Issue Archives

S.No. Title – Author Volume
 1. Integrated Health Information Exchange Using Application Programming Interface Sunkesula Mohd Yousuf , M. Usman Gani Khan  Vol. 10 Issue.1
 2. A Privacy Policy Grid System for Location Based Range Search R. Maheswara Reddy, C. Indumathi  Vol. 10 Issue.1
 3. Predicting User Behavior And Service Score For Service Recommendation In Location Based Social Networks N. Neelakanta Reddy, P. Krishnaiah  Vol. 10 Issue.1
 4. Analysis on Security Evaluation of Pattern Classifiers R. Kalyan Charan Tez P. Krishnaiah  Vol. 10 Issue.1
 5. Trust Management in Cloud Services using Reputation Based Methods Mannuru Swathi ,G. Balagangadhar  Vol. 10 Issue.1
 6. Secured Two Clouds Technique For Numeric-Related Queries Through Privacy Preserving N. Sasikala, I.Kavitha Jackleen  Vol. 10 Issue.1
 7. Product Recommendation Using Convolution Neural Network In Social Media Shaik Badulla, P.Krishnaiah  Vol. 10 Issue.1
 8. Enhanced Keyword Search With Rank Over Encrypted Data In Clouds C Naga Lakshmi , S. Hema Sri  Vol. 10 Issue.1
 9. Secured Two Clouds Technique For Numeric-Related Queries Through Privacy Preserving P. Santhosh Kumar  Vol. 10 Issue.1
 10. Secured Two Clouds Technique For Numeric-Related Queries Through Privacy Preserving Ravanana indrajith , T.Bhavya  Vol. 10 Issue.1
 11. On Improving and Predicting Student Performance Using Procedural Training Environment M. Sravani, P. Krishnaiah  Vol. 10 Issue.1
 12.
SPECULATIVE PARALLEL PROCESSING IN BIG DATA USING SCA M. Praneetha
 Vol. 10 Issue.1
 13. Detection of Service Attacks in Optimized Link State Routing protocol on MANET P. Santhosh Kumar, M. Shalima Sulthana,A.Mahendra  Vol. 10 Issue.1
 14. Enhanced Attribute Based Security In Multi Cloud With Deduplication Techniques Edamadaka Chandu,A. Siva Krishna Reddy  Vol. 10 Issue.1
 15. A Novel Approach On Cloud Revocation Authority By Identity-Based Encryption Jampana Navaneetha Trivikrama Reddy, K.Balakrishna  Vol. 10 Issue.1
 16. Malware Detection in App Stores using Content Integrity Verification P. Chandrika, P. Krishnaiah  Vol. 10 Issue.1
 17. Secure Data Sharing In Cloud Computing Using Revocable-Storage Identity-Based Encryption K. Venkata Krishna Reddy, C. Praveen Kumar  Vol. 10 Issue.1
 18. Multiparty Privacy Policy Controls For Resolving Conflicts In Online Social Networks Sirigiri Kiran Kumar, C. Praveen Kumar  Vol. 10 Issue.1
 19. Enhanced Auto Learning Encoder for Cyber Bullying Detection S. Shaiba Hajira Begum T. Lakshmi Prasanna  Vol. 10 Issue.1
 20. Energy Saving Architecture through Multipath Routing Using Optimal Policies N. Sambaiah, I.Kavitha Jackleen  Vol. 10 Issue.1
 21. Dynamic Linked Two Structure Interface Protocol For Public Auditing In Cloud Data M.Md. Sohail, I.Kavitha Jackleen  Vol. 10 Issue.1
 22. SECURED FRIEND TO FRIEND RELATIONSHIP IN OVERLYING COMMUNITIES BASED ON ONLINE BEHAVIOUR Muramutla Babu , Dr. S.C Venkata Ramana Rao  Vol. 10 Issue.1
