Hybrid random forest and synthetic minority over sampling technique for detecting internet of things attacks MG Karthik, MBM Krishnan Journal of Ambient Intelligence and Humanized Computing, 1-11, 2021 | 39 | 2021 |
Managing DDoS attacks on virtual machines by segregated policy management EP Krishna, E Sandhya, MG Karthik Global Journal of Computer Science and Technology 14 (6), 20-24, 2014 | 17 | 2014 |
Flooding attacks to internet threat monitors (ITM): modeling and counter measures using botnet and honeypots KM Prasad, A Reddy, MG Karthik arXiv preprint arXiv:1201.2481, 2012 | 16 | 2012 |
Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things R Vatambeti, ESP Krishna, MG Karthik, VK Damera Cluster Computing 27 (2), 1625-1637, 2024 | 11 | 2024 |
Securing an internet of things from distributed denial of service and Mirai botnet attacks using a novel hybrid detection and mitigation mechanism MG Karthik, MBM Krishnan Int. J. Intell. Eng. Syst 14, 113-123, 2021 | 11 | 2021 |
Segmentation Using the IC2T Model and Classification of Diabetic Retinopathy Using the Rock Hyrax Swarm-Based Coordination Attention Mechanism BN Jagadesh, MG Karthik, D Siri, SK Shareef, SV Mantena, R Vatambeti IEEE Access, 2023 | 9 | 2023 |
Enhanced SVM Model with Orthogonal Learning Chaotic Grey Wolf Optimization for Cybersecurity Intrusion Detection in Agriculture 4.0. KS Shaik, NS Kumar Thumboor, SP Veluru, NJ Bommagani, D Sudarsa, ... International Journal of Safety & Security Engineering 13 (3), 2023 | 7 | 2023 |
An efficient flash crowd attack detection to internet threat monitors (itm) using honeypots KM Prasad, MG Karthik, ESP Krishna Advances in Computing and Information Technology: Proceedings of the Second …, 2013 | 7 | 2013 |
An Intrusion Detection Model Based on Hybridization of S-ROA in Deep Learning Model for MANET MG Karthik, U Sivaji, M Manohar, D Jayaram, MV Gopalachari, ... Iranian Journal of Science and Technology, Transactions of Electrical …, 2024 | 5 | 2024 |
A Natural Language Processing for Sentiment Analysis from Text using Deep Learning Algorithm G Kotapati, SK Gandhimathi, PA Rao, GK Muppagowni, KR Bindu, ... 2023 2nd International Conference on Edge Computing and Applications (ICECAA …, 2023 | 4 | 2023 |
Selection of features using adaptive tunicate swarm algorithm with optimized deep learning model for thyroid disease classification PK Jakkulla, KM Ganesh, PK Jayapal, SJ Malla, SB Chandanapalli, ... Ingenierie Des Systemes d'Information 28 (2), 299, 2023 | 4 | 2023 |
Detecting Internet of Things Attacks Using Post Pruning Decision Tree-Synthetic Minority Over Sampling Technique. MG Karthik, MB Krishnan International Journal of Intelligent Engineering & Systems 14 (4), 2021 | 3 | 2021 |
An efficient detection of DDoS flooding attacks: a survey AS Kumar, MG Karthik, M Tech Int. J. Sci. Eng. Technol. Res.(IJSETR) 5 (7), 2401-2405, 2016 | 2 | 2016 |
A Proficient Prediction Mechanism for Analyzing Water Quality Using Machine Learning Algorithms SK Gandhimathi, GK Muppagowni, K Sandhya, RR Arava, G Kotapati 2023 International Conference on Self Sustainable Artificial Intelligence …, 2023 | 1 | 2023 |
HPO Using Dwarf Mongoose Optimization in the GAN Model for Human Gait Recognition. GK Muppagowni, SV Mantena, P Chintamaneni, S Chennupalli, ... International Journal of Safety & Security Engineering 13 (2), 2023 | 1 | 2023 |
Enhancing Sentiment Analysis Accuracy through Data driven Hyperparameter Optimization Using Convolutional Neural Network GK Muppagowni, VS Pujari, T Varampati, RCG Muthyala, A Sambangi 2024 International Conference on Advances in Computing, Communication and …, 2024 | | 2024 |
A Prevention Approach to Counter DDoS Attacks in Application Layer AS Kumar, MG Karthik i-Manager's Journal on Information Technology 5 (3), 9, 2016 | | 2016 |
Providing Security to the Neighbouring Nodes in the Data Link Layer using Pseudo Random with RSA Algorithm N Poornima i-manager's Journal on Mobile Applications and Technologies 2 (3), 30, 2015 | | 2015 |