S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | Dr K Subrahmanyam , Ibrahim, S De lara, R A A. | An Evaluation of Malaysian ICT Sectors Readiness of Telecommuting | INT | IEEE Xplore | 2008 |
2 | Dr. J K R Sastry,V Chandra Prakash,Dr. V L S S Reddy | A Formal Framework for Verification and Validation of External Behavioral Models of ES through usage case models | INT | IEEE International Conference on ES and Mutli Media EM-COM 2009 | 2009 |
3 | Dr. J K R Sastry,V Chandra Prakash, V L S S Reddy | A Formal Framework for Modeling External Behavior of an Embedded System as a Black Box Structure | INT | IEEE International conference on Embedded system and Multimedia (EM-COM 2009) | 2009 |
4 | Mrs D Radha Rani | Clustering Based Outlier Detection Method for Network Based Intrusion Detection | INT | International Seminar on Artificial Intelligence and Applications | 2009 |
5 | Dr. J K R Sastry,V Chandra Prakash | A Formal Framework for Verification and Validation of External Behavioral Models of Embedded Systems Represented Through Black Box Structures | INT | IEEE 2nd International Advance Computing Conference(IACC’10) | 2010 |
6 | K Subba Rao, M Samule Babu,L S S Reddy, J Sasi Banu,Dr. J K R Sastry, | Attacking Embedded Systems through EMA | INT | 2nd IEEE International Conference on Radio Frequency and signal processing(RSSP2010) | 2010 |
7 | Prof V Chandra Prakash ,Dr. J K R Sastry | A formal framework for presenting requirement specifications of an embedded systems as a Black box structure | INT | 1st International joint conference on Information and communication Technology IJCICT 2010 | 2010 |
8 | Dr. J K R Sastry | Attacking embedded systems through power analysis | NAT | National Conference NACTECIT’10. | 2010 |
9 | K Raja Sekhar, Dr L S S Reddy, U Jyothi Kumari. | Templates to Derive Security Metrics based on Attack Patterns | INT | International Conference on Software Engineering | 2012 |
10 | A V Praveen Krishna, Vidya Sagar Ponnam, Gorantla Praveen. | A Significant Approach for Cloud Database using Shared-Disk Architecture | INT | International Conference on Software Engineering | 2012 |
11 | A V Praveen Krishna, J Venkata Rao, Rajasekhara Rao Kurra. | Enforcing the Security within Mobile Devices using Clouds and its Infrastructure | INT | International Conference on Software Engineering | 2012 |
12 | G.Siva Nageswara Rao | Extreme Programming for Service Based Application Development Architecture | INT | CSIBIG | 2013 |
13 | N.Srinivasu | Cructure Based Drug Design Studies on CDK2 Amino Pyrazole Inhibitors using Autodock Tools | INT | CSIBIG | 2013 |
14 | Y.Prashanth | Parsing Natural Language Text of Use Case Description | INT | CSIBIG | 2013 |
15 | Y.Prashanth | Improving the Rapid Application Development Process Model | INT | CSIBIG | 2013 |
16 | M.Sreedevi | Parllel&distributed Approach For Incremental Closed Regular Patternminig | INT | CSIBIG | 2013 |
17 | K.V.D Kiran | Information Security Risk Management in Critical Informative Systems | INT | CSIBIG | 2013 |
18 | A.V.P.Krishna | Hiden Webdata Extraction Using Word Net Ontologies | INT | CSIBIG | 2013 |