 23. Elimination of Fraud by Optimization to Integrate Evidences in Mobile Play Store Applications A. Rama Gopi , G. Hara Rani  Vol. 10 Issue.1
 24. A Novel Security Structure in Mobile Ad Hoc Networks using SAODV AND SOLSR P. Imran Khan, I.Kavitha Jackleen  Vol. 10 Issue.1
 25. Secured Two Clouds Technique For Numeric-Related Queries Through Privacy Preserving Maddirevula Monika , M. Atheequllah Khan  Vol. 10 Issue.1
 26. Security and Privacy Improvement For Public-Multi-Cloud Environment Pavani Kumari Yeddula , M. Atheequllah Khan  Vol. 10 Issue.1
 27. Comparative Analysis Of Internet Of Things Lightweight Authentication Protocol Design Schemes S. Shaheen Begum, K. Shalivahan Reddy  Vol. 10 Issue.1
S.No. Title – Author Volume
 1. Efficient Analytical Design in Real-Time Big Data for Remotely Sensing Application Using Hadoop Framework A. Sneha, M. Atheequllah Khan  Vol. 9 Issue.1
 2. AN OPTIMAL ALLOCATION OF VIRTUAL RESOURCES USING GENETIC ALGORITHM M.Usman Gani Khan, V. Sandeep Kumar Reddy  Vol. 9 Issue.1
 3. CLUSTER BASED ADAPTIVE PREDICTION SCHEME FOR ENERGY EFFICIENCY IN WIRELESS SENSOR NETWORK V.Siva Prasad, Mayana Nizamulla Khan  Vol. 9 Issue.1
 4. Fraud Ranking Detection in Mobile Apps Syed Akbar Ali, P.Subhan Basha  Vol. 9 Issue.1
 5. Efficient Schemes for Resource Allocation In the Cloud for Media Streaming Applications V. Sana Ismail, S. Shabana  Vol. 9 Issue.1
 6. Optimized And Integrated Workload Balancing Technique For Network V. Vijay, P. Sreelatha  Vol. 9 Issue.1
 7. Load Balancing Technique Using Clustering Method for Network Data Transmission P.R. Jahnavi, Shaik Jaffar Hussain  Vol. 9 Issue.1
 8. An Enhanced Approach For Securing Authorized Deduplication In Hybrid Clouds G. Siva Prasad Naidu, Dr. D. Lavanya  Vol. 9 Issue.1
 9. Multiparty Privacy Policy Controls For Resolving Conflicts In Online Social Networks B. Reddaiah, G. Varaprasad  Vol. 9 Issue.1
 10. A Novel Framework for Secure and Reliable Data Routing in WSN M. Shalima Sulthana, N.Shehanaz  Vol. 9 Issue.1
 11. Text Mining Analysis And Predicting Techniques Of Accidents N.M.Deepika, K. Rashmi,V Divyavani  Vol. 9 Issue.1
 12. Product Recommendation Using Convolution Neural Network In Social Media K. Rashmi, V.Divyavani N.M. Deepika  Vol. 9 Issue.1
 13. Interactive Big Data Analytics For Real Time Applications K. PrasannaLakshmi, K. Shalivahan Reddy  Vol. 9 Issue.1
 14. Shoulder Surfing Resistance Using Graphical Password Authentication For Online Websites Yelika Suresh, K.Venkata Rathnam  Vol. 9 Issue.1
 15. Dynamic Mapreduce Technique For Controlling Job Workloads Through Slot Configuration M. Sirisha , B.Narayana Reddy  Vol. 9 Issue.1
 16. MULTIPARTY PRIVACY POLICY CONTROLS FOR RESOLVING CONFLICTS IN ONLINE SOCIAL NETWORKS K. Lakshmi Lavanya , P. Prasanna Kumari  Vol. 9 Issue.1
 17. Multipath Routing For Intrusion Tolerance In Mobile Wireless Sensor Networks S. Divyalakshmi P. Prasanna Kumari  Vol. 9 Issue.1
 18. Cryptographic Reversible Data Hiding in Encrypted Image Sripathi Satish, K.Venkata Rathnam  Vol. 9 Issue.1
