating Textual Or
Graphical Passwords Using
Hopfield Neural Network Advanced Computing: An International Journal (ACIJ), pp. 33-46, Vol.2, No.4, July 2011. International
5. A Cryptosystem Based On Hilbert
Matrix Using Cipher Block Chaining Mode International Journal of Mathematics Trends and Technology (IJMTT), pp.
17-22, July to Aug Issue 2011. International
6. Handwritten Text Image Authentication Using Back
Propagation. International Journal of Network Security & Its Applications (IJNSA), pp.121-130, Vol.3, No.5, Sep 2011. International
7. Hilbert Matrix Based Cryptosystem Using A Session Key International Journal of Engineering Research and Applications (IJERA)Vol.
1, Issue 3, pp.711-715Sep-Oct 2011. International
8. A Novel Approach for Pass Word
Authentication Using Brain -State In -a Box (BSB) Model International Journal of Computer Science and Information Technologies (IJCSIT), pp. 2127-2131, Volume 2 Issue 5 September-October 2011. International
9. A Novel Approach for Pass Word
Authentication Using Bidirectional Associative Memory Advanced Computing: An International Journal (ACIJ), pp.123-135, volume 2 No. 6, November 2011. International
10 Performance Evaluation of Password Authentication Using
Associative Neural Memory Models International Journal of Advanced Information Technology (IJAIT) Vol. 2, No.1, pp. 75-85, February 2012. International
11. Security Evaluation of Online
Signature Verification System Using Webcams International Journal of Computer
Applications (0975 – 8887) Volume 41– No.15, pp. 28-33, March 2012. International (0.814IF)
12. A Novel Approach for Enhancing
Security in Smart Cards Using Biometrics International Journal of Computer
Applications (0975 – 8887) Volume 42– No.8, pp.38-42, March 2012. International (0.814IF)
13. A Novel Method for Enhancing
Biometric Systems Security Using Watermarking Global Journal of computer application and technology GJCAT, Vol. 2 (1), 2012, 969-976, ISSN: 2249-1945. International
14. Security Evaluation of Finger Print based Authentication Systems Global Journal of computer application and technology (GJCAT), Vol. 2 (1), 2012, 986-992, ISSN: 2249-1945. International
15. User Authentication in ATM Using Fingerprint Biometrics Global Journal of computer application and technology GJCAT, Vol. 2 (1), International
2012, 993-996, ISSN: 2249-1945.
16. A Novel Method of SAR Image Regularization with Fast Approximate Discrete
Minimization Advances in Digital Multimedia (ISSN
2166-2916) 64-79, Vol. 1, No. 2, June 2012. International (Free)
17. Novel Approach for the propagation and detection of active worm in a Virtual System Advances in Computer Science and its Applications (ISSN 2166-2924) 146150, Vol. 1, No. 1, March 2012, World Science Publisher, United States. International (Free)
18. Survey on Computer Crime Scene
Investigation Forensic Tools International Journal of Computer
Trends and Technology (IJCTT)-
Volume 3, pp. 278-281, Issue 2- 2012. International
19. Document Clustering in Web
Search Engine International Journal of Computer
Trends and Technology (IJCTT)-
Volume 3, pp. 290-293, Issue 2- 2012.
International
20. Evaluation of Watermarking Techniques International Journal of Mathematics
Trends and Technology (IJMTT)-
Volume 3, pp. 82-85, Issue 2- 2012. International
21. CRT and ART Based
Watermarking Scheme in DCT
Domain International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, April 2012. International
22. Survey on Hard Disk Duplication Advances in Mechanical Engineering and its Applications,pp.17-21,Vol. 1, No. 2, 2012, World Science Publisher, United States. International (Free)
23. Enhancing Security of Biometric Systems using Watermarking International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-12/269275. International
24 Security Evaluation of Signature Recognition System International Journal of Engineering & Science Research (IJESR)/April 2012/
Volume-2/Issue-4/Article No-7/222230. International
25 Security Evaluation of Finger print based Authentication Systems International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/158-175. International
26 Improve QOS In Wireless Sensor Network By Using BPA Algorithm International Journal of Advances in Science and Technology, Vol. 4, No.3, pp. 38-48 , March 2012. International
27 ARM Based USB Flash Drives for Data Communication Without using USB Cables and USB Ports Advances in Computer Science and its Applications (ACSA),pp. 228-230,Vol.
1, No. 3, 2012. International (Free)
28 Design of an Intelligent Spy Robot for Military Based Appliances International Journal of Computer Information Systems (IJCIS), Vol. 4, No.5, pp. 1-5,May 2012. International
29 A Survey on Password
Authentication Using Gödel
Number International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp. 534538. International
30 Design of a Rescue Robot Assist at Fire Disaster International Journal of Computer Applications (IJCA) (0975 – 888) International (0.814 IF)
Volume 47– No.10, pp.25-30, June 2012.
31 CDMA and MAI Problem
Elimination Methods International Journal of Scientific and Research Publications (IJSRP), Volume 2, Issue 7, pp.1-13, July 2012. International
32 A Novel Approach of Techniques for Building Intrusion Tolerant Server Systems International Journal of Research in Engineering Science & Technology (IJREST), Volume 1, Issue 1, pages, 1 – 5,July-August 2012. International
33 A Survey On Keystroke
Authentication By Using Local Search Algorithm Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 5, September- October 2012, pp.256-259. International
34 A Novel Approach of Intrusion Detection using Classification Rules International Journal of Advanced Computer Communications and Control Vol. 01, No. 01, December 2012, pp.
