S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | Dr. K Rajasekhara rao | Intrusion Detection Using Data Mining Techniques | NAT | CSI National Conference on education and research | 2010 |
2 | Dr K Subrahmanyam | Ticket Based Authentication And Key-Exchange Mechanism For Group Communication in Mobile ADHOC Networks | NAT | NCACC | 2010 |
3 | Dr. J K R Sastry,V Chandra Prakash | A Formal Framework for Verification and Validation of External Behavioral Models of Embedded Systems Represented Through Black Box Structures | INT | IEEE 2nd International Advance Computing Conference(IACC’10) | 2010 |
4 | K Subba Rao, M Samule Babu,L S S Reddy, J Sasi Banu,Dr. J K R Sastry, | Attacking Embedded Systems through EMA | INT | 2nd IEEE International Conference on Radio Frequency and signal processing(RSSP2010) | 2010 |
5 | Prof V Chandra Prakash ,Dr. J K R Sastry | A formal framework for presenting requirement specifications of an embedded systems as a Black box structure | INT | 1st International joint conference on Information and communication Technology IJCICT 2010 | 2010 |
6 | D Aruna Kumari, Y Madavi Latha,K Venkatesh,Dr. K Rajasekhara Rao | Information Retrieval in Peer to Peer Networks Query Processing at Nodes | INT | Towards Quality Driven Software Applications and Infrastructures | 2010 |
7 | D Aruna Kumari,Dr. K Rajasekhara Rao,M.Suman | Privacy Preserving Distributed Data Mining: a Approach Using Stegonography | INT | Recent Trends in Network Security and Applications | 2010 |
8 | Shekar Babu Boddu,V P Krishna Anne,Dr.K Rajasekhara Rao,Durgesh Kumar Vishal | Knowledge Discovery And Retrieval On World Wide Web Using Web Structure Mining | INT | Fourth Asia International Conference On Mathematical /Analytical Modeling and Computer Simulation | 2010 |
9 | Dr K Subrahmanyam | IDS Alert Classifications Using Data Mining Techniques | NAT | NCACC | 2010 |
10 | Mr Y A Siva Prasad | Decision of Automation of a Document Scanned or Photographed | NAT | NCAC | 2010 |
11 | Mr Y A Siva Prasad | Knowledge discovery and privacy preserving in Large & Fully Distributed peer-to-peer networks | NAT | NCOITES | 2010 |
12 | Ms N Naga Kumari | SIGF:A Grouped Protocol For Security In Wireless Sensor Networks | NAT | NCACC | 2010 |
13 | Ms N Naga Kumari | Documents Clustering in Web Search Engine For Information Retrieval | NAT | NCAC | 2010 |
14 | Ms A Anusha | Congestion Control Mechanisms For Wireless Mesh Networks | NAT | NCACC | 2010 |
15 | Ms G Anupama | Interfacing Private data By Providing Privacy Preserving Techniques | NAT | NCACC | 2010 |
16 | Ms P Srivalli | MAC Protocols For Wireless Sensor Networks | NAT | NCACC | 2010 |
17 | KVV Satya Narayana | Simulating and Analyzing a Secure and Policy Compliant Source Routing | NAT | ERTSP | 2010 |
18 | Dr. J K R Sastry | Attacking embedded systems through power analysis | NAT | National Conference NACTECIT’10. | 2010 |
19 | V P Praveen Krishna | Intrusion Detection using data mining techniques | NAT | 3rd CSI National Conference on Education and Research ConfER 2010 | 2010 |
20 | G Shyam Chandra Prasad, A Govardhan and Dr. T V Rao | Robust Invariant Neuron Modeling for Pattern Recognition | INT | Information Processing 2010 | 2010 |
21 | G Shyam Chandra Prasad, A Govardhan ,Dr. T V Rao and K Venu Gopal Rao. | Natural Image Classification Using Content Based Image Retrieval System | INT | ICMCBIR | 2010 |
22 | Samule Vara Prasad Raju and Rajendra Kumar.G | Active Microelectronic Neurosensory Arrays for implantable Brain Communication Interfaces | INT | 3rd international Conference on Signal and image process | 2010 |