C. Rama Krishna

According to our database1, C. Rama Krishna authored at least 28 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review.
J. Supercomput., May, 2024

EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks.
Clust. Comput., April, 2024

K-DDoS-SDN: A distributed DDoS attacks detection approach for protecting SDN environment.
Concurr. Comput. Pract. Exp., 2024

2022
KS-DDoS: Kafka streams-based classification approach for DDoS attacks.
J. Supercomput., 2022

E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks.
J. King Saud Univ. Comput. Inf. Sci., 2022

Ubiquitous Micro Mapping of Air Pollution Using Vehicular Edge-Based Connected IoT Services.
IEEE Internet Things Mag., 2022

Hybrid probabilistic triple encryption approach for data security in cloud computing.
Int. J. Adv. Intell. Paradigms, 2022

SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks.
Clust. Comput., 2022

2021
Energy efficient fixed-cluster architecture for wireless sensor networks.
J. Intell. Fuzzy Syst., 2021

A survey on state-of-the-art road surface monitoring techniques for intelligent transportation systems.
Int. J. Sens. Networks, 2021

RansomDroid: Forensic analysis and detection of Android Ransomware using unsupervised machine learning technique.
Digit. Investig., 2021

A survey on analysis and detection of Android ransomware.
Concurr. Comput. Pract. Exp., 2021

Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions.
Concurr. Comput. Pract. Exp., 2021

2020
S-DDoS: Apache spark based real-time DDoS detection system.
J. Intell. Fuzzy Syst., 2020

Efficient privacy-preserving scheme supporting disjunctive multi-keyword search with ranking.
Concurr. Comput. Pract. Exp., 2020

The Paradox of Choice: Investigating Selection Strategies for Android Malware Datasets Using a Machine-learning Approach.
Commun. Assoc. Inf. Syst., 2020

Android Ransomware Detection using Machine Learning Techniques: A Comparative Analysis on GPU and CPU.
Proceedings of the 21st International Arab Conference on Information Technology, 2020

2019
Smartphone based context-aware driver behavior classification using dynamic bayesian network.
J. Intell. Fuzzy Syst., 2019

Detection of Advanced Malware by Machine Learning Techniques.
CoRR, 2019

Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data.
Concurr. Comput. Pract. Exp., 2019

Document clustering for efficient and secure information retrieval from cloud.
Concurr. Comput. Pract. Exp., 2019

2018
An efficient approach for secure information retrieval on cloud.
J. Intell. Fuzzy Syst., 2018

Efficient multistage bandwidth allocation technique for virtual machine migration in cloud computing.
J. Intell. Fuzzy Syst., 2018

Performance evaluation of bandwidth for virtual machine migration in cloud computing.
Int. J. Knowl. Eng. Data Min., 2018

An IoT based smart irrigation management system using Machine learning and open source technologies.
Comput. Electron. Agric., 2018

Comparative Study of Regression Models Towards Performance Estimation in Soil Moisture Prediction.
Proceedings of the Advances in Computing and Data Science, 2018

2014
Compressing the Data Densely by New Geflochtener to Accelerate Web.
CoRR, 2014

Performance analysis of topology based routing in a VANET.
Proceedings of the 2014 International Conference on Advances in Computing, 2014


  Loading...