19-21. International
35 An Enhanced Multilevel Authentication Scheme Using
Graphical Passwords International Journal of Engineering Sciences & Emerging Technologies, June 2013, Volume 5, Issue 2, pp.104118. International (0.51 IF)
36 A Novel Soft Computing
Authentication Scheme for Textual and Graphical Passwords International Journal of Computer
Applications (0975 – 8887), Volume 71– No.10, May 2013, pp. 42-54. International (0.8 IF)
37 An Enhanced Mutual
Authentication Scheme Using One Time Passwords International Journal of Computer Networks and Security, ISSN: 20516878, Vol.,23 Issue.1,pp. 1113-1122. International (2.51IF)
38 A Novel Timer and Counter
Synchronized Challenge-Response
Based One-Time Password
Authentication International Journal of Computer
Networks And Security, ISSN: 20516878, Vol.23, Issue.1, pp. 1123-1128. International (2.51IF)
39 Improving the message capacity by using CDMA Watermarking
Scheme Advances in Computer Science and its Applications (ACSA) Vol. 2, No. 3, 2013, ISSN 2166-2924. International (Free)
40 BSC: A Novel Scheme for
Providing Security using Biometric Smart Card International Journal of Computer Applications (0975 – 8887) Volume 80 – No1, October 2013 International (0.8 IF)
41 A Novel Symmetric Key
Cryptography using Multiple Random Secret Keys International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013 International (0.8 IF)
42 A Fusion of PLSB and SVD based Image Watermarking Approach International Journal of Advanced Computer Communications and
Control, Volume 02, No. 02, April 2014 International
43 An Evolution of the Pixel Embedding
Techniques in Image Based
Adaptive Steganography Journal of Web Engineering & Technology (JoWET), Volume 1,
Issue 1, Jan-April 2014, pp.1-18. International
44 Prevention of Fire Accidents In
Villages Using Wireless Sensor
Networks International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, pp. 39683971. International (2.9 IF)
45 Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions International Journal of Computer Applications (0975 – 8887), Volume 112 – No. 9, February 2015 International (0.8 IF)
46 Analysis of Canonical Character Segmentation Technique for
Ancient Telugu Text Documents Journal of Theoretical and Applied
Information Technology, 20th December 2015. Vol.82. No.2, pp. 311-320 International
Scopus
Indexed
47 Performance Evaluation Of Quantitative Metrics on Ancient
Text Documents Using MIGT Journal of Theoretical and Applied
Information Technology, 31st
December 2015. Vol.82. No.3 pp. 360365 International
Scopus
Indexed
48 Gesture Recognition Technology to Annihilate Burglaries amid ATM
Transactions International Research Journal of Engineering and Technology (IRJET),
Volume: 02 Issue: 08 | Dec-2015, pp.
2293-2297 International
49 Optical Character Recognition Technique Algorithms Journal of Theoretical and Applied
Information Technology, 20th January 2016. Vol.83. No.2, pp. 275-282 International
Scopus
Indexed
50 A Study on Developing
Groundwater Information System
(GWIS) for Sustainable Management of Groundwater Resources-A Case Study from
Visakhapatnam Urban Region International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 2185-2190. International (6.39 IF)
51 Variable Modulation Schemes for AWGN Channel based Device to Device Communication Indian Journal of Science and Technology, Vol 9(20), May 2016, pp.1-6. International (Indexed in
SCOPUS)
52 Design of WSN based Water Quality Monitoring System in a Mining District International Journal of Science and
Research (IJSR), Volume 5 Issue 6, June 2016, pp.1183-1188 International (6.39 IF)
53 Providing A Secure Group Communication By Using A Novel Key Transfer Protocol and by
Generating Multiple Session Keys International Journal of Advance
Research in Science and
Engineering (IJARSE), Volume 5 Issue 10, October 2016, pp.36-45. International (2.83 IF)
54 Survey on Android Forensic Tools and Methodologies International Journal of Computer Applications (0975 – 8887) Volume 154 – No.8, November 2016. International (0.8 IF)
55 A Hybrid Cryptographic System for
Secured Device to Device
Communication International Journal of Electrical and
Computer Engineering (IJECE), Volume 6, No 6: December 2016,pp. 2962~2970
International (Indexed in
SCOPUS)
56 Evolution of Higher Education in India: Ancient to Golden Era University News: Association of Indian
Universities, Volume 55 N0. 05, January 30-Febraruary 05 2017. National
57 Utilization of SC-FDMA And OFDMA Based Uplink and Downlink Resources In LTE-A
Network Assisted Device To
Device Communication For
Effective Spectrum Management ARPN Journal of Engineering and
Applied Sciences, VOL. 12, NO. 5, March 2017 International (Indexed in
SCOPUS)
58 Inhibiting Cognitive Bias in Forensic Investigation Using DNA
Smart Card with IOT International Journal of Computer
Technology and Applications(IJCTA),
Volume 10, Number 14, pp 251-255,
May 2017 International
(Indexed in
SCOPUS)
59 Robust and indiscernible multimedia watermarking using lightweight mutational
methodology Traitement du signal
30 June 2017, Volume 34, Issue1-2, pp:
45-55 International (Indexed in
SCOPUS)
IF 0.057
60 A Taxonomical Review on
MANET Networks for IoT based
Air Pollution Controls International Journal of Computer Science And Technology (IJCST) Vol.
