intrusion detection models using supervised and unsupervised algorithms a comparitive estimation A Sirisha international journal of safety and security engineering 11 (18), 51-58, 2021 | 18 | 2021 |
Providing data security in a distributed networks using clustered approach aswadhati. sirisha IJAST 28 (16), 1907-1914, 2019 | 7 | 2019 |
On the reduction of partial products using Wallace tree multiplier AS Ramya, B Ramesh Babu, KSN Raju, B Ravi Chandra, A Sirisha, ... Smart Computing and Informatics: Proceedings of the First International …, 2018 | 5 | 2018 |
an adaptive hello interval for AODV THROUGH anfis to improve the performance of MANETS A Sirisha KES journal, 235-242, 2021 | 1* | 2021 |
ONLINE VOTING SYSTEM USING CONVOLUTIONAL NEURAL NETWORK A SIRISHA JOURNAL OF EDUCATION 6 (No.6 ISSN: 0972-7175), 67-75, 2022 | | 2022 |
Web Based Faculty Management System A SIRISHA veda samskrita academy, 58-63, 2022 | | 2022 |
Waste Separation from Sea by using Smart Boat KH Krishna, A Sirisha, VM Reddy Mathematical Statistician and Engineering Applications 70 (2), 309-313, 2021 | | 2021 |
CELLULAR ACCOUNT CLUSTERING TECHNIQUES FOR IDENTIFICATION OF LOCATION OF USERS A Sirisha International journal of advanced science and technology 29 (5), 12724-12733, 2020 | | 2020 |
A SURVEY ON ANOMALY DETECTION OF BIG DATA USING MACHINE LEARNING TECHNIQUES BP A.Sirisha journal of critical reviews 7 (18), 2775-2784, 2020 | | 2020 |
Eelectronic Governance of Housing Price using Boston Dataset Implementing through Deep Learning Mechanism A Sirisha IJRTE 7 (6S2), 560-563, 2020 | | 2020 |
Plant Disease Identification Using Naïve Naive Bayes classification Algorithm A Sirisha international journal of management technology and engineering 9 (5), 4553-4562, 2019 | | 2019 |
Design and analysis of a novel extended 3 tier security scheme for efficient data transfer in mobile networks aswadhati. sirisha internationsl journal of computing applications 1 (6), 2016 | | 2016 |
Enhanced Cryptography Technique: By Integrating Color and Arm Strong Numbers for Data Transfer A Sirisha Journal of Computing Technologies 4 (8), 78-83, 2015 | | 2015 |
Intrusion Detection Models Using Supervised and Unsupervised Algorithms-A Comparative Estimation Intrusion Detection Models Using Supervised and Unsupervised Algorithms-A … A Sirisha, K Chaitanya, KVSSR Krishna, SS Kanumalli | | |
CONSTRUCTING A UNIQUE EFFECTIVE KEY MANAGEMENT (UEKM) TECHNIQUE FOR A SECURE DATA TRANSMISSION IN A HYBRID WIRELESS SENSOR NETWORKS P ANKAMMARAO, A SIRISHA, DB PRAKASH | | |