A. Rama Mohan Reddy
According to our database1,
A. Rama Mohan Reddy
authored at least 21 papers
between 2009 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol.
Int. J. Comput. Aided Eng. Technol., 2021
2020
BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web.
J. King Saud Univ. Comput. Inf. Sci., 2020
An efficient load balancing system using adaptive dragonfly algorithm in cloud computing.
Clust. Comput., 2020
2019
An optimised component selection algorithm for self-adaptive software architecture using the component repository.
Int. J. Adv. Intell. Paradigms, 2019
2018
Ensemble Classifiers with Drift Detection (ECDD) in Traffic Flow Streams to Detect DDOS Attacks.
Wirel. Pers. Commun., 2018
J. Circuits Syst. Comput., 2018
Resource Allocation in Grid Computing Environment Using Genetic-Auction Based Algorithm.
Int. J. Grid High Perform. Comput., 2018
An automation approach for architecture discovery in software design using genetic algorithm.
Int. J. Comput. Sci. Eng., 2018
DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment.
Clust. Comput., 2018
2017
Wirel. Pers. Commun., 2017
An efficient k-means clustering filtering algorithm using density based initial cluster centers.
Inf. Sci., 2017
2016
A fast DBSCAN clustering algorithm by accelerating neighbor searching using Groups method.
Pattern Recognit., 2016
PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
2015
Int. J. Wirel. Mob. Comput., 2015
2013
Int. J. Grid High Perform. Comput., 2013
2012
CoRR, 2012
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots
CoRR, 2012
Proceedings of the Second International Conference on Computational Science, 2012
2011
Proceedings of the Advances in Computing and Communications, 2011
2009
A Dynamic Task-Model Induction Model Based Induction Mining on Large and High Dimension Data.
Proceedings of the ARTCom 2009, 2009