8, Issue 3, July - Sept 2017 International
(0.6 IF)
61 A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controlling Network
Architecture International Research Journal of Engineering and Technology (IRJET),
Volume: 04 Issue: 07 July -2017 International
62 A Fault Tolerant Framework to Detect Routing Failures in Air
Pollution Monitoring MANET
Using 2ACK International Journal of Scientific & Engineering Research Volume 8, Issue
9, September-2017 International (Indexed by Thomson
Reuters)
63 Cryptanalysis of Design and
Analysis of a
Provably Secure Multi-server
Authentication Scheme International Journal of Network
Security, Vol.20, No.2, PP.1-8, Mar.
2018 International
(Indexed in
SCOPUS)
64 A Novel Feature Selection based
Classification Model for Disease Severity Prediction on Alzheimer’s Database Journal of Advanced Research in
Dynamic Control Systems Volume: 10,
Issue: 4, Pages: 245-255 ISSN:1943023X, Apr,2018 International
(Indexed in SCOPUS )
IF 0.13
65 A novel integrated approach using
Euclid’s and Fuzzylogic for secure communication Int. J. Information Privacy, Security and
Integrity, Vol. 3, No. 4, 2018 (Inder Science) International ( Free)
66 Despeckle Of SAR Images Using Adaptive Threshold In Non Sub Sampled Shearlet Transform
Domain Journal of Advanced Research in
Dynamical and Control Systems, ISSN 1943-023X, Vol. 10, 09-Special Issue, April 2018, pp. 765-772.
International
( Free)
(Indexed in
SCOPUS )
67 A Review of Blockchain
Technology and Its Application in Internet of Things International Journal of Management, Technology And Engineering, Volume 8, Issue12, December 2018. International ( Free)
69 EPNN Based High Secure Intensive
Hidden Digital Watermark
Application in Telemedicine Advances in Modelling and Analysis A, Vol. 56, No. 1, March 2019, pp. 21-25.
International
(Indexed in SCOPUS )
70 Optimized AODV Routing Algorithm in MANET for
Maximizing the Network Lifetime International Journal of Recent
Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019. International (Indexed in SCOPUS )
71 An Iterative Probabilistic NonLocal Filter Based Denoising Framework For SAR And Medical Images Journal of Critical Reviews, ISSN-
2394-5125 Vol 6, Issue 6, December 2019, pp. 386-392.
International (Indexed in
SCOPUS )
72 A Hybrid Segmentation based majority voting based classification framework for Alzheimer Disease prediction Journal of Critical Reviews, ISSN: 2394-5125, pp.: 376-385 Issue6, Volume 6, 2019.
International
(Indexed in
SCOPUS)
73 A Secure Biometrics-Based User Authenticated Key Agreement
Protocol for Multi-Server International Journal of Advanced Science and Technology Vol. 29, No.
9s, March 2020, pp. 517-532 International
(Indexed in
SCOPUS )
Environments
74 Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based
SVNN Journal of Evolutionary Intelligence,
Springer Professional, Special Issue, 28 April 2020, published by Springer Verlag
International
(Indexed in
SCOPUS )
75 Future Internet for Service Oriented Applications International Journal of Innovative Technology and Exploring Engineering Vol.- 9 Issue-6 published April 2020,pp-1996-2001,ISSN: 2278-3075. International
(Indexed in
SCOPUS )
76 Packet Crafting Tools for Cyber Crime Security Attacks International Journal of Computer Applications, Foundation of Computer
Science (FCS), NY, USA, Vol.-176
Issue-31 published June 2020, pp-2830, ISSN: 0975 – 8887
International
77 A Secure and Light Weight Privacy Preserving Data Aggregation Algorithm for Wireless Sensor
Networks Journal of Green Engineering, issue 12, pp. 13329-13336, Dec. 2020. ISSN:
2245-4586
http://www.jgenng.com/volume10issue12.php
International
(Indexed in
SCOPUS )
78 Chemical Sensing Through CognoMonitoring System for Air Quality Evaluation Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough, Studies in Computational
Intelligence 885,
https://doi.org/10.1007/978-3-03038445-6_3
International
Springer-
VerlagGmbH Germany
79 Multi-Level and Mutual Log
Integrity Preservation Approach for Cloud Forensics using Public Key
Infrastructure International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256),
Vol.9, Issue.1, February 2021 Edition
International
(Indexed in
SCOPUS )
80 Smell Print: CMS-SEN Model for Odor Perception International Journal of Scientific Research in Computer Science and
Engineering Vol.9, Issue.4, pp.01-07, August (2021) E-ISSN: 2320-7639 DOI:
https://doi.org/10.26438/ijsrcse/v9i4.17 International
(Indexed in
SCOPUS )
81 Human Identification with their
VOC distribution through CMS– SEN
Model Soft Computing (2021) 25:13015–
13025
https://doi.org/10.1007/s00500-02106180-8
International
Springer-
VerlagGmbH Germany
82 Spectrum Of Research Challenges
In Design Optimizations In Cyber
Physical Systems Advances and Applications in
Mathematical Sciences", Volume 20,
Issue 11, September 2021, Pages 25852594, Mili Publications International
UGC Care,
Web of
Science
(ESCI)
83 Automatic identification of drug sensitivity of cancer cell with novel regression-based ensemble
