
Akkalakshmi Muddana
Professor,Vice Prinicpal,1st year coordinator, Computer Science and Engineering, GST , HYD
Education
Ph. D.Email ID
Education
Ph. D.Education
Degree Name | Institute & College name | Year of Graduation/Award |
---|---|---|
PHD CSE | UNIVERSITY COLLEGE OF ENGG OSMANIA UNIVERSITY | 2008 |
M TECH CSE | 1995 | |
M sc Ed MATHS | 1987 |
Experience
Designation | Organization | From Date | To Date |
---|---|---|---|
Professor | Adams Engineering College | 05-08-2005 | 12-06-2012 |
Lecturer | Singareni Collieries Womens college | 29-11-1996 | 04-08-2005 |
Lecturere | Satavahana PG college | 14-08-1995 | 09-11-1996 |
Initial Centroids for KMeans Using Nearest Neighbors and Feature MeansSpringer, Scopus, -2019, 900, 27-34
PDA Proactive defense approach for blackhole and dos attack free optimal routing in mobile adhoc networks International Journal of Innovative Technology and Exploring Engineering , Scopus, -2019, 8, 1195-1201
Optimizing Reputation based Route Discovery by Relay Transmission Fitness EvaluationInternational Journal of Research, Others, -2019, 8, 1268-1281
BLACK HOLE AND GRAY HOLE ATTACK DEFENCE STRATEGIES INWIRELESS MOBILE ADHOC NETWORKS CONTEMPORARYREVIEWJournal of Applied Science and Computations, Google scholar, -2018, 5, 1676-1688
RCRP Reputation cognizant routing protocol for secure data transmissions in mobile adhoc networks Journal of Advanced Research in Dynamical and Control Systems , Scopus, -2018, 10, 1537-1545
SoftwareDefined NetworkBased Intrusion Detection SystemSpringer, Scopus, -2018, 7, 535-543
A Dynamic MultiHop Clustering Technique Using MinimumSpanning Tree for VANETsInternational Journal Of Scientific Research And Review, Google scholar, -2018, 7, 427-430
An efficient two stage encryption for securing personal health records in cloud computingInternational Journal of Services Operations and Informatics, Scopus, -2018, 9, 277-296
Fine Grained Access Control Policy with Advanced Encryption Standard in the Cloud ComputingInternational journal of engineering and technology, Scopus, -2018, 7, 1-3
Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloudIEEE Xplore, Scopus, -2017, 0, 2030-2033
Intra and Inter Group Key Authentication for Secure Group Communication in MANETInnovations in Computer Science and Engineering, Google scholar, -2017, Special, 233-244
Privacy and Access Control for Security of Credit Card records in the Cloud using Partial shufflingIEEE Xplore, Scopus, -2017, 0, 629-632
DYNAMIC MULTICAST TREE MAINTENANCE PROTOCOL FOR SECURE GROUP COMMUNICATION IN MANET.Journal of Theoretical & Applied Information Technology, Google scholar, -2017, 95, 2383-2392
Comprehensive survey on clusteringbased efficient data dissemination algorithms for VANETIEEE Xplore, Scopus, -2017, 1, 629-632
A dynamic attributebased risk aware access control model (DARAAC) for cloud computingIEEE Xplore, Scopus, -2016, 1, 1-5
Survey of Group Key Management Techniques in MANETInternational Journal of Future Generation Communication and Networking, Scopus, -2016, 9, 345-352
NoSQL for Census Data AnalysisInternational Journal of Computer Science and Information Security , Google scholar, -2016, 14, 11-15
HASBE access control model with Secure Key Distribution and Efficient Domain Hierarchy for cloud computingInternational Journal of Electrical and Computer Engineering, Scopus, -2016, 6, 770-777
RISK AWARE HIERARCHICAL ATTRIBUTE SETBASED ENCRYPTION (RAHASBE) ACCESS CONTROL MODEL.Annals. Computer Science Series, Google scholar, -2016, 14, 63-68
Cloud Security in Crypt Database Server Using Fine Grained Access ControlInternational Journal of Electrical & Computer Engineering , Scopus, -2016, 6, 915-924
