Volgen
P. M Jyosthna
P. M Jyosthna
B.V.R.I.T, Narsapur
Geverifieerd e-mailadres voor bvrit.ac.in
Titel
Geciteerd door
Geciteerd door
Jaar
Threat Analysis using N-median Outlier Detection Method with Deviation Score
PM Jyosthna, KT Reddy
International Journal of Advanced Computer Science and Applications 12 (8 …, 2021
32021
User Prediction in a Role for Secure Data Sharing Through Cloud
PM Jyosthna, KT Reddy
International Journal of Innovative Technology and Exploring Engineering 10 …, 2019
22019
Energy management in cloud computing
GN Iyer, PM Jyosthna, S Jonnalagadda
Handbook of Research on Emerging Technologies for Electrical Power Planning …, 2016
22016
Intent Based Access for Policy Control
MJ Pattabhi, TR Konala
2022 International Conference on Breakthrough in Heuristics And …, 2022
2022
Prior Authentication Approach to Enhance Security in CloudComputing
J Suman, PM Jyosthna
2013
Establishing Intent Groups for the Intent-Based Access Control Framework
PM Jyosthna, KT Reddy
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–6