Intrusion detection using random forests classifier with SMOTE and feature reduction A Tesfahun, DL Bhaskari 2013 International conference on cloud & ubiquitous computing & emerging …, 2013 | 175 | 2013 |
Different obfuscation techniques for code protection CK Behera, DL Bhaskari Procedia Computer Science 70, 757-763, 2015 | 111 | 2015 |
A comprehensive analysis of spoofing PR Babu, DL Bhaskari, CH Satyanarayana International Journal of Advanced Computer Science and Applications 1 (6), 2010 | 51 | 2010 |
Cloud forensics-a framework for investigating cyber attacks in cloud environment SKA Manoj, DL Bhaskari Procedia Computer Science 85, 149-154, 2016 | 45 | 2016 |
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures A Tesfahun, DL Bhaskari Automatic Control and Computer Sciences 50, 54-62, 2016 | 41 | 2016 |
Effective hybrid intrusion detection system: A layered approach A Tesfahun, DL Bhaskari International Journal of Computer Network and Information Security 7 (3), 35, 2015 | 39 | 2015 |
“A study on blockchain technology” DLB P. S. G. Aruna Sri International Journal of Engineering & Technology 7 (2), 418-421, 2018 | 27* | 2018 |
An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol. RS Ranjani, DL Bhaskari, PS Avadhani Int. J. Netw. Secur. 17 (5), 510-516, 2015 | 25 | 2015 |
WITHDRAWN: Blockchain technology for secure medical data sharing using consensus mechanism PSGA Sri, DL Bhaskari Materials Today: Proceedings, 2020 | 17 | 2020 |
Identification of leaf diseases in tomato plant based on wavelets and PCA DND Harini, DL Bhaskari World Congress on Information and Communication Technologies, 978-1, 2011 | 17 | 2011 |
Plethora of cyber forensics N Sridhar, DL Bhaskari, PS Avadhani International Journal of Advanced Computer Science and Applications 2 (11), 2011 | 15 | 2011 |
Image retrieval system based on feature extraction and relevance feedback DND Harini, DL Bhaskari Proceedings of the CUBE International Information Technology Conference, 69-73, 2012 | 14 | 2012 |
A Combinatorial Approach for Information Hiding Using Steganography And GÖdelization Techniques DL Bhaskari, PS Avadhani, A Damodaram Int. J. Syst. Cybern. Inform 10, 21-24, 2007 | 13 | 2007 |
Telugu and Hindi Script Recognition using Deep Learning Techniques DLB P.Sujatha International Journal of Innovative Technology & Exploring Engineering …, 2019 | 11 | 2019 |
Current trends in group key management RS Ranjani, DL Bhaskari, PS Avadhani International Journal of Advanced Computer Science and Applications 2 (11), 2011 | 11 | 2011 |
Image mining issues and methods related to image retrieval system. DND Harini, DL Bhaskari International Journal of Advanced Research in Computer Science 2 (4), 2011 | 10 | 2011 |
Multi-class classification using convolution neural networks for plant leaf recognition of Ayurvedic plants KVN Rajesh, DL Bhaskari International Journal of Computational Science and Engineering 25 (1), 11-21, 2022 | 8 | 2022 |
Fuzzy C-means and fuzzy TLBO for fuzzy clustering P Gopala Krishna, D Lalitha Bhaskari Proceedings of the Second International Conference on Computer and …, 2016 | 8 | 2016 |
Botnet detection and countermeasures-a survey A Tesfahun, DL Bhaskari International Journal of Emerging Trends & Technology in Computer Science …, 2013 | 8 | 2013 |
Self-modifying code: a provable technique for enhancing program obfuscation CK Behera, DL Bhaskari International Journal of Secure Software Engineering (IJSSE) 8 (3), 24-41, 2017 | 7 | 2017 |