K. V. S. V. N. Raju

According to our database1, K. V. S. V. N. Raju authored at least 26 papers between 1986 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Time Series Dataset For DDOS Attack Detection.
Dataset, January, 2022

2021
Model for High Dynamic Range Imaging System Using Hybrid Feature Based Exposure Fusion.
J. Intell. Syst., 2021

2018
Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust.
Int. J. Netw. Secur., 2018

2012
Randomized symmetric block encryption.
Proceedings of the First International Conference on Security of Internet of Things, 2012

SenSim: sentence similarity based on the concept of relevance.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

2011
Trust Based Participant Driven Privacy Control in Participatory Sensing
CoRR, 2011

Minimum Spanning Tree Based k-Anonymity.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

Checking Anonymity Levels for Anonymized Data.
Proceedings of the Distributed Computing and Internet Technology, 2011

2010
Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Efficient Conference Key Distribution for Dynamic Groups.
Proceedings of the 2010 International Conference on Signal Acquisition and Processing, 2010

s-Tuple Inclusion - A New Method for Privacy Preserving Publication of Datasets.
Proceedings of The 2010 International Conference on Data Mining, 2010

Scalable rekeying for dynamic groups using key path compression.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

Study of Visitor Behavior by Web Usage Mining.
Proceedings of the Information Processing and Management, 2010

Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring.
Proceedings of the Information Processing and Management, 2010

2009
An Improved Fuzzy Approach for COCOMO's Effort Estimation Using Gaussian Membership Function.
J. Softw., 2009

An Effective Calculation of Reputation in P2P Networks.
J. Networks, 2009

Privacy Preserving Sharing of Data.
Proceedings of The 2009 International Conference on Data Mining, 2009

2008
Credibility Based Reputation Calculation in P2P Networks.
Proceedings of the Distributed Computing and Internet Technology, 2008

A Novel Approach for Privacy Preserving Publication of Data.
Proceedings of The 2008 International Conference on Data Mining, 2008

2007
Policy Based Controlled Migration of Mobile Agents to Untrusted Hosts.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Privacy Preserving in Clustering by Categorizing Attributes Using Privacy and Non Privacy Disclosure Sets.
Proceedings of the 2007 International Conference on Data Mining, 2007

Enhanced User Privacy on Trusted Processors.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Fair and secure m-cash.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Privacy Preserving in Clustering using Fuzzy Sets.
Proceedings of the 2006 International Conference on Data Mining, 2006

1988
Fuzzy Functional Dependencies and Lossless Join Decomposition of Fuzzy Relational Database Systems.
ACM Trans. Database Syst., 1988

1986
Fuzzy Functional Dependencies in Fuzzy Relations.
Proceedings of the Second International Conference on Data Engineering, 1986


  Loading...