Performance evaluation parameters of image steganography techniques KR Pradhan, A., Sahu, A.K., Swain, G., Sekhar International Conference on Research Advances in Integrated Navigation …, 2016 | 116* | 2016 |
Digital Image Steganography Using LSB Substitution, PVD, and EMD G Pradhan, A., Sekhar, K.R., Swain Mathematical Problems in Engineering 8 (1804953), 1804953, 2018 | 62* | 2018 |
Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks G Pradhan, A., Sekhar, K.R., Swain Security and Communication Networks 1924618 (8), 1924618, 2017 | 51* | 2017 |
Digital image steganography based on seven way pixel value differencing G Pradhan, A., Raja Sekhar, Krovi., Swain Indian Journal of Science and Technology 9 (37), 88557, 2016 | 41* | 2016 |
An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks D Aluvala, S., Sekhar, K.R., Vodnala Procedia Computer Science 92, 554-561, 2016 | 33 | 2016 |
A novel technique for node authentication in mobile ad hoc networks DV Srinivas Aluvala, Dr. K. Raja Sekhar Recent Trends in Engineering and Material Sciences 8 (September 2016), 680-682, 2016 | 30* | 2016 |
Machine learning approach of hybrid KSVN algorithm to detect DDoS attack in VANET N Kadam, RS Krovi International Journal of Advanced Computer Science and Applications 12 (7), 2021 | 23 | 2021 |
Redactable blockchain and it’s implementation in bitcoin K Rajasekhar, SH Yalavarthy, S Mullapudi, M Gowtham International Journal of Engineering & Technology 7 (1), 401-405, 2018 | 21 | 2018 |
User activity monitoring using keylogger K Venkatesh, R., Raja Sekhar Asian Journal of Information Technology 15 (23), 4758-4762, 2016 | 16* | 2016 |
An integrated approach towards vulnerability assessment & penetration testing for a web application P Siva Prasad, K., Raja Sekhar, K., Rajarajeswari International Journal of Engineering and Technology(UAE) 7 (2.32 Special …, 2018 | 8 | 2018 |
Study on improving the network life time maximazation for wireless sensor network using cross layer approach K Bhandari, R.R., Raja Sekhar International Journal of Electrical and Computer Engineering 6 (6), 3080-3086, 2016 | 8 | 2016 |
Image steganography using add-sub based QVD and side match A Pradhan, KR Sekhar, G Swain Digital Media Steganography, 81-97, 2020 | 7 | 2020 |
A fabric architecture towards block chain application using hyper ledger M Haseeb, M., Raja Sekhar, Krovi., Spandana, Y.V., Syam International Journal of Engineering and Technology(UAE) 7 (2), 83-85, 2018 | 7 | 2018 |
Digital image steganography combining lsb substitution with five way PVD in 2×3 pixel blocks G Pradhan, A., Raja Sekhar, K., Swain International Journal of Pharmacy and Technology 8 (4), 22051-22061, 2016 | 7 | 2016 |
Verification of pattern unlock and gait behavioural authentication through a machine learning approach GK Chaitanya, K Raja Sekhar International Journal of Intelligent Unmanned Systems 10 (1), 48-64, 2022 | 6 | 2022 |
Energy-efficient routing-based clustering approaches and sleep scheduling algorithm for network lifetime maximization in sensor network: A survey K Bhandari, R.R., Rajasekhar Lecture Notes in Networks and Systems 89, 293-306, 2020 | 6* | 2020 |
Secure and congestion free routing techniques in vehicular Ad-Hoc Network (VANET) KR Kadam, N.N., Sekhar International Journal of Recent Technology and Engineering 8 (1 Special …, 2019 | 6 | 2019 |
Secure federated learning architecture for fuzzy classifier in healthcare environment S Vishwakarma, RS Goswami, PP Nayudu, KR Sekhar, PRR Arnepalli, ... Soft Computing, 1-12, 2023 | 5 | 2023 |
Cloud environment: A review on dynamic resource allocation schemes PP Nayudu, KR Sekhar Int J Appl Eng Res 13 (6), 4568-4575, 2018 | 5 | 2018 |
Secure system of attack patterns towards application security metric derivation KR Sekhar, LSS Reddy, UJ Kameswari International Journal of Computer Applications 53 (1), 11-18, 2012 | 5 | 2012 |