Smart Comput., (HPSC), IEEE Int. Conf. Intell. Data
Secur. (IDS), May 2020, pp. 145–150.
D. C. Le, N. Zincir-Heywood, and M. I. Heywood,
‘‘Analyzing data granularity levels for insider threat
detection using machine learning,’’ IEEE Trans. Netw.
Service Manag., vol. 17, no. 1, pp. 30–44, Mar. 2020.
Devi, M. Sharmila, et al. "Machine Learning Based
Classification and Clustering Analysis of Efficiency of
Exercise Against Covid-19 Infection." Journal of
Algebraic Statistics 13.3 (2022): 112-117.
Devi, M. Sharmila, et al. "Extracting and Analyzing
Features in Natural Language Processing for Deep
Learning with English Language." Journal of Research
Publication and Reviews 4.4 (2023): 497-502.
F. Janjua, A. Masood, H. Abbas, and I. Rashid, ‘‘Handling
insider threat through supervised machine learning
techniques,’’ Proc. Comput. Sci., vol. 177, pp. 64–71,
Jan. 2020.
G. Apruzzese, M. Colajanni, L. Ferretti, A. Guido, and M.
Marchetti, ‘‘On the effectiveness of machine and deep
learning for cyber security,’’ in Proc. 10th Int. Conf.
Cyber Conflict (CyCon), May 2018, pp. 371–390.
H. Touqeer, S. Zaman, R. Amin, M. Hussain, F. Al-
Turjman, and M. Bilal, ‘‘Smart home security:
Challenges, issues and solutions at different IoT
layers,’’ J. Supercomput., vol. 77, no. 12, pp. 14053–
14089, Dec. 2021.
Mahammad, Farooq Sunar, Karthik Balasubramanian, and
T. Sudhakar Babu. "A comprehensive research on
video imaging techniques." All Open Access, Bronze
(2019).
Mahammad, Farooq Sunar, and Y Madhu Viswanatham.
"Performance analysis of data compression algorithms
for heterogeneous architecture through parallel
approach." The Journal ofsupercomputing 76.4 (2020):
2275-2288.
Mahammad, Farooq Sunar, et al. "Key distribution scheme
for preventing key reinstallation attack in wireless
networks." AIP Conference Proceedings. Vol. 3028.
No. 1. AIP Publishing, 2024.
Mandalapu, Sharmila Devi, et al. "Rainfall prediction using
machine learning." AIP Conference Proceedings. Vol.
3028. No. 1. AIP Publishing, 2024.
Mr.M.Amareswara Kumar, “Baby care warning system
based on IoT and GSM to prevent leaving a child in a
parked car”in International Conference on Emerging
Trends in Electronics and Communication Engineering
- 2023, API Proceedings July-2024
Mr.M.Amareswara Kumar, effective feature engineering
technique for heart disease prediction with machine
learning” in International Journal of Engineering &
Science Research, Volume 14, Issue 2, April-2024 with
ISSN 2277-2685.
P. Oberoi, ‘‘Survey of various security attacks in clouds-
based environments,’’ Int. J. Adv. Res. Comput. Sci.,
vol. 8, no. 9, pp. 405–410, Sep. 2017.
Paradesi Subba Rao,” Detecting malicious Twitter bots
using machine learning” AIP Conf. Proc. 3028, 020073
(2024), https://doi.org/10.1063/5.0212693
Paradesi SubbaRao, "Morphed Image Detection using
Structural Similarity Index Measure”M6 Volume 48
Issue 4 (December 2024)
,https://powertechjournaI.com
Parumanchala Bhaskar, et al. "Machine Learning Based
Predictive Model for Closed Loop Air Filtering
System." Journal of Algebraic Statistics 13.3 (2022):
416-423.
Parumanchala Bhaskar, et al. "Incorporating Deep Learning
Techniques to Estimate the Damage of Cars During the
Accidents" AIP Conference Proceedings. Vol. 3028.
No. 1. AIP Publishing, 2024.
Parumanchala Bhaskar, et al “Cloud Computing Network
in Remote Sensing-Based Climate Detection Using
Machine Learning Algorithms” remote sensing in earth
systems sciences(springer).
R. Kumar, K. Sethi, N. Prajapati, R. R. Rout, and P. Bera,
‘‘Machine learning based malware detection in cloud
environment using clustering approach,’’ in Proc. 11th
Int. Conf. Comput., Commun. Netw. Technol.
(ICCCNT), Jul. 2020, pp. 1–7.
S. Zou, H. Sun, G. Xu, and R. Quan, ‘‘Ensemble strategy
for insider threat detection from user activity logs,’’
Comput., Mater. Continua, vol. 65, no. 2, pp. 1321–
1334, 2020.
Suman, Jami Venkata, et al. "Leveraging natural language
processing in conversational AI agents to improve
healthcare security." Conversational Artificial
Intelligence (2024): 699-711.
Sunar, Mahammad Farooq, and V. Madhu Viswanatham.
"A fast approach to encrypt and decrypt of video
streams for secure channel transmission." World
Review of Science, Technology and Sustainable
Development 14.1 (2018): 11-28.
U. A. Butt, R. Amin, H. Aldabbas, S. Mohan, B. Alouffi,
and A. Ahmadian, ‘‘Cloud-based email phishing attack
using machine and deep learning algorithm,’’ Complex
Intell. Syst., pp. 1–28, Jun. 2022.
U. A. Butt, R. Amin, M. Mehmood, H. Aldabbas, M. T.
Alharbi, and N. Albaqami, ‘‘Cloud security threats and
solutions: A survey,’’ Wireless Pers. Commun., vol.
128, no. 1, pp. 387–413, Jan. 2023.