关注
Raja Sekhar Krovi
Raja Sekhar Krovi
SRM University Andhra Pradesh
在 srmap.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Performance evaluation parameters of image steganography techniques
KR Pradhan, A., Sahu, A.K., Swain, G., Sekhar
International Conference on Research Advances in Integrated Navigation …, 2016
116*2016
Digital Image Steganography Using LSB Substitution, PVD, and EMD
G Pradhan, A., Sekhar, K.R., Swain
Mathematical Problems in Engineering 8 (1804953), 1804953, 2018
62*2018
Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks
G Pradhan, A., Sekhar, K.R., Swain
Security and Communication Networks 1924618 (8), 1924618, 2017
51*2017
Digital image steganography based on seven way pixel value differencing
G Pradhan, A., Raja Sekhar, Krovi., Swain
Indian Journal of Science and Technology 9 (37), 88557, 2016
41*2016
An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks
D Aluvala, S., Sekhar, K.R., Vodnala
Procedia Computer Science 92, 554-561, 2016
332016
A novel technique for node authentication in mobile ad hoc networks
DV Srinivas Aluvala, Dr. K. Raja Sekhar
Recent Trends in Engineering and Material Sciences 8 (September 2016), 680-682, 2016
30*2016
Machine learning approach of hybrid KSVN algorithm to detect DDoS attack in VANET
N Kadam, RS Krovi
International Journal of Advanced Computer Science and Applications 12 (7), 2021
232021
Redactable blockchain and it’s implementation in bitcoin
K Rajasekhar, SH Yalavarthy, S Mullapudi, M Gowtham
International Journal of Engineering & Technology 7 (1), 401-405, 2018
212018
User activity monitoring using keylogger
K Venkatesh, R., Raja Sekhar
Asian Journal of Information Technology 15 (23), 4758-4762, 2016
16*2016
An integrated approach towards vulnerability assessment & penetration testing for a web application
P Siva Prasad, K., Raja Sekhar, K., Rajarajeswari
International Journal of Engineering and Technology(UAE) 7 (2.32 Special …, 2018
82018
Study on improving the network life time maximazation for wireless sensor network using cross layer approach
K Bhandari, R.R., Raja Sekhar
International Journal of Electrical and Computer Engineering 6 (6), 3080-3086, 2016
82016
Image steganography using add-sub based QVD and side match
A Pradhan, KR Sekhar, G Swain
Digital Media Steganography, 81-97, 2020
72020
A fabric architecture towards block chain application using hyper ledger
M Haseeb, M., Raja Sekhar, Krovi., Spandana, Y.V., Syam
International Journal of Engineering and Technology(UAE) 7 (2), 83-85, 2018
72018
Digital image steganography combining lsb substitution with five way PVD in 2×3 pixel blocks
G Pradhan, A., Raja Sekhar, K., Swain
International Journal of Pharmacy and Technology 8 (4), 22051-22061, 2016
72016
Verification of pattern unlock and gait behavioural authentication through a machine learning approach
GK Chaitanya, K Raja Sekhar
International Journal of Intelligent Unmanned Systems 10 (1), 48-64, 2022
62022
Energy-efficient routing-based clustering approaches and sleep scheduling algorithm for network lifetime maximization in sensor network: A survey
K Bhandari, R.R., Rajasekhar
Lecture Notes in Networks and Systems 89, 293-306, 2020
6*2020
Secure and congestion free routing techniques in vehicular Ad-Hoc Network (VANET)
KR Kadam, N.N., Sekhar
International Journal of Recent Technology and Engineering 8 (1 Special …, 2019
62019
Secure federated learning architecture for fuzzy classifier in healthcare environment
S Vishwakarma, RS Goswami, PP Nayudu, KR Sekhar, PRR Arnepalli, ...
Soft Computing, 1-12, 2023
52023
Cloud environment: A review on dynamic resource allocation schemes
PP Nayudu, KR Sekhar
Int J Appl Eng Res 13 (6), 4568-4575, 2018
52018
Secure system of attack patterns towards application security metric derivation
KR Sekhar, LSS Reddy, UJ Kameswari
International Journal of Computer Applications 53 (1), 11-18, 2012
52012
系统目前无法执行此操作,请稍后再试。
文章 1–20