Professor, Cyber Security & Head ITS Anjank@bmsit.in
Qualification : BE, M.Tech , Ph.D
Teaching Experience : 11 Years
Research Experience : 5 Years
Industry Experience : 2 Years
Specialization : Network Security and Cryptology
Journal Name | Journal Type | Volume Number | Issue Number | ISSN ISBN | Paper Title |
---|---|---|---|---|---|
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) | 1 | 4 | 10.5121/ijasuc.2010.1409 | Design of Transport layer based hybrid covert channel detection engine | |
Advanced Computing: International Journal | Open Journal | 3 | 6 | 2229-6727 | Map/ Reduce design and implementation of Apriori alogirthm for voluminous data set |
International Journal of Computer Science & Information Technology (IJCSIT) | Open Access | 5 | 2 | 0975 - 3826 | Performance Analysis of Parallel Pollard's Rho Factoring Algorithm |
INTERNATIONAL JOURNAL OF INVENTIVE RESEARCH IN SCIENCE (IJIRS) | Open Access | 2 | 6 | 2319-9725 | Hybrid Framework for Preserving Privacy and Secured Authentication in Distributed Environment |
INTERNATIONAL JOURNAL OF INVENTIVE RESEARCH IN SCIENCE (IJIRS) | Open Access | 2 | 6 | 2319-9725 | Privacy preserving Multi-factor authentication schemes in distributed environment |
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING | Open Access | 2 | 7 | 2278 – 1021 | Performance Analysis of Goldwasser-Micali Cryptosystem |
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING | Open Access | 2 | 8 | 2278 – 1021 | Design and Implementation of Secured ECC |
Management Guru: Journal of Management Research | Open Access | 2 | 1 | The Design of effectiveness in the Development of soft skills for engineering students through soft skills training program and experiential study on feedback analysis | |
International Journal of Application or Innovation in Engineering & Management | 3 | 1 | 2319 - 4847 | Comparative Study and Performance Analysis of Encryption in RSA, ECC and Goldwasser-Micali Cryptosystems | |
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING | Open Access | 3 | 6 | 2278 – 1021 | Design and Mathematical Model of Hybrid Cryptographic Algorithm- A3D Algorithm |
ACEEE International Journal of Network Security | Open Access | 6 | 3 | 2152-5072 | Attack Modeling and Behavioral Analysis of Hybrid Covert Channel in Secured Communication |
International Journal of Network Security and its application | Open Access | 7 | 3 | 0974 - 9330 | Entropy based detection and behavioral analysis of Hybrid covert channel in secured communication |
International Journal of Research in Computer and Communication Technology (IJRCCT) | Open Access | 4 | 6 | 2278-5841 | Construction of Covert Channel using Data hiding mechanism in IPv4 |
International Journal of Advances in Computer Networks and Security (IJCNS) | Open Access | 5 | 2 | 2250 – 3757 | Exploration of covert schemes and their embodiments in Hybrid Covert channel |
International Journal of Innovative Research in Computer and Communication Engineering | Peer Reviewed | 4 | 5 | 2320-9801 | Test Driven Development Using Innovative Testing Framework for Advanced Applications |
International Journal of Innovative Research in Computer and Communication Engineering | Peer Reviewed | 4 | 5 | 2320-9801 | Performance Analysis of Hybrid Cryptographic Algorithm- A3D Algorithm |
International Journal of Innovative Research in Computer and Communication Engineering | Peer Reviewed | 5 | 11 | 2320-9801 | Comparative Study and Analysis of Manual v/s Automated Product Feature Testing |
International Journal for Scientific Research & Development (IJSRD) | Monthly open access journal | 7 | 4 | 2321-0613 | Secured E-voting System using Etherum Block Chain Technology |
International Journal for Scientific Research & Development (IJSRD) | Monthly open access journal | 7 | 6 | 2321-0613 | Digital Stocks using Blockchain Technology the Possible Future of Stocks? |
International Journal of Engineering Applied Sciences and Technology | International | 4 | 8 | 2455-2143 | A DEEP DIVE INTO LOAD BALANCING TOOLS FOR HADOOP APPLICATION MANAGEMENT |
International Journal of Engineering Applied Sciences and Technology | International | 4 | 8 | 2455-2143 | STRUCTURAL ANALYSIS OF HPC’S FOR BIG DATA ANALYTICS |
International Journal of Engineering Applied Sciences and Technology, | International | 4 | 8 | 2455-2143 | EMERGING REAL TIME STREAMING ANALYTICS PROCESSING USING HADOOP FRAMEWORK |
International Journal of Engineering Applied Sciences and Technology | International | 4 | 8 | 2455-2143 | ENHANCING PERFORMANCE AND EFFICIENCY FOR BIG DATA ANALYTICS APPLICATION IN HADOOP MAPREDUCE ENVIRONMENT |
International Journal of Engineering Applied Sciences and Technology | International | 4 | 9 | 2455-2143 | CONVERGENT ANALYTICAL TOOLS FOR BIG DATA APPLICATIONS IN HADOOP ENVIRONMENT |