convolution neural network model Soft Computing (2022) 26:5399–5408 https://doi.org/10.1007/s00500-022-
07098-5(0123456789().,volV)(0123456789,, Published online: 21 April 2022-().volV) International
SpringerVerlag
GmbH
Germany, part of
Springer Nature 2022
84 Novel Heuristic Hybrid Model To Handle Automatic Prediction Of
Cancer Disease Classification Over
Cancer Drug Data Sets Indian Journal of Computer Science and Engineering (IJCSE) DOI :
10.21817/indjcse/2022/v13i5/22130509 9 Vol. 13 No. 4 Sep-Oct 2022, e-ISSN :
0976-5166 p-ISSN : 2231-3850 International
85 Content-Based Collaborative
Filtering
With Predictive Error Reduction-
Based CNN Using IPU Model International Journal of Information
Security and Privacy, Volume 16 Issue
2, Nov 18, 2022
DOI: 10.4018/IJISP.308309 International Indexed In:
Compendex
(Elsevier
Engineering
Index),
INSPEC,
SCOPUS,
Web of
Science (ESCI)
86 Novel and Heuristic MolDoc Scoring Procedure for
Identification of Staphylococcus Aureus International Journal of Intelligent
Systems and Applications in
Engineering (IJISAE Int J Intell Syst Appl Eng, vol. 11, no. 2s, pp. 125 –, Jan. 2023. ISSN:2147-67992. International
(Scopus indexing)
87 Application of Distributed
Constraint Optimization Technique for Privacy Preservation in Cyber-
Physical Systems Springer, Cham ,Feb 4, 2023,Online
ISBN-978-3-031-18497-0,DOI https://doi.org/10.1007/978-3-03118497-0_24.
International
88 Role of Privacy Metrics in NextGeneration smart cities Journal of Propulsion Technology, ISSN:1001-4055, Vol.44 No.4(2023) Scopus indexing
89 Comprehensive Analysis on Drug Resistance Prediction, ProteinProtein Interaction, RNA Interaction on Drugs Using
Machine Learning Techniques Eur. Chem. Bull. Dec-2021,10(issue 4), 262-279, Section A-Research paper ISSN 2063-5346. International
90 Cancer Disease Treatment Classification Using Extended Rough-based Intuitionistic Fuzzy
C-means Learning Methodology Tuijin Jishu/Journal of Propulsion Technology ISSN: 1001-4055 Vol. 44 No. 3 (2023). International
91 A Review on Machine Learning Based Routing Protocols for Delay
Tolerant Networks IOS Press- Intelligent Decision
Technologies 17 (May, 2023) 287–299.
DOI:10.3233/IDT-220018
SCOPUS,
Web of
Science (ESCI)
Book Chapters/Books Authored | : | 1) Password Authentication Using Associative Memories -A Probabilistic Approach, Lap Lambert Academic Publishing, Germany, 2012, ISBN: 978-3-659-26797-0. 2) Crypto Authentication Using Hilbert Matrices-A Novel Approach, Lap Lambert Academic Publishing, Germany, 2014, ISBN: 978-3-8473-4755-2. 3) Hadoop & R Language, Shree Publishing House, INDIA, 2019, ISBN: 978-938-819640-6. 4) Data Warehousing and Data Mining, Shree Publishing House, INDIA, 2020, ISBN:978-93-88196-53-6. 5) Qualitative and Quantitative Parametric Substantiation for Recognition of Text in Ancient Documents, Lambert Publications, India, 2020, ISBN: 978-81-948321-6-4. 6) Log Analysis Methods for Cloud Forensics: For Assisting Cybercrime Investigatons in Cloud Environments, LAP LAMBERT Academic Publishing (September 6, 2023), ISBN-13 : 978-6206755517 7) Privacy in Cyber Physical Systems: A Primer for Practitioners, Notion Press (30 October 2023), ISBN: 979-8891861725 BOOK CHAPTERS AUTHORED: 1. "Novel Method for Private Data Release in Cyber-Physical Systems “, pp. 47 – 54 , Advances in Computer Science and Information Technology Bhumi Publishing, Nigave Khalasa, Kolhapur 416207, Maharashtra, India, ISBN: 978-93-91768-28-7. 2. “Privacy-Preserving Mechanism by Application, of Constrained Nonlinear Optimization Methods in Cyber-Physical System”, Cyber Security and Network Security, Wiley Data and Cybersecurity pp.: 157 – 168, 27 March 2022 (DOI: 10.1002/9781119812555.ch7) Print ISBN:9781119812494 |Online ISBN:9781119812555. 3. “Application of Exact Barrier-Penalty Function for Developing Privacy Mechanisms in Cyber-Physical Systems”, Security Analytics: A Data-Centric Approach to Information Security, June 24, 2022, by Taylor and Francis, ISBN:9781032072418. 4. “Application of Temporal Logic for Construction of Threat Models for Intelligent Cyber-Physical Systems”, Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications, Challenges and Management, Published by Chapman and Hall/CRC, Dec 11, 2022, Pages 284, eBook ISBN: 9781003241348. 5. Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System, Cyber Security and Network Security, Scrivener Publishing LLC, 27 March 2022 Print ISBN:9781119812494 |Online ISBN:9781119812555 (https://doi.org/10.1002/9781119812555.ch7). 6. “Privacy Preservation in Cyber Physical Systems using Entropy Based Techniques”, Internet of Things Vulnerabilities and Recovery Strategies, June 4, 2024 by Auerbach Publications, ISBN: 9781032473314 |
