A comprehensive survey of load balancing strategies using hadoop queue scheduling and virtual machine migration NS Dey, T Gunasekhar IEEE Access 7, 92259-92284, 2019 | 43 | 2019 |
A survey on denial of service attacks T Gunasekhar, KT Rao, P Saikiran, PVS Lakshmi International Journal of Computer Science and Information Technologies 5 (2 …, 2014 | 36 | 2014 |
Understanding insider attack problem and scope in cloud T Gunasekhar, KT Rao, MT Basu 2015 International Conference on Circuits, Power and Computing Technologies …, 2015 | 33 | 2015 |
Mitigation of Insider Attacks through Multi-Cloud. T Gunasekhar, KT Rao, VK Reddy, BT Rao International Journal of Electrical & Computer Engineering (2088-8708) 5 (1), 2015 | 21 | 2015 |
TDMA-based MAC protocols for scheduling channel allocation in multi-channel wireless mesh networks using cognitive radio M Anusha, S Vemuru, T Gunasekhar 2015 international conference on circuits, power and computing technologies …, 2015 | 20 | 2015 |
Transmission protocols in cognitive radio mesh networks M Anusha, S Vemuru, T Gunasekhar International Journal of Electrical and Computer Engineering 5 (6), 2015 | 13 | 2015 |
Mitigating application ddos attacks using random port hopping technique RP Kumar, J Babu, T Gunasekhar, SB Bhushan International Journal of Emerging Research in Management &Technology 4 (1), 1-4, 2015 | 11 | 2015 |
EBCM: Single Encryption, Multiple Decryptions T Gunasekhar,K Thirupathi Rao International Journal of Applied Engineering Research 9 (19), 5885-5893, 2014 | 11 | 2014 |
Novel approach for control data theft attack in cloud computing KN Sastry, BT Rao, T Gunasekhar International Journal of Electrical and Computer Engineering 5 (6), 2015 | 10 | 2015 |
WITHDRAWN: Key challenges and research direction in cloud storage MNS Gajjam, T Gunasekhar Materials Today: Proceedings, 2021 | 6 | 2021 |
A systematic analysis of load balancing in cloud computing A Bezawada, ST Marella, T Gunasekhar International Journal of Simulation--Systems, Science & Technology 19 (6), 2018 | 6 | 2018 |
Framework for prevention of insider attacks in cloud infrastructure through hardware security T Gunasekhar, KT Rao Journal of Advanced Research in Dynamical and Control Systems 9 (3), 56-63, 2017 | 6 | 2017 |
A Reconstruction Algorithm using Binary Transform for Privacy-Preserving Data Mining DA Kumari, T Gunasekhar Indian Journal of Science and Technology 9 (17), 1-5, 2016 | 6 | 2016 |
A Study on IP Network Recovery through Routing Protocols K Karthik, T Gunasekhar, D Meenu, M Anusha Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 4 (3 …, 2016 | 3 | 2016 |
Meshing VANEMO protocol into VANETs M Dileep Kumar, M. Trinath Basu, T Gunasekhar International Journal of Applied Engineering Research 10 (12), 31951-31958, 2015 | 3* | 2015 |
A Study on Security Issues and Attacks, Challenges and Future Improvements in Cloud-based IoT P Nuthakki, T Gunasekhar International Journal of Sensors Wireless Communications and Control 12 (2 …, 2022 | 2 | 2022 |
Cognitive computing T Gunasekhar, MS Teja Cognitive engineering for next generation computing: A practical analytical …, 2021 | 1 | 2021 |
A Novel Technique for Optimal Power Allocation Efficient Spectrum Sharing Radio Cognitive Networks CHVS Reddy, GSN Rao, N Vurukonda, T Gunasekhar Indian Journal of Science and Technology 9, 47, 2016 | 1 | 2016 |
ACO-Inspired Load Balancing Strategy for Cloud-Based Data Centre with Predictive Machine Learning Approach N Dey, T Gunasekhar, K Purnachand CMC-COMPUTERS MATERIALS & CONTINUA 75 (1), 513-529, 2023 | | 2023 |
An Empirical Survey on Load Balancing: A Nature-Inspired Approach ST Marella, T Gunasekhar Scheduling Problems-New Applications and Trends, 2020 | | 2020 |