Threat Analysis using N-median Outlier Detection Method with Deviation Score PM Jyosthna, KT Reddy International Journal of Advanced Computer Science and Applications 12 (8 …, 2021 | 3 | 2021 |
User Prediction in a Role for Secure Data Sharing Through Cloud PM Jyosthna, KT Reddy International Journal of Innovative Technology and Exploring Engineering 10 …, 2019 | 2 | 2019 |
Energy management in cloud computing GN Iyer, PM Jyosthna, S Jonnalagadda Handbook of Research on Emerging Technologies for Electrical Power Planning …, 2016 | 2 | 2016 |
Intent based access for policy control MJ Pattabhi, TR Konala 2022 International Conference on Breakthrough in Heuristics And …, 2022 | 1 | 2022 |
Enhancing Security and Flexibility with Combined RBAC and ABAC Access Control Models PM Jyosthna, AV Mandapati, MS Teja, SK Ray, BYS Kumar 2024 10th International Conference on Communication and Signal Processing …, 2024 | | 2024 |
Prior Authentication Approach to Enhance Security in CloudComputing J Suman, PM Jyosthna | | 2013 |
Establishing Intent Groups for the Intent-Based Access Control Framework PM Jyosthna, KT Reddy | | |