Threat Analysis using N-median Outlier Detection Method with Deviation Score PM Jyosthna, KT Reddy International Journal of Advanced Computer Science and Applications 12 (8 …, 2021 | 3 | 2021 |
User Prediction in a Role for Secure Data Sharing Through Cloud PM Jyosthna, KT Reddy International Journal of Innovative Technology and Exploring Engineering 10 …, 2019 | 2 | 2019 |
Energy management in cloud computing GN Iyer, PM Jyosthna, S Jonnalagadda Handbook of Research on Emerging Technologies for Electrical Power Planning …, 2016 | 2 | 2016 |
Intent Based Access for Policy Control MJ Pattabhi, TR Konala 2022 International Conference on Breakthrough in Heuristics And …, 2022 | | 2022 |
Prior Authentication Approach to Enhance Security in CloudComputing J Suman, PM Jyosthna | | 2013 |
Establishing Intent Groups for the Intent-Based Access Control Framework PM Jyosthna, KT Reddy | | |