International Journal of Engineering Applied Sciences and Technology | Indexed | 4 | 12 | 2455 2143 | A Structure for Hadoop Compatible Private Data Evaluation and Use of a Broad Array of Cloud Image Processors from Hadoop Environment |
International Journal of Computer Science and Information Security | Indexed | 18 | 7 | 19475500 | Detection of phishing websites using machine learning techniques |
International Journal of Computer Science and Network | Indexed | 9 | 4 | 2277-5420 | Anti-Forensics of Data in Classical and Quantum Systems Over the Classical Communication Channels |
International Journal of Computer Science and Network | Indexed | 9 | 4 | 2277-5420 | Gathering Evidence from Android OS for Mobile Forensics |
International Journal of Computer Science and Network | Indexed | 9 | 4 | 2277-5420 | FPGA Based Lightweight Encryption Algorithm for Cyber Security Applications |
International Journal of Computer Science and Information Security | Indexed | 18 | 8 | 1947-5500 | Low-Cost and Highly Efficient Automated Agribot using IoT |
Journal of Xi'an University of Architecture & Technology | Indexed | 11 | 1 | 1006-7930 | On atypical approaches for privacy preserving using multi-dimensional geometric object based intelligent cryptography for modern applications |
I.J. Wireless and Microwave Technologies | Indexed | 9 | 15 | 2076-1449 | Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation |
I.J. Wireless and Microwave Technologies | Indexed | 11 | 4 | 2076-9539 | CNN Based CNN-based Security Authentication for Wireless Multimedia Devices |
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH | Indexed | 9 | 2 | 2321-9939 | An Ameliorated Methodology for MANET Security using Artificial Intelligence and Dynamic Cache Segmentation |
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH | Indexed | 9 | 2 | 2321-9939 | Performance Analysis of Security Algorithm of Routing Protocols for MANETS |
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH | Indexed | 9 | 2 | 2321-9939 | Performance Analysis of Security Algorithm of Routing Protocols for MANETS |
Conference Name | Venue | Date | Paper Title |
---|---|---|---|
Anjan K, Gururaja H S, Seetha M | DSCE | 2010-03-22 | ICSE |
Anjan K, Jibi Abraham | Chennai, India | 2010-06-21 | 3rd CNSA |
Anjan K Koundinya, Gururaja H S,Seetha M | NITK Suratkal | 2011-12-21 | ADCONS 2011 |
Anjan K Koundinya, Harish G, Srinath NK | Coimbatore | 2012-10-23 | CCSEIT 2012 |
Anjan K, Prajesh P, Srinath N K | Thailand | 2013-06-24 | MapReduce Design of K-Means Clustering Algorithm |
Anjan K, Nagaraja G S, Vinay V Hegde | RVCE | 2014-12-07 | 7th International Congress of Environmental Research |
Anjan K, Srinath N K | Bangkok, Thailand | 2015-08-28 | Second Intl. Conf. On Advances In Computing, Control And Networking |
Anjan K, Sharvani G S, Uma Rao | RVCE | 2016-10-06 | Intl. Conf. On Computational Systems and Information Technology for sustainable solution - CSITSS 2016 |
Anjan K, Sachin Bhardwaj | RVCE, India | 2016-10-06 | Discrete Dimensional Analysis Of N-Dimensional Data Using Deep Neural Network Techniques By Hidden Manifold Learning For Generalized Functions |
Anjan K, Navya M, Nihitha S A | rvce | 2016-10-06 | Intl. Conf. On Computational Systems and Information Technology for sustainable solution |
Anjan K, Prem Prakash Kashyup | RVCE | 2016-10-06 | Intl. Conf. On Computational Systems and Information Technology for sustainable solution - CSITSS 2016 |
Anjan K | RVCE | 2017-12-21 | Secure Handshake Mechanism for Autonomous Flying agents using Robust Cryptosystem |
Anjan K | RVCE | 2017-12-21 | Intl. Conf. On Computational Systems and Information Technology for sustainable solution |
Anjan K | rvce | 2017-12-21 | Intrusion tolerant architecture for SDN networks through flow monitoring |
Anjan K | RVCE | 2017-12-21 | CSITSS 2017 |
Anjan K | RVCE | 2017-12-21 | IoT (Internet of Things) Based Efficiency Monitoring System for Bio-Gas Plants |
Anjan K | USA | 2018-10-15 | International Conference on Computer Science and Applications 2018 (ICCSA 2018) |
Anjan K | USA | 2018-10-15 | International Conference on Computer Science and Applications 2018 |
Anjan K | Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, Odisha | 2018-12-24 | 3rd International Conference on Smart Computing and Informatics |
Anjan Krishnamurthy | Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, Odisha | 2018-10-15 | Spatial Data Infrastructures for Urban Governance using High Performance Computing for Smart City Applications |
Anjan K, Shubha CA, Shubha Bhat | Singapore | 2019-05-19 | 458th International Conference on Science, Technology, Engineering and Management |
Anjan K | Jaipur, India | 2020-12-11 | Fifth International Conference on Information and Communication Technology for Competitive Strategies |
Anjan K | Hyderbad | 2021-05-28 | Characteristic Overview of Digital Image Forensics tools |