Ganesh Reddy Karri

Orcid: 0000-0002-5177-8125

According to our database1, Ganesh Reddy Karri authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An integrated SDN framework for early detection of DDoS attacks in cloud computing.
J. Cloud Comput., December, 2024

DRLBTSA: Deep reinforcement learning based task-scheduling algorithm in cloud computing.
Multim. Tools Appl., January, 2024

Multi-Objective Prioritized Task Scheduler Using Improved Asynchronous Advantage Actor Critic (a3c) Algorithm in Multi Cloud Environment.
IEEE Access, 2024

Multi Objective Prioritized Workflow Scheduling Using Deep Reinforcement Based Learning in Cloud Computing.
IEEE Access, 2024

2023
An energy efficient RL based workflow scheduling in cloud computing.
Expert Syst. Appl., December, 2023

Multi objective task scheduling algorithm in cloud computing using grey wolf optimization.
Clust. Comput., December, 2023

Classification of Distributed Denial of Service Attacks in VANET: A Survey.
Wirel. Pers. Commun., September, 2023

Fault-Tolerant Trust-Based Task Scheduling Algorithm Using Harris Hawks Optimization in Cloud Computing.
Sensors, September, 2023

Prioritized Task-Scheduling Algorithm in Cloud Computing Using Cat Swarm Optimization.
Sensors, July, 2023

EEOA: Cost and Energy Efficient Task Scheduling in a Cloud-Fog Framework.
Sensors, March, 2023

An Efficient Trust-Aware Task Scheduling Algorithm in Cloud Computing Using Firefly Optimization.
Sensors, February, 2023

Multi objective trust aware task scheduling algorithm in cloud computing using whale optimization.
J. King Saud Univ. Comput. Inf. Sci., February, 2023

A Multi-Objective Based Scheduling Framework for Effective Resource Utilization in Cloud Computing.
IEEE Access, 2023

2020
Naïve Bayes Classifier to Mitigate the DDoS Attacks Severity in Ad-Hoc Networks.
Int. J. Commun. Networks Inf. Secur., 2020

2017
An effective analysis on intrusion detection systems in wireless mesh networks.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2014
Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks.
Secur. Commun. Networks, 2014

2012
Cross-layer IDS for Rushing attack in Wireless Mesh Networks.
Proceedings of the Second International Conference on Computational Science, 2012

2011
Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011


  Loading...