Energy efficient polynomial based group key management protocol for secure group communications in MANETInternational Journal of Applied Engineering Research, Scopus, -2016, 11, 6701-6705
CEASE CONFIDENTIALITY AND ACCESS CONTROL FOR SECURING PERSONAL HEALTH RECORDS IN THE CLOUD.Annals. Computer Science Series, Google scholar, -2016, 14, 37-45
A survey on access control models in cloud computingSpringer, Scopus, -2015, 1, 653-664
Access control model with enhanced flexibility and scalability for cloudIEEE Xplore, Scopus, -2015, 1, 355-359
A Study on Software Defined NetworkingInternational Journal of Innovative Research in Computer and Communication Engineering, Google scholar, -2015, 3, 5
Strong Authentication for Online TransactionsInternational Journal of Advanced Research in Computer Science, EBSCO Host, -2014, 5, 233-236
A Survey on Enhancement of Quality of Service in Wireless Data NetworksInternational Journal of Advanced Research in Computer Science, EBSCO Host, -2014, 5, 205-208
Role of Information and communication technology in Education Oriental Journal of Computer Science and Technology , Google scholar, -2013, 6, 303-306
Survey on Challenges and Threats in Cloud ComputingInternational Journal of Computer Science And Technology, Google scholar, -2012, 3, 788-791
Seminar name | Organized by | Venue | Start date | End date | Title of the paper presented | Role | Co presenter |
---|---|---|---|---|---|---|---|
National | GITAM Hyderabad | GITAM Hyderabad | 18-Mar-2016 | 19-Mar-2016 | Organized | ||
National | GITAM University, Hyderabad | GITAM University, Hyderabad | 28-Mar-2014 | 29-Mar-2014 | Organized | ||
National | S.V.Institute of Computer Studies & Computer Society of India, Ahmedabad | S.V.Institute of Computer studies, Ahmedabad | 06-Oct-2007 | 07-Oct-2007 | Reliable Group Key Distribution Protocol with Source Authentication | Participated | |
National | Engineerin Collegen Azmer, Govt of Rajasthan | Azmer, Rajasthan | 13-Apr-2007 | 13-Apr-2007 | Security Attacks in Group Key Distribution Protocols | Participated | |
National | Osmania University and Computer Socielty of India, Hyderabad | Osmania University, Hyderabad | 25-Feb-2005 | 26-Feb-2005 | A Survey on Reliable Multicast Protocols | Participated |
Seminar name | Organized by | Venue | Start date | End date | Title of the paper presented | Role | Co presenter |
---|---|---|---|---|---|---|---|
International | SCAD College of Engineering and Technology | Tirunalveli, Tamilnadu | 23-Apr-2019 | 25-Apr-2019 | Intrusion Detection Syatem using Deep Learning for Software Defined networks | Participated | Yogita Hande |
International | GITAM University, Hyderabad | GITAM University, Hyderabad | 18-Mar-2016 | 19-Mar-2016 | Organized | ||
International | Dr Babasaheb Ambedkar Marathwada University | Aurangabad, Maharastra | 28-Nov-2007 | 30-Nov-2007 | Reliable and Secure group Key Distribution Protocol | Participated |
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|---|---|---|---|---|---|
Machine Learning | C V S R SYAVASYA | GITAM University | Machine Learning | 2018 | Part time | PhD |
Machine Learning | T ARUNA | GITAM University | Machine Learning | 2017 | Part time | PhD |
Machine Learning | BORADE JAY LAXMAN | GITAM University | Machine Learning | 2017 | Part time | PhD |
Software Defined Networks | Mr.Darade Santosh Ashokrao | GITAM University | Software Defined Networks | 2015 | Part time | PhD |
Software Defined Networks | Hande Yogita Shivaji | GITAM University | Software Defined Networks | 2014 | Part time | PhD |