Conferences | : | CONFERENCE PUBLICATIONS S. No. Publication Title Details of the Conference Type 1. Extended Alternate Heterogeneous Earliest Finish Time Algorithm Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-09. National 2. Internet Protocol Security (IPSec) Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-25. National 3. Evaluating the Effectiveness of Personalized Web Search AICTE Sponsored National Conference on - High Performance Computing and Networking,13th-14th August 2011, Rajampet, Andhra Pradesh, India. National 4. Password Authentication Using Context-Sensitive Associative Memory Neural Networks: A Novel Approach Proceedings of Springer Lecture Notes of the LNICST-85 Series, part-II, pp. 464– 478 at the CCSIT 2012, in January 2012 held at Bangalore, India. International 5. Protocol Sensor-Based Embedded Technique for Efficient Water-Saving Agriculture Proceedings of ACNCN2012 conference on advances in communication, navigation and computer networks 17th -18th March 2012, A.U, Visakhapatnam. National 6. A Multi Cloud-based Approach to Enhance Data Security and Availability in Cloud Storage Proceedings of International Conference on ComNet CIIT & ITC 2013, pp.58-63. (Published by Elsevier, with ISBN 978-81910691-6-3), Organized by ACEEE, in Hyderabad from 08th -09th November 2013. International 7 Analysis of Cyber-Criminal Profiling and Cyber-Attacks: A Comprehensive Study 3rd World Conference on Applied Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International 8 An Innovative Progress Approach for Quantity Mining of Item Sets 3rd World Conference on Applied Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal (ISBN 13: 978-81-930222-0-7). International 9 An Integrated Approach to Provide Security and Resist Thefts on Digital Data 3rd World Conference on Applied Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International 10 Cloud Forensics: The Need and Challenges A Research & Fact Compendium 3rd World Conference on Applied Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International 11 Implementation of X.509 Attribute Certificates for Cloud Environments 3rd World Conference on Applied Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International 12 A Unified Model for Cherishing Privacy in Database System: An Approach to Overhaul Vulnerabilities First International Conference on Networks & Soft Computing,2014, organized by Vignan's Foundation for Science, Technology & Research, Guntur, with the Technical Sponsorship of IEEE Hyderabad Section during 19th -20th August 2014(ISBN-978-1-4799-3486-7/14). International (IEEE) 13 Enhanced DES Algorithm International Conference on Recent Trends and Research Issues in Computer Science and Engineering, held from 02nd - 03rd May 2015. International 14 Information Security using Genetic Algorithm with Penultimate and Least Significant Bits Fifth International Conference on Advances in Information Technology and Mobile Communication – AIM 2015, held during 11th -12th July 2015, Bangalore, India. International 15 MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity Thefts 4th World Conference on Applied Sciences, Engineering & Technology 2426 October 2015, Kumamoto University, Japan (ISBN13:978-81-930222-1-4). International 16 Accelerating SQL Queries by Unravelling Performance Bottlenecks in DBMS Engine IEEE International Conference on Energy Systems and Application (ICESA - 2015) 30th October to 01st November 2015, DYPIET Pimpri, Pune India. International (IEEE) 17 Electronic Noses: Forestalling Fire Disasters: A Techniques to Prevent False Fire Alarms and Fatal Casualties 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), held from 10th -12th December 2015 at Vickram College Of Engineering, Madurai, Tamilnadu, India. International International (IEEE Xplore, SCOPUS) 18 A Robust Authenticated Privacy- Preserving Attribute Matchmaking Protocol for Mobile Social Networks International Conference on Computational Intelligence and Informatics-2016(ICCII2016), held during May 28th-30th, 2016 organized by Dept. of CSE, JNTUH College of Engineering, Hyderabad, India. International 19 Revamping SQL Queries for Cost Based Optimization International Conference on Circuits, Controls, Communication and Computing ( I4c-2016), held during 4th-6th October 2016 at M.S.Ramaiah Institute of Technology, Bangalore, India. International 20 Cognitive Perceptive Framework with Gait Recognition Technology 2nd International Conference on Next Generation Computing Technologies (NGCT-2016), Dehradun, India, 14-16 October 2016. International (Indexed in SCOPUS) 21 Bypassing Android Pattern Lock and Analysis IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), held during 15th-17th of December 2016 at Agni College of Technology Old Mahabalipuram Road, Thalambur, Chennai - 600 130, Tamil Nadu, India. International (IEEE) 22 Forensics Analysis of Android Mobile Devices II International Conference on Recent Advances and Innovations in Engineering (ICRAIE2016), 23-25, December - 2016, Poornima College of Engg., Jaipur, India, Sponsored by IEEE Delhi Section International (Indexed in SCOPUS) 23 Evolution of Higher Education