Papers published by the Students

  1. P Adithya Kiran (Y12CS927), " Shoulder Surfing proof secure authentication algorithm using textual passwords " International Journal of scientific and engineering research, Volume 6, No.8, August 2015, ISSN:2229-5518.
  2. Vaibhav Jain(Y10CS910), P.Sai Sathvik,K.Sindhu, M.Sreelatha, "Homogeneous Clustering Based Ensemble Classifier", International Journal of Computer Science Engineering, Vol. 4 No.04, pp 122-127, Jul 2015, ISSN : 2319-7323.
  3. V.Rajesh(Y11MTCS816) and E.Ramesh, "A Novel Price Demand Model Designed for a Cloud Cache", International Journal of Advances in Soft Computing Technology, pp.28-32,Vol 3, Issue 2, July-December, 2013.
  4. K.Venkataiah(Y11MTCS812), M.Srikanth,E.Ramesh, "An Appraoch for Resilient Multipath Routing with Independent Directed Acyclic Graphs",International Journal Of Adavnces in Computer ,Electrical and Electronin Engineering(IJACEEE),pp.1-7,Vol 3,Issue 1, October2013-March2014 .
  5. P.Neelima(Y11MTCS815), Ch.Aparna, "Ontologies to improve the Integration of User Knowledge in the Post Mining of Association", International Journal of Advances in Soft Computing Technology,pp.21-26,Vol 3,Issue 2, July-December,2013.
  6. Hanumantha Rao M(Y11MTCS807), B.Vara Prasad Rao, " A Method for Domain Specific Search by Using Ranking based Adaptation Model", International Journal od advances in Soft Computing Technology",pp.1-13 Vol 3,Issue 2, July-December 2013.
  7. S.Ramesh Babu(Y11MTCS818), N.Venkateswara Rao, " An Approach for Blocking Misbehaving Users in Networks", International Journal of Advances in Soft Computing Technology ,pp.1-5,vol 3,Issue 2,July-Dec 2013.
  8. K.Aravinda(Y11MTCS810), A.Sri Nagesh, G.P.Saradhi Varma, A.Govardhan, M.Sree Latha, " A Modified shape feature extraction technique for Image Retrieval" ,International Journal of Emerging Science and Engineering,pp.9-13, Volume 1,Issue 8,June 2013.
  9. M.Vineela(Y11MTCS824), N.Venkateswara Rao, "Video Streaming With Dynamic Bayesian Networks", International Journal of Computer Science and Information Technologies(IJCSIT),pp.505-509, vol 4,Issue 3,May-june, 2013.
  10. B.Srikanth(Y11MTCS803),Smt K.Venkata Ramana, "Firewall Policy Anomaly Detection and Resolution Using Rule Based Approach", International Journal of Innovative Research in Computer and Communication Engineering,pp.660-667, Vol 1,Issue 3,May 2013.
  11. A.S.S.S.Sudhamsu(Y11MTCS801), Ch.Ratna Babu, "Document Images Certification via PNG Image with a Visual Cryptography Method", International Journal of Advances in Computer,Electrical & Electronics Engineering,pp.70-77,Vol 2, Issue 2, April- Sept 2013.
  12. G.Saivamsidhar(Y11MTCS806), S.J.R.K.Padmini Valli V,"Density Based Multi feature backgroung Substraction Using Support Vector Machine", International Journal for Development in Computer Science and Technology", pp.64-73,Volume I, Issue 3, April-May ,2013.
  13. P.V.S.Sri Ram(Y10CS890 ), G.Sri Swetha(Y10CS905), "A Novel two step random colored grid graphical password authentication system", International Journal of Computer science and Engineering Technology,Vol 4,No.4, April 2013.
  14. V.Rajesh(Y11MTCS816), E.Ramesh, M.Srikanth, "Optimal Pricing for Cloud Computing", National Conference on Advanced Technologies in Computer Science, organized by cse 0f Madanapalle Institute of Technology &Science pp.123-132,30-31 May 2013.
  15. Y.Krishna Chaitanya , Smt. M.Sreelatha, M.Srikanth, “ A New cryptographic method using shared dictionary”, International Journal of information Technology,engineering and sciences, Vol .2,No.1,January 2012.
  16. I.Rajasekhar, Smt.M.Sreelatha,M.Srikanth, “Simple Password Protector, International Journal of Data Mining and Knowledge Engineering in Coimbatore Institute of Information Technology(CIIT),PP:858-861, Vol.3, No.14, ISSN No: 0974-9683,DOI:DMKE1020110131, Oct, 2011.
  17. M Anirudh, MD Sultan Ahamar, V Manoj Kumar, Smt.M.Sreelatha, M.Shashi, “Authentication Schemes for Session Passwords using Color & Images”, International Journal of Network Security and its Applications (IJNSA), Vol.3, No.3, , DOI: 10.5121/ijnsa.2011.3308,May 2011.
  1. Ch.Sunitha, V.Sushma,M.Sreelatha,K.Venkata Ramana, “Two level data hiding scheme: Using shape based cryptography and MIB steganography Technique”, International Conference on Computer science and Engineering, Vizag, ISBN: 978-93-81693-57-5,April 2012.
  2.  M Anirudh, MD Sultan Ahamar, V Manoj Kumar,M.Sreelatha,M.Shashi, “Authentication Schemes for Session Passwords using Color & Images”, International Conference on Frontiers of Computer Science, ICFOCS-2011 organized by Atria Institute of Technology, Bangalore at JN Tata Centre, IISc., Bangalore, August 2011.
  3. M.Roop Teja, M.Rajasekhar, K.Sasank,M.Sreelatha, M.Shashi,  “Intrusion Prevention by Image Based Authentication Techniques”, IEEE Sponsored International Conference on Recent Trends in Information Technology, ICRTIT 2011, M.I.T, Anna University, Chennai, June 2011.