A. Rama Mohan Reddy

According to our database1, A. Rama Mohan Reddy authored at least 21 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol.
Int. J. Comput. Aided Eng. Technol., 2021

2020
BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web.
J. King Saud Univ. Comput. Inf. Sci., 2020

An efficient load balancing system using adaptive dragonfly algorithm in cloud computing.
Clust. Comput., 2020

2019
An optimised component selection algorithm for self-adaptive software architecture using the component repository.
Int. J. Adv. Intell. Paradigms, 2019

2018
Ensemble Classifiers with Drift Detection (ECDD) in Traffic Flow Streams to Detect DDOS Attacks.
Wirel. Pers. Commun., 2018

An Efficient Hybridization Algorithm Based Task Scheduling in Cloud Environment.
J. Circuits Syst. Comput., 2018

Resource Allocation in Grid Computing Environment Using Genetic-Auction Based Algorithm.
Int. J. Grid High Perform. Comput., 2018

An automation approach for architecture discovery in software design using genetic algorithm.
Int. J. Comput. Sci. Eng., 2018

DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment.
Clust. Comput., 2018

2017
BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection.
Wirel. Pers. Commun., 2017

An efficient k-means clustering filtering algorithm using density based initial cluster centers.
Inf. Sci., 2017

2016
A fast DBSCAN clustering algorithm by accelerating neighbor searching using Groups method.
Pattern Recognit., 2016

PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2015
Secure routing in MANETs: a bio-inspired approach with honey bees.
Int. J. Wirel. Mob. Comput., 2015

2013
Resource Allocation Mechanism with New Models for Grid Environment.
Int. J. Grid High Perform. Comput., 2013

2012
Bio Inspired Approach to Secure Routing in MANETs
CoRR, 2012

IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots
CoRR, 2012

Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots
CoRR, 2012

A M2MC based approach for mapping two ADL models.
Proceedings of the Second International Conference on Computational Science, 2012

2011
Mining Indirect Positive and Negative Association Rules.
Proceedings of the Advances in Computing and Communications, 2011

2009
A Dynamic Task-Model Induction Model Based Induction Mining on Large and High Dimension Data.
Proceedings of the ARTCom 2009, 2009


  Loading...