in India: Ancient to Golden Era University News: A Weekly Journal of Higher Education January 30-February 05, 2017 by Association of Indian Universities, Volume 55 N0. o5. ISSN-0566-2257. National 24 Intensifying the Security of Information by the Fusion of Random Substitution Technique and Enhanced DES First International Conference on Smart Computing and Informatics" Conducted at ANITS, VIZAG from 3- 4 March 2017. (Published in SPRINGER SIST Series Vol 1. pp. 487-496) International (Springer) 25 The Design of a Secure Three Factor Authentication Protocol for Wireless Sensor Networks The International Conference on Nextgen Electronic Technologies, organized by the VIT University, 23- 25 March 2017 at VIT University Chennai in Chennai, India9781-5090-5913-3/17/$31.00_c 2017 IEEE. International (IEEE) 26 A Robust Authenticated Privacy- Preserving Attribute Matchmaking Protocol for Mobile Social Networks International Conference on Computational Intelligence and Informatics-2017(ICCII2017) held during 25-27 September 2017 at JNTU, Hyderabad. International (Springer) 27 Cogno-Detective System for Body Odor Sensing 017 IEEE International Conference on Computational Intelligence and Computing Research, Tamilnadu College of Engineering, Coimbatore, 14 to 16 Dec 2017. International IEEE Xplore SCOPUS [Best Paper] 28 Smart-Trace: A Future Security Aid using Body Odor Sensing of an Individual with IoT, 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018, Malaviya National Institute of Technology (MNIT), Jaipur, March 26-27, 2018. International 29 Emotional Intelligence through Body Temperature using Hybrid Progressive Approach International Conference on Intelligent Computing and Remote Sensing (ICICRS- 2019) C.V. Raman College of Engineering, Bhubaneswar, India, 19th and 20th July 2019. International 30 Chemical Sensing through Cogno-Monitoring System for Air Quality Evaluation International Conference on Cybernetics, Cognition and Machine Learning Applications, 16-17 August 2019, Goa, India. (https://link.springer.com/chapter/10.1007 %2F978-3-030-38445-6_3) International (Springer) 31 Spectrum of Research Challenges in Design Optimizations in Cyber Physical Systems AICTE Sponsored the National EConference on Advances in Computer Vision, Artificial Intelligence and Computer Applications (NECACAC-2020), Organized by the Department of CSE, Pragati Engineering College, Surampalem, Andhra Pradesh, India National 32 An Investigative Study on Security Attacks in CyberPhysical Systems 1st International Conference on Multidisciplinary Industry and Academic Research (ICMIAR) organized by Institute of Industry and Academic Research Incorporated, Philippines on 12-12-2020. International 33 Balancing Control Performance and Multiple Privacy Preserving Requirements in a Cyber- Physical System 1st Online National Conference On Recent Trends in Science & Technology (RTST2020) Organized by Department of Applied Sciences Faculty of Engineering & National Technology Manav Rachna International Institute of Research & Studies, Faridabad HARYANA on 21-11-2020. 34 An Investigative Study on Minimizing Security Attacks using Deep learning in a Cyber- Physical System AICTE Sponsored “International Conference on Recent Advances in Deep Learning (ICRADL-2021)”, Conference Proceedings in the Journal International Journal of Engineering Research & Technology (IJERT), ICRADL – 2021 (Volume 09 – Issue 05), ISSN Online: 2278-0181, CrossRef DOI:10.17577. International 35 Planning Protection of CyberPhysical Systems by Applying Chaos Theory 3rd International Conference on Recent Advances in Management & Technology( ICRAMT-2020), organized by Faculty of Management, Invertis University, Bareilly, UP, India on January 08th and 9th 2021. International 36 Application of Metric Temporal Logic for Designing Secure Cyber-Physical System International Conference on Computational Techniques( ICCT-2021) organized by Dept. of CSE, Invertis University, Bareilly in association with CSI- Allahabad Chapter on January 22-23 2021. International 37 Novel Perspectives of Security and Privacy Challenges in Virtual Reality Technologies 3rd International Conference on Virtual Reality conducted on Dec 31, 2021, organized by Harran University, Sanliurfa Turkey,Pp. 109-112 ISBN: 978-605- 86579-1-5. International 38 Comparative Analysis between LSTM and GRU in Stock Price Prediction International Conference on Edge Computing and Applications (ICECAA 2022), organized by Gnanamani College of Technology, Namakkal, Tamil Nadu, India. International (IEEE Explore) 39 Application of Distributed Constraint Optimization Technique for Privacy Preservation in Cyber-Physical Systems International Conference on Intelligent Cyber-Physical Systems and Internet of Things (ICoICI 2022) conducted on 11-12, August 2022,JCT College of Engineering and Technology, Coimbatore, India. International 40 A Critical Investigation of Variants of Differential Privacy for Cyber-Physical Systems National E-CONFERENCE On Data Engineering and Communication Technology (NCDECT) 2023 25th March 2023 National E-CONFERENCE On Data Engineering and Communication Technology (NCDECT) 2023, ISBN:97893-5768-432, conducted by Sri Vasavi Engineering College (Autonomous), Pedatadepalli, Tadepalligudem, West Godavari District, Andhra Pradesh, India. International |