Security in cloud computing | Ms.Paritala Jhansi Rani | GITAM University | Security | 2013 | Part time | PhD |
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|---|---|---|---|---|---|
Probing and Design of Hybrid Defense Mechanisms for Cooperative Resource Deteriorating Attacks in Mobile Ad Hoc Network Routing Strategies | K Srinivasa Kumar | Rayalaseema University | Network Security | 2019 | Part time | PhD |
Trusted Security and Authentication Model for Cloud Computing Environment | Ch Krishna Keerthi | Cloud Security | 2013 | Part time | ||
Energy efficient group key management protocol for authentication and secure grroup communication in MANETs | Garlapati Narayana | Network Security | 2011 | Part time | PhD |
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|---|---|---|---|---|---|
Enhance Trust and Data Security in Cloud Computing using Access Control Model | A Rajanikanth | Cloud Security | 2013 | Part time |
Title | Type | Organized by | Venue | Start date | End date | Role |
---|---|---|---|---|---|---|
One Day National Workshop on Big Data Applications in Drug Repurposing | Quality improvement program | GITAM Hyderabad and IICT Hyderabad | GITAM Hyderabad | 23-Oct-2017 | 23-Oct-2017 | Organized |
IBM CE EnabledProgram in Fundamentals of IT Security and Identity Management | Faculty development program | IBM | GITAM University Hyderabad | 15-Nov-2016 | 18-Nov-2016 | Participated |
IBM CE Enabled Program in Big Data Programming using Infosphere Big Insights | Faculty development program | IBM | GITAM University Hyderabad | 08-Nov-2016 | 11-Nov-2016 | Participated |
Big Data Analytics | Training of tutors | Holi Mary Institute of Technology and Science | Holi Mary Institute of Technology and Science | 21-Sep-2016 | 21-Sep-2016 | Organized |
Data Warehouse & Business Intelligence | Faculty development program | NIT Warangal | CBIT, Hyderabad | 22-May-2016 | 02-Jun-2016 | Participated |
Big Data Analytics | Quality improvement program | CR Rao AIMSCS University of hyderabad | University of Hyderabad | 22-Aug-2014 | 24-Aug-2014 | Participated |
One Week ISTE workshop on Computer Networking under the National Mission on Education through ICT | Faculty development program | IIT Bombay | GITAM Hyderabad | 30-Jun-2014 | 05-Jul-2014 | Organized |
Computer Programming | Faculty development program | IIT Bombay | GITAM Hyderabad | 20-May-2014 | 21-Jun-2014 | Participated |
Database Management Systems | Faculty development program | IIT Bombay | GITAM Hyderabad | 21-May-2013 | 31-May-2013 | Participated |
Two Day National Workshop on Privacy and Security in Cloud Computing | Quality improvement program | Dept of IT, GITAM Hyderabad | GITAM Hyderabad | 22-Mar-2013 | 23-Mar-2013 | Organized |
Title | Type | Organized by | Venue | Start date | End date | Role |
---|---|---|---|---|---|---|
Structuring Machine Learning Projects | Quality improvement program | Coursera | Online | 30-Jul-2018 | 29-Jul-2018 | Participated |
Convolutional Neural Networks | Quality improvement program | Coursera | Online | 23-Jul-2018 | 10-Aug-2018 | Participated |
Improving Deep Neural Networks Hyperparameter tuning, Regularization and Optimization | Quality improvement program | Coursera | Online | 16-Jul-2018 | 25-Jul-2018 | Participated |
Neural Networks and Deep Learning | Quality improvement program | Coursera | Online | 21-May-2018 | 14-Jul-2018 | Participated |
Organization name | Membership category | Membership type |
---|---|---|
Indian Society for Technical Education | Life | Member |
Computer Society of India | Life | Member |