 19. Multi Keywords Ranked Search with Efficiency Improvement Over Encrypted Data In Clouds Thotapalli Siva Krshna , S.Rangaswamy ,Dr.M.Sidhar  Vol. 9 Issue.1
 20. Privacy Preservation against Global Eavesdropper in Sensor Networks Using Network Coding Kambothu Pranidra Babu M.Malyadri  Vol. 9 Issue.1
 21. A Privacy Policy with Grid System for Location Based Range Search S. Vinod Kumar Reddy, S. Ramanjaneyulu  Vol. 9 Issue.1
 22. Support Reputation-Based Trust Management for Cloud Services L. siva Ranjani, I. Kavitha Jackleen  Vol. 9 Issue.1
 23. Secured Friend To Friend Relationship In Overlying Communities Based On Online Behaviour Y. Nirupa ,M. Purushottam  Vol. 9 Issue.1
 24. Dynamic Mapreduce For Job Workloads Through Slot Configuration Technique G. THULASI RAM , Dr. D. LAVANYA  Vol. 9 Issue.1
 25. Integrated Health Information Exchange Using Application Programming Interface R. Deepa K. Narayana  Vol. 9 Issue.1
 26. A Novel Scheme for Detecting IP Spoofers Using Passive IP Traceback Detection of IP Spoofers through IP Traceback Technqiue Marella Sampath Kumar,P. Krishnaiah  Vol. 9 Issue.1
 27. Energy Efficient Clone Detection In Wsn By Energy Efficient Ring Based Clone Detection Protocol Y. Vasundhara, S. Lokesh  Vol. 8 Issue.2
 28. Enhanced Deep Learning Method For Detection Of Cyber Bullying Messaging G. SWARNA LATHA, C. INDUMATHI  Vol. 9 Issue.1
 29. Multiparty Privacy Policy Controls For Resolving Conflicts In Online Social Networks Madan Kumar Nachukuru, N. Anand Reddy  Vol. 9 Issue.1
 30. Big data cluster processing through optimized Speculative execution P. Mohan, D. Suresh Reddy  Vol. 9 Issue.1
 31. Enhanced Keyword Search For Encrypted Data Files Guarantees In Public Infrastructure Clouds K. Deepthi Sree ,Dr. D. Lavanya  Vol. 9 Issue.1
 32. Predicting User Behavior And Service Score For Service Recommendation In Location Based Social Networks N. Vishnu Vardhan Reddy M. Atheequallah Khan  Vol. 9 Issue.1
 33. Integrated Health Information Exchange Using Application Programming Interface Gajulapalli Maneesha,P. Krishnaiah  Vol. 10 Issue.1
 34. Improved Password Authentication System Against Password Attacks For Web Applications G.Seshadri Sekhar , Vallepu Sudhakar  Vol. 10 Issue.1
 35.  Enhanced Data Integrality Check Through Remote Protocols In Cloud Storage K. Sukesh Sarma, N. Venkata Siva Reddy  Vol. 10 Issue.1
S.No. Title – Author Volume
 1. An Enhanced Light-weight Proactive Source Routing Protocol using BFS and DFS for MANET Gonugunta Venkatesh , M.Malyadri  Vol. 8 Issue.2
 2. Detection of IP Spoofers through IP Traceback Technqiue Gunji Pavan Kumar , M.Malyadri  Vol. 8 Issue.2
 3. A Novel Mechanism for Investigation of Selfish Node Detectioin in Mobile Adhoc Networks Mandadi Jhansi , S.Ranga Swamy, Dr.M.Sidhar  Vol. 8 Issue.2
 4. Web Data Linking through Knowledge Based for Accessing Information Based on Entity Linking Marneni Sravani , S.Ranga Swamy, Dr.M.Sidhar  Vol. 8 Issue.2
 5. A New Approach Of Inferring User Interest For User Search Goals With Web Log Sessions A. Renuka Kalyani, K. Srinivasa Rao, Dr. M. Krishna Murthy  Vol. 8 Issue.2
