Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vamsi P. Raghu
@article{DBLP:journals/ijpe/ShrivastavaR24, author = {Aparna Shrivastava and Vamsi P. Raghu}, title = {Improving Anomaly Classification using Combined Data Transformation and Machine Learning Methods}, journal = {Int. J. Perform. Eng.}, volume = {20}, number = {2}, pages = {68}, year = {2024}, url = {https://doi.org/10.23940/ijpe.24.02.p2.6880}, doi = {10.23940/IJPE.24.02.P2.6880}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijpe/ShrivastavaR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpe/BatraR24, author = {Payal Khurana Batra and Vamsi P. Raghu}, title = {Fuzzy Logic-Based Cluster Head Selection Method for Enhancing Wireless Sensor Network Lifetime}, journal = {Int. J. Perform. Eng.}, volume = {20}, number = {2}, pages = {81}, year = {2024}, url = {https://doi.org/10.23940/ijpe.24.02.p3.8190}, doi = {10.23940/IJPE.24.02.P3.8190}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijpe/BatraR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/ShrivastavaV23, author = {Aparna Shrivastava and Potukuchi Raghu Vamsi}, title = {Anomaly Detection using Minimum Covariant Determinant as Feature in Multivariate Data}, booktitle = {Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023}, pages = {501--514}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607947.3608054}, doi = {10.1145/3607947.3608054}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3/ShrivastavaV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/SachdevaV22, author = {Ujjwal Sachdeva and Potukuchi Raghu Vamsi}, title = {Analysis of Deep Learning Models for Anomaly Detection in Time Series IoT Sensor Data}, booktitle = {Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, IC3-2022, Noida, India, August 4-6, 2022}, pages = {54--62}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549206.3549218}, doi = {10.1145/3549206.3549218}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3/SachdevaV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/RavindranV21, author = {Urshila Ravindran and Potukuchi Raghu Vamsi}, title = {A Secure Blockchain based Finance Application}, booktitle = {{IC3} 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5 - 7, 2021}, pages = {99--109}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474124.3474138}, doi = {10.1145/3474124.3474138}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3/RavindranV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sis/PC20, author = {Raghu Vamsi P. and Anjali Chahuan}, title = {Machine Learning Based Hybrid Model for Fault Detection in Wireless Sensors Data}, journal = {{EAI} Endorsed Trans. Scalable Inf. Syst.}, volume = {7}, number = {24}, pages = {e6}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.161368}, doi = {10.4108/EAI.13-7-2018.161368}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sis/PC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/PK18, author = {Raghu Vamsi P. and Krishna Kant}, title = {Trust and reputation aware geographic routing method for wireless ad hoc networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {27}, number = {2}, pages = {121--137}, year = {2018}, url = {https://doi.org/10.1504/IJAHUC.2015.10001793}, doi = {10.1504/IJAHUC.2015.10001793}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/PK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/PK17, author = {Raghu Vamsi P. and Krishna Kant}, title = {Generalized Trust Model for Cooperative Routing in MANETs}, journal = {Wirel. Pers. Commun.}, volume = {97}, number = {3}, pages = {4385--4412}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4730-1}, doi = {10.1007/S11277-017-4730-1}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/PK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PK16, author = {Raghu Vamsi P. and Krishna Kant}, title = {Trust aware cooperative routing method for WANETs}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {6189--6201}, year = {2016}, url = {https://doi.org/10.1002/sec.1765}, doi = {10.1002/SEC.1765}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compute/PK15, author = {Raghu Vamsi P. and Krishna Kant}, title = {Trust Aware Resilient Geographic Routing in Wireless Ad Hoc and Sensor Networks}, booktitle = {Proceedings of the 8th Annual {ACM} India Conference, Ghaziabad, India, October 29-31, 2015}, pages = {29--35}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2835043.2835058}, doi = {10.1145/2835043.2835058}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compute/PK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/PK14, author = {Raghu Vamsi P. and Krishna Kant}, editor = {Manish Parashar and Umesh Bellur and S. D. Madhu Kumar and Priya Chandran and Murali Krishnan and Kamesh Madduri and Sushil K. Prasad and C. Chandra Sekhar and Nanjangud C. Narendra and Carlos Valera and Sanjay Chaudhary and Kavi Arya and Xiaolin Li}, title = {A lightweight Sybil attack detection framework for Wireless Sensor Networks}, booktitle = {Seventh International Conference on Contemporary Computing, {IC3} 2014, Noida, India, August 7-9, 2014}, pages = {387--393}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IC3.2014.6897205}, doi = {10.1109/IC3.2014.6897205}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3/PK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/PK14a, author = {Raghu Vamsi P. and Krishna Kant}, editor = {Manish Parashar and Umesh Bellur and S. D. Madhu Kumar and Priya Chandran and Murali Krishnan and Kamesh Madduri and Sushil K. Prasad and C. Chandra Sekhar and Nanjangud C. Narendra and Carlos Valera and Sanjay Chaudhary and Kavi Arya and Xiaolin Li}, title = {Adaptive Trust Model for secure geographic routing in Wireless Sensor Networks}, booktitle = {Seventh International Conference on Contemporary Computing, {IC3} 2014, Noida, India, August 7-9, 2014}, pages = {394--399}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IC3.2014.6897206}, doi = {10.1109/IC3.2014.6897206}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3/PK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.