Ph.D Scholars guided | : | SCOPUS AUTHOR ID: 57008858300 ORCID ID: 0000-0002-3437-5498 ------------------------------------------------------------------------------------------------------- Research Supervision (PhD): 1. Completed S.No. Name of the Research Scholar Title of the Work Year of Awarded Registered University Supervisor/ Co-Supervisor 1. Mr. Nekkanti Venkata Rao (Reg.No.10305001) Qualitative and Quantitative Parametric Substantiation for Recognition of Text in Ancient Documents 2018 KL University Vaddeswaram India Supervisor 2. Mr. Akella Ramakrishna (Reg.No.13304005) Hybrid Directional Channel Models for Secured Device to Device Communication 2018 KL University Vaddeswaram India Supervisor 3. Mr.Kameswara Rao Buragapu (Reg.No. 10022P0542) An Optimized Routing Technique for Cluster based Pollution Control MANET 2019 JNTU Kakinada Kakinada India Supervisor 4. Mrs. Rayi.Sailaja (Reg.No. 13022P0514) Privacy and Protection of Medical Sensitive Data Using an Integrated Secured Framework 2020 JNTU Kakinada Kakinada India Co- Supervisor 5. Mr. T.Siva Rama Krishna (Reg.No. 13022P0505) Log Analysis Methods for Assisting Crime Investigations in Cloud Environments 2021 JNTU Kakinada Kakinada India Supervisor 6. Ms.K. Pratyusha (Reg.No. 15022P0534) A Cognitive Forensics Olfactory Biometric Scheme for an Intelligent Environment 2022 JNTU Kakinada Kakinada India Supervisor 2. Under Process-Supervisor: 11 S.No . Name of the Research Scholar Area of the work Year of Registr ation Registered University Supervisor/ Co- Supervisor 1 Mr.S.Suresh Babu (Reg.No. 12022P0530) Image Processing 2012 JNTUK Supervisor 2 Mr.V. VenkateswaraRao (Reg.No.13022P052 6) Network Security & Forensics 2013 JNTUK Supervisor 3 Mr.T. Anji Kumar (Reg.No. 15022P0511) Network Security 2016 JNTUK Supervisor 4 Mr.A. Chandra (Reg.No. 15022P0530) Adhoc Networks & Security 2016 JNTUK Supervisor 5 Mr. Anil Kumar Prathipati (Reg.No. 18022P0520) Speech Processing 2018 JNTUK Supervisor 6 Manas Kumar Yogi (Reg.No. 19022P0502) Cyber Security 2019 JNTUK Supervisor 7 Tamminina Ammannamma (Reg.No. 19022P0549) Cyber Security 2019 JNTUK Supervisor 8 Sridevi Gadde (Reg.No. Y19CSEPT003) Machine Learning 2019 Centurion University Supervisor 9 Chintalapudi Subhash (Reg.No. 21022P0541) Digital Forensics and Cyber Security 2022 JNTUK Supervisor 10 Cholla. Priyadarshini (Reg.No. 21022P0561) Cyber Security 2022 JNTUK Supervisor 11 Burra Lalitha Rajeswari (Reg.No 22022P0515) Cyber Security and Machine Learning 2022 JNTUK Supervisor 12 Shaik. Saida (Reg.No. 22022P0527) Network Security 2022 JNTUK Supervisor Co-Supervisor: 08 S.No Name of the Research Scholar Area of the work Year of Registra tion Registered University Supervisor/ Co-Supervisor 1 Ch S V V S N Murty (Reg.No. 12022P0520) Data Mining 2012 JNTUK Co-Supervisor 2 Mr.Immadi Murali Krishna (Reg.No. 12022P0519) Image Processing 2012 JNTUK Co-Supervisor 3 Mr. M.M NareshBabu (Reg.No. 13022P0529) Network Security & Cryptography 2013 JNTUK Co-Supervisor 4 Mr. Katari Praveen Kumar (Reg.No.14022P0526 ) Network Security & Cryptography 2014 JNTUK Co-Supervisor 5 A. Bhavani (Reg.No. 19022P0537) Delay Tolerant Network 2019 JNTUK Co-Supervisor 6 Suryakala Eswari (Reg.No. 19022P0507) Image Processing 2019 JNTUK Co-Supervisor 7 Nagalakshmi Panchakatla (Reg.No. 21022P0558) Cyber Security with Machine Learning 2022 JNTUK Co-Supervisor 8 Babu Bulla (Reg.No. 21022P0537) Intrusion Detection System using Machine learning 2022 JNTUK Co-Supervisor |
Memberships in Professional bodies | : | MEMBERSHIPS 1) Senior Member of “IEEE” with membership id 92932156. 2) Professional Member of “Association for Computing Machinery” (A C M) with membership id 7001281. 3) Life Member of “Computer Society of India” (CSI) with membership id I0171314. 4) Life Member of “The Indian Society for Technical Education” (ISTE) with membership id LM-83243. 5) Life Member of “The Institution of Electronics and Telecommunication Engineers” (IETE) with membership id M-230243. 6) Life Member of “The Institution of Engineers, India” (IEI) with membership id M145610-5. 7) Life Member of “The Indian Science Congress Association of India” (ISCA) with membership id L13821. 8) Life Member of “The Cryptology Research Society of India” (CRSI) with membership id L/540. 9) Life Member of “Association of Scientists, Developers and Faculties” (ASDF) with membership id 4357700016860710. 10) Life Member of “Youth Hostels Association” of India with membership id027-AP12--LO--TEMP--6873. 11) Fellow member (Life member) of “International Science Congress Association” (ISCA) with Membership id ISCA-FM-258. 