 6. A Mechansim for Detecting and Rectifying Distoring in Fingerprint Images K. Farahana , C. Nancy  Vol. 8 Issue.2
 7. Enhanced Keyword Search with Public-Key Ciphertexts using Searchable Structure Mechanism Shaik Ruksana Begum, S. Mabjan  Vol. 8 Issue.2
 8. Detecting And Preventing Malware In Large Scale Networks B. Praveena, C. Nancy  Vol. 8 Issue.2
 9. Enabling Fine-Grained Multi-Keyword Searchsupporting Over Encrypted Cloud Data B. Poornima , B. Karuna Sagar  Vol. 8 Issue.2
 10. A Framework to Facilitate Selection of Enhanced Multi Cloud Service Providers G. Sameera khanam ,G. Suvarna  Vol. 8 Issue.2
 11. Re-Encryption Scheme Mechanism For Data Security In Cloud G. Sneha, G. Murali  Vol. 8 Issue.2
 12. Multiparty Privacy Policy Controlling on Photo Sharing in Online Social Networks B. Nikitha , B. PeddaNarayana  Vol. 8 Issue.2
 13. A Framework to Facilitate Selection of Enhanced Multi Cloud Service Providers G. Sameera khanam ,G. Suvarna  Vol. 8 Issue.2
 14. Making Facebook More Secure Facebook’s Malicious Application Evaluator G. Prasad, C. Praveen Kumar, R.M. Noorullah  Vol. 8 Issue.2
 15. Attribute Based Encryption In Cloud Computing With Outsourced Revocation Thirupal Reddy, C. Praveen Kumar, R.M. Noorullah  Vol. 8 Issue.2
 16. A Framework to Facilitate Selection of Enhanced Multi Cloud Service Providers G. Sameera khanam ,G. Suvarna  Vol. 8 Issue.2
 17. Effective Data Reduction Technique for Softwares to Reduce Bug Triage S. Aruna, Shaik Jaffar Hussain  Vol. 8 Issue.2
 18. A Novel Technique For Data Sharing And Forwarding Through Cost Effective Identity Concept B.Vinod Kumar,P.Raghavendra  Vol. 8 Issue.2
 19. A Framework to Facilitate Selection of Enhanced Multi Cloud Service Providers G. Sameera khanam ,G. Suvarna  Vol. 8 Issue.2
 20. A Novel Technique Using Slot Configuration On Hadoop Clusters Seela Rajiv Chakravarthy , I.Kavitha Jackleen  Vol. 8 Issue.2
 21. Dynamic Routing To Preserve Data Integrity In Wireless Networks Tellapati Pushpa Latha , Shaik Jaffar Hussain  Vol. 8 Issue.2
 22. A Framework to Facilitate Selection of Enhanced Multi Cloud Service Providers G. Sameera khanam ,G. Suvarna  Vol. 8 Issue.2
 23. Multi Keywords With Ranked Search Over Encrypted Data In Clouds Padigapati Swathi, Shaik Jaffar Hussain  Vol. 8 Issue.2
 24. A Privacy Policy with Grid System for Location Based Services C. Saritha, Shaik Jaffar Hussain  Vol. 8 Issue.2
 25. Resource Allocation Schemes for Cloud Media Streaming R. Hima Bindu, Shaik Jaffar Hussain  Vol. 8 Issue.2
 26. Cost optimization of cloud using efficient green Control algorithm with virtual instances K. Salivahana Reddy ,Koramutla Jaya Krishna  Vol. 8 Issue.2
 27. Elimination of Fraud by Optimization to Integrate Evidences in Mobile Play Store Applications P. Vaishnavi , G. Varaprasad  Vol. 8 Issue.2
 27. Elimination of Fraud by Optimization to Integrate Evidences in Mobile Play Store Applications P. Vaishnavi , G. Varaprasad  Vol. 8 Issue.2
S.No. Title – Author Volume
