Review on wireless security protocols (WEP, WPA, WPA2 & WPA3) BI Reddy, V Srikanth International Journal of Scientific Research in Computer Science …, 2019 | 36 | 2019 |
Prediction of student performance using machine learning VS Anusha M, K Karthik, P Padmini Rani International Journal of Engineering and Advanced Technology 8 (6), 247, 2019 | 28* | 2019 |
Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks AAK Mohammad, A Mirza, S Vemuru Indian Journal of Science and Technology 9 (26), 1-11, 2016 | 24 | 2016 |
E-commerce online security and trust marks V Srikanth, DR Dhanapal International Journal of Computer Engineering and Technology 3 (2), 238-255, 2012 | 22 | 2012 |
TDMA-based MAC protocols for scheduling channel allocation in multi-channel wireless mesh networks using cognitive radio Anusha M, V Srikanth, T Gunasekhar ICCPCT, 1-5, 2015 | 20* | 2015 |
Optimized feature extraction and hybrid classification model for heart disease and breast cancer prediction SV Sireesha Moturi, S. N. Tirumala Rao International Journal of Recent Technology and Engineering (IJRTE) 7 (6), 1754, 2019 | 18* | 2019 |
Intentional and unintentional misbehaving node detection and prevention in mobile ad hoc network AAK Mohammad, AM Mahmood, S Vemuru International Journal of Hybrid Intelligence 1 (2-3), 239-267, 2019 | 17 | 2019 |
Energy efficient, scalable and reliable MAC protocol for electromagnetic communication among nano devices V Srikanth, S Chaluvadi International Journal of Distributed and Parallel Systems 3 (1), 249, 2012 | 17 | 2012 |
Routing design issues in heterogeneous wireless sensor network MR Dhage, S Vemuru International Journal of Electrical and Computer Engineering 8 (2), 1028, 2018 | 16 | 2018 |
A low-cost software defined radio based Cognitive Radio test-bed for LTE networks KS Babu, S Vemuru International Journal of Engineering and Technology (UAE) 7 (3.1 Special …, 2018 | 16 | 2018 |
A study on light weight cryptography algorithms for data security in IOT MS Lakshmi, V Srikanth International Journal of Engineering and Technology 7 (2.7), 887-890, 2018 | 15 | 2018 |
A layered approach to fraud analytics for NFC-enabled mobile payment system PP Vishwakarma, AK Tripathy, S Vemuru Distributed Computing and Internet Technology: 14th International Conference …, 2018 | 15 | 2018 |
Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, 501301, India,“WIRELESS SECURITY PROTOCOLS (WEP, WPA, WPA2 & WPA3 … V Srikanth, DI Reddy | 14 | |
Transmission protocols in cognitive radio mesh networks M Anusha, S Vemuru, T Gunasekhar International Journal of Electrical and Computer Engineering 5 (6), 2015 | 13 | 2015 |
Location-Based routing protocol in wireless sensor network-A survey GVR Lakshmi, V Srikanth International Journal of Advanced Research in Computer Science and Software …, 2015 | 13 | 2015 |
Structural health monitoring of railway tracks using WSN MR Dhage, S Vemuru 2017 International Conference on Computing, Communication, Control and …, 2017 | 12 | 2017 |
ENERGY AWARE ROUTING FOR MANETS BASED ON CURRENT PROCESSING STATE OF NODES. AAK Mohammad, A Mirza, S Vemuru Journal of Theoretical & Applied Information Technology 91 (2), 2016 | 12 | 2016 |
Analytical Model for Evaluating the Bottleneck Node in MANETs AAK Mohammad, A Mirza, S Vemuru Indian Journal of Science and Technology 9, 31, 2016 | 12 | 2016 |
Grey wolf assisted dragonfly-based weighted rule generation for predicting heart disease and breast cancer S Moturi, SNT Rao, S Vemuru Computerized Medical Imaging and Graphics 91, 101936, 2021 | 11 | 2021 |
An empiric path towards fraud detection and protection for NFC-enabled mobile payment system PP Vishwakarma, AK Tripathy, S Vemuru Universitas Ahmad Dahlan, 2019 | 11 | 2019 |