12) Member of “Association of Computer Communication and Education for National Triumph” (ACCENTS) with Membership id -PM21068205. 13) Honorary member of The “Association of Computer Electronics and Electrical Engineers” (ACEEE) with Membership No. 1155. 14) Associate Member of “International Association of Engineers” (IAENG)with membership id 100181. 15) Member for “Academy & Industry Research Collaboration Center” (AIRCC) with Community membership id 128683. 16) Member for “Computer Science Teachers Association” (CSTA) with membership id 7001281. 17) Senior member for “International Association of Computer Science and Information Technology (IACSIT)” with Membership Number 80343991. 18) Member in the “Institute for Computer Sciences, Social Informatics and Telecommunications Engineering” (ICST). 19) Member of “Universal Association of Computer and Electronics Engineers (UACEES)” with Membership Id SNM1002871. 20) Member OF “Internet Society” India - Kolkata Chapter with registration id 357012. 21) Member of “Internet Society” India- Bangalore Chapter with registration id 372720. 22) Member of “The International Research Association of Computer Science and Technology” (IRACST). 23) Senior Member of “The Indian Association for Research in Computer Science” (IARCS). 24) Senior Member of “The Institute of Research Engineers and Doctors” (IRED) with membership ID - SNM1002871. 25) Distinguished member of “The Institute for Computer Sciences, Social Informatics & Tele Communications Engineering” (ICST), Belgium. 26) Member of “Asia-Pacific Chemical, Biological& Environmental Engineering Society” (APCBEES) with Membership Number-200953. 27) Professional Member of Institute for Engineering Research and Publication (IFERP) with membership id PMIN36019475. |
Honors & Awards | : | AWARDS Received the Association of Scientists, Developers and Faculties “Best Professor” award from Shri. Virendra Kataria, Lt. Governor of Pondicherry, at Global Awards 2013 held on 30-12-2013 at Hotel Anandha Inn, Puducherry, India. Received Association of Scientists, Developers and Faculties “Best Academic Researcher” Award from Audi Kalayanamitr, President, board of director at one development company, Bangkok at Global Awards 2014 held on 30-12-2014at Hotel Holiday Inn Silom, Bangkok, Thailand. Received Association of Scientists, Developers and Faculties “Best Computer Science Faculty” award from Shri. P.Rajavelu,(Minister for tourism) and T. Thiagarajan (Minister for Electricity, & School Education, at Global Awards 2015 held on 30-12-2015 at Hotel Shenbaga, Pondicherry, India. Received “Uttam Acharya(Best Faculty)” award during the National Award Presentation Ceremony held on 02-10- 2019 at VR Siddartha Engineering College, Vijayawada, India. Award was conferred by Indian Servers in association with Lions Club International, Telangana IT Association and Information Technology Companies Association of Andhra Pradesh. Received “Outstanding Scientist” award during the International Scientist Awards on Engineering, Science and Medicine held on 28 & 29- August-2021 at Trivandrum, India. Award was conferred by VDGOOD Professional Association. |
Patents | : | PATENTS Published 1. Title of the Invention: Inertial Measurement Unit for Wearable Continuous Human Information System Patent Number: 2020102947 Validity: 22-10-2020 to 21-10-2028 (Eight Years) Issued by: Commissioner of Patents, Patent Office, Australia 2. Title of the Invention: A System and a Method for Preventing Theft Using Blockchain Technology Patent Number: 2020103943 Validity: 08-12-2020 to 08-12-2028 (Eight Years) Issued by: Commissioner of Patents, Patent Office, Australia 3. Title of the Invention: A Process for Improve the Trustworthiness of Mobile Crowd Sensing Data Collection Patent Number: 2020104113 Validity: 15-12-2020 to 15-12-2028 (Eight Years) Issued by: Commissioner of Patents, Patent Office, Australia 4. Title of the Invention: Secured IOT Based Data Streaming Network for Containers in Ports and Ships Using IETF Solace Framework Patent Number: 202141004681 Validity: 12-02-2021 to 12-02-2029 (Eight Years) Issued by: Indian Patents 5. Title of the Invention: A Regression-Based Ensemble CNN System to Predict Cancer Drug Sensitivity and Method Thereof Patent Number: 202241057105 Publication Date: 04-10-2022 Issued by: Indian Patents 6. Title of the Invention: Application of Synthetic Data for Privacy Preservation in Cyber Physical Systems Patent Number: 202341057084 A Publication Date: 08-09-2023 Issued by: Indian Patents 7. Title of the Invention: A Novel Query Auditing Mechanism for Privacy Preservation in Medical Cyber Physical Systems Patent Number: 202341062057 A Publication Date: 06-10-2023 Issued by: Indian Patents Granted 1. Title of the Invention: Artificial Intelligence and IoT-Based Efficient Management of Economical Vehicles Utilized on Sharing Basis Patent Number: 1201546 Publication Date: 02-03-2023 Issued by: Canadian Patents |