 1. A Review On Image Enhancement Using Artificial Neural Netwoks And Fuzzy Logic K. Srividya, J. Krishna, Dr. A. Subramanyam  Vol. 8 Issue.1
 2. Data Error Detection And Time Reduction For Big Sensor Data Sets P. Sreenivasulu, M. Rudra Kumar, Dr. A. Subramanyam  Vol. 8 Issue.1
 3. A Novel Scheme for Cloud Dynamic Groups in Providing Secure Anti Collusion for Data Sharing Puchhakayala Sandhya Rani , M.Malyadri  Vol. 8 Issue.1
 4. Malware Prevention Using Two Layers Protection Venkata Rathnam Korukonda , S.Ranga Swamy , Dr.M.Sidhar  Vol. 8 Issue.1
 5. An Enhanced Distributed Approach for Data Uploading Using Load Balancing Technique Ponugubaty Sandhya Priya Darsini , M.Malyadri  Vol. 8 Issue.1
 6. Attribute Based Encryption Technique for privilege and Anonymity Access Controlling in Cloud Avudari Siva Krishna,, S.Ranga Swamy ,Dr.M.Sidhar  Vol. 8 Issue.1
 7. Two Layer Epidemic Model for Malware Propagation from Network to Network S. Rehana , B. PeddaNarayana  Vol. 8 Issue.1
 8. Dynamic Routing To Preserve Data Integrity In Wireless Sensor Networks S. Rajesh , G. Nagendra Babu  Vol. 8 Issue.1
 9. A Novel Approach for Tweet Summarization through Timeline Generation G.Sree Harika,Dr. M. Sreenivasulu  Vol. 8 Issue.1
 10. Interactive Big Data Analytics For Real Time Applications Yasani Chandra Sekhar, Shaik Jaffar Hussain  Vol. 8 Issue.1
S.No. Title – Author Volume
 1. Providing Security For Social Networks From Inference AttacksK.G.S. Venkatesan,   Dr. V. Khanna, S.B. Amarnath Reddy  Vol. 7 Issue.2
 2. Efficient and Secure Data Preserving in Cloud Using Fog Security S. Prathima, Sha Sha Ali  Vol. 7 Issue.2
 3. Friendbook A Semantic-Based Recommender System for Social Networks Shalini , Y Harika Devi , Y.Subba Rayudu  Vol. 7 Issue.2
 4. Avoiding Performance Fluctuation in Cloud Computing G Michael, J Arunkumar  Vol. 7 Issue.1
 5. Controlling Sybil Attacks in Urban Vehicular Networks N. Manju shruthi, P. Sree Latha  Vol. 7 Issue.1
6. Survey on Accessing Encrypted Databases in Cloud Ashok Jayadar , A R Arunachalam  Vol. 7 Issue.2
 7. Privacy Preserving Access Control Mechanism for Electronic Mail T.M.Arun Prabu , C.Anuradha  Vol. 7 Issue.1
 8. An iTrust Based Misbehaviour Detection Technique on Clustered Nodes in Delay Tolerant Network D.Kerana Hanirex Pritiviraj.V  Vol. 7 Issue.1
 8. An iTrust Based Misbehaviour Detection Technique on Clustered Nodes in Delay Tolerant Network D.Kerana Hanirex Pritiviraj.V  Vol. 7 Issue.1
9. Application Program Interface Changes and Impact for Fault Proneness Controlling on the User Ratings of Android Apps Ch Srikanth1 , Koona Hemanath , Yerragudipadu Subbarayudu  Vol. 7 Issue.1
10. A Framework to Facilitate Selection of Enhanced Multi Cloud Service Providers G. Sameera khanam ,G. Suvarna  Vol. 7 Issue.1
11. Dispute Cognizant Determinition Of Flickery Novelty S J Sowjanya , B Neeraja, Y.Subba Rayudu  Vol. 7 Issue.1
12. Key Exchange Technique for Parallel Network File Systems koona Hemanath , Ch Srikanth , Y.Subba Rayudu  Vol. 7 Issue.
S.No. Title – Author Volume
 1. Eaack-A Secure Intrusion Detection System For Manet’s, P.Sudhir Kumar Reddy, G.Lalitha  Vol. 6 Issue.2
 2. Privacy Preserving Public Auditing For Secure Cloud Storage, V. Lakshmikanth, K. Sreekanth  Vol. 6 Issue.2
 3. Sink Trail: A Proactive Statistics Advertisement Form For wireless Sensor Networks, V. Suguna, D. Bullarao, P. Nageswararao  Vol. 6 Issue.2
 4. Extracting Users Interest From Web Log Files J. Lavanya, P.A. Ashoka Vardhini  Vol. 6 Issue.1
 5. Controlling Sybil Attacks in Urban Vehicular Networks N. Manju shruthi, P. Sree Latha  Vol. 6 Issue.1
 6. Enhanced Personalized Mobile Search Engine Shaik Babjan,M.Bindu Mahitha Vol. 6 Issue.1
 7. Detecting, Determining and Localizing Multiple Spoofing Attackers in Wireless Networks D. Srikala, Siva Reddy Vol. 6 Issue.1
S.No. Title – Author Volume
 1. Adaptive Query Processing for Distributed Database Systems Mounika, Kavitha  Vol. 5-Issue.2
 2. Extracting User Interests From Web Log Data G. PAVANI, C. RAMA MOHAN  Vol. 5-Issue.2
 3. CLOUDMOV: CLOUD-BASED MUTABLE SOCIAL TV Vidhya Priyadharsini. Y, S. Rajiya Sulthana  Vol. 5-Issue.3
 4. An Enhanced Security In Co-operative Multicloud Computing Syed. Kareemunnisa, K. Rajasekhar Reddy  Vol. 5-Issue.3
 5. Hierarchical Super-Resolution Reconstruction Image Using Fast Inpainting Algorithms G. Radhika, C. Chandrakala  Vol. 5-Issue.3
 6. Demonstrating Higher Malicious Behaviour Detection Rates using secured mechanism to protect MANETs from attacks Chilla Venkata Madhusudhan Reddy, G. Vijaya Kanth  Vol. 5-Issue.3
 7. Detection On The Node Clone In WSN Using DHT & RDE Protocols Chand Basha Shaik, D. Anusha  Vol. 5-Issue.3
S.No. Title – Author Volume
 1. Effective Pattern Discovery in Text Mining K. Lavanya, Shaik Shasha Ali  Vol. 5-Issue.1
 2. Fuzzy Logic Control of Fault Ride Through V. Geetha, K. Sabitha  Vol. 5-Issue.1
 3. Algorithm Research On User Interests Extracting Via Web Log Data Yerragudipadu Subbarayudu, Nelaballi Siddaiah  Vol. 5-Issue.1
 4. Classifying Client Preferences of Web Culture System with Genetic Optimization G. Reddy Lakshmi, Sha Sha Ali  Vol. 5-Issue.1
S.No. Title – Author Volume
 1. SPATIAL INVERT INDEXING FOR MULTI DIMENSIONAL DATA IN SPATIAL DATABASES N.Chandra Asha, C.Sudarsana Reddy  Vol. 4-Issue.1
 2. ON EXPLOITING TEMPORAL, SOCIAL, AND GEOGRAPHICAL RELATIONSHIPS FOR DATA FORWARDING IN DELAY TOLERANT NETWORKS P.Hemalatha, C.C Kalyan Srinivas  Vol.4-Issue.1
 3. SANITATIONS TO FORETELL DIMINUTION SWAY ON SOCIAL NETWORK DATA K. NAVEEN, A. NARAYANA RAO  Vol.4-Issue.1
S.No. Title – Author Volume
 1. Efficient and Secure Data Preserving in Cloud Using Fog Security S. Prathima, Sha Sha Ali  Vol. 3-Issue.2
 2. Online Data Back-up and Disaster Recovery Techniques in Cloud Computing P. Ramya Prasannatha, S. Rajiya Sulthana  Vol.3-Issue.2
 3. DEVELOPMENT OF NATURAL LANGUAGE INTERFACE TO RELATIONAL DATABASES C. Nancy ,Sha Sha Ali  Vol.3-Issue.2
S.No. Title – Author Volume
 1. DEVICE INTERACTION OVER A GLOBAL NETWORK ,M. Iyyappan, S.Saranya  Vol. 3-Issue.1
 2. SECURED ONLINE VOTING SYSTEM,P. YOGESHKUMAR, R.VIDHYA  Vol.3-Issue.1
 3. Performance Analysis and Design of DSDV in Manets By V. Amar  Vol.3-Issue.1
 4. Reconstruction Association Rule By S. Lohit, R. Raj  Vol.3 Issue. 1
S.No. Title – Author Volume
1. Data Extraction and Analysis for Tag and Value Based Information from Multiple Web Pages

<tr bgcolor=”lightblue”><td> 25.</td><td><a href=”http://www.ijcsest.com/wp-content/uploads/2013/07/ijcsest197512.pdf”>Secured Two Clouds Technique For Numeric-Related Queries Through Privacy Preserving Maddi Revula Monika , M. Atheequllah Khan</a></td><td> Vol. 10 Issue.1</td></tr>