Educational & Professional
Academic Qualifications
1.
Ph.D in CSE, JNTUH (2004-2010)
2.
M Tech in CSE, Andhra Univerisity with First Class (2001-2003)
3.
BE in CSE, Madras University with First Class (1996-1999)
4.
Diploma in Computer Science & Engineering in CSE, SBTET with First Class with Distinction (1992-1995)
Professional Experience
|
At JNTUH
1. |
Head of the Department, JNTUHCEH (2017 - Till Date) |
2. |
Professor, JNTUHCEH, Hyderabad (2013 - Till Date) |
3. |
Associate Professor, JNTUHCEH, Hyderabad (2006 - 2013) |
|
|
|
|
Research
Research Projects
Evidence Generation by Analysing and Detecting Session Hijacking Attacks to find the trace of Intruder, funded by TEQIP-III - 4 Lakhs (2020 - 2021)
Patents
|
Sk.Khaja Shareef, Dr.R.Sridevi, Method For Secure Blockchain Transaction using Homomorphic Serpent Cryptography Algorithm , 2022 |
|
Dr.D.Kalyani, Dr.R.Sridevi, A NOVEL SECURITY FRAMEWORK INTEGRATED WITH LMS FOR SOFTWARE SECURITY , 2021 |
|
|
Publications
International Journals |
1 . |
Dr Vasavi Bande, Prof R.Sridevi, A Secured Framework for secured computations in a Public Cloud Environment, CCODE-2023, 2023 |
2 . |
Sheena Mohammed, Sridevi, R, To Secure The Cloud Applications using a Novel Deep Learning Based Forensic Framework“, World Scientific Journals, Journal of Interconnected Networks(Scopus indexed), ISBN No.1793-6713, 2023 |
3 . |
Sheena Mohammed, Sridevi, R., Exploring the State of Cloud Forensics: Techniques, Tools, and the Role of Deep Learning, International Journal of Research and Analytical Review, ISBN No.2348-1269, Vol No.10, Issue No.2, pp.80-85, July, 2023 |
4 . |
Sheena Mohammed, Sridevi, R., The cloud forensics frameworks and tools: A brief review, International Journal of Science and Research Archive, International Journal of Science and Research Archive, ISBN No.2582-8185, Vol No.9, Issue No.1, pp.173-181, January, 2023 |
5 . |
P.Srivani , S. Ramachandram, R. Sreedevi, Multi-key searchable encryption technique for index-based searching(Scopus indexed), International Journal of Advanced Intelligence Paradigms, ISBN No.1755-0386, Vol No.95, Issue No.21, pp.5787-5794, November, 2022 |
6 . |
Sk.Khaja Shareef, Dr. R.Sridevi, Dr. V.Rama Raju, An Intelligent Secure Monitoring Phase in Blockchain Framework for Large Transaction, International Journal of Electrical and Electronics Research (IJEER), ISBN No.2210-142X, Vol No.10, Issue No.3, pp.536-543, FOREX Publication, August, 2022 |
7 . |
Sk.Khaja Shareef , Dr. R.Sridevi, Dr. V.Rama Raju, Enhancement of Blockchain System in Online Transaction by Detecting Attacks Using an Intelligent Approach Recurrent Neural with Serpent Encryption (RNwSE), International Journal of Computing and Digital Systems, ISBN No.2210-142X, pp.867-875, October, 2022 |
8 . |
A Mallareddy, R Sridevi, Ch G V N Prasad, Privacy Preserving Data Aggregation System using Hilbert Curve for Cloud Data Security, International Journal of Advanced Science and Technology, ISBN No.2207-6360 , Vol No.9, Issue No.9, pp.6152-6155, 2020 |
9 . |
Mallareddy A, Sridevi R, Prasad Ch G V N, Secure Data Aggregation Scheme for IOT Applications in Cloud, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISBN No.2278-3075, Vol No.9, Issue No.452, pp.70-76, Blue Eyes Intelligence Engineering & Sciences Publication, March, 2020 |
10 . |
Putta srivani, Ramachandram sirandas, R Sridevi , Conjunctive Multi Key Searchable Encryption Scheme, 9th World Conference on Applied Sciences, Engineering and Management, ISBN No.978-81-930222-8-3, 2020 |
11 . |
Putta srivani, Dasari Madhavi, R.Sridevi , Coherent Light Weight Planning for Secure Cloud Computing (UGC Care), International Journal of Engineering and Advanced Technology (IJEAT), ISBN No. 2249 – 8958, Vol No.9, Issue No.4, pp.2099-2104, April, 2020 |
12 . |
D Kalyani, Dr. R. Sridevi, New Hierarchical Identity based Encryption with maximum hierarchy, International Journal of Network Security, Vol No.21, Issue No.1, pp.40-46, January, 2019 |
13 . |
John babu, Dr. R. Sridevi, A new steganalysis Approach with an Efficient Feature Selection and Classification Algorithms for Identifying the stego Images, Multimedia Tools and Applications, ISBN No.DOI: 10.1007/s11042-019-7168-5, Springer, February, 2019 |
14 . |
A Mallareddy, Dr. R. Sridevi, Ch G V N Prasad, Enhanced P-Gene based Data Hiding for Data Security in Cloud, International Journal of Recent Technology and Engineering (IJRTE), ISBN No.ISSN: 2277-3878, Vol No.8, Issue No.1, pp.2086-2093, Blue Eyes Intelligence Engineering & Sciences Publication, May, 2019 |
15 . |
A Mallareddy, Dr. R. Sridevi, Ch G V N Prasad, A Survey of Data Hiding methods for data security in Cloud, International Journal of Computer Sciences and Engineering, ISBN No.2347-2693, Vol No.7, Issue No.5, pp.690-694, May, 2019 |
16 . |
John Babu G, Sridevi Rangu, StegNet: An Efficient CNN based Steganlyzer, International Journal of Computer Sciences and Engineering, ISBN No.2347-2693, Vol No.7, Issue No.3, pp.1088-1093, March, 2019 |
17 . |
John Babu Guttikonda, Sridevi Rangu, A Meta Classification Model for Steganalysis using Generic NN, International Journal of Recent Technology and Engineering, ISBN No.2277-3878, Vol No.8, Issue No.2, pp.736-743, lue Eyes Intelligence Engineering & Sciences Publication, July, 2019 |
18 . |
P.Srivani, S. Ramachandram , Dr. R. Sridevi, Experimental Results On Multi-Key Searchable Encryption Technique With Different Elliptic Curves And App Designing., Journal of Theoretical & Applied Information Technology, Vol No.95, Issue No.20, October, 2017 |
19 . |
Dr. R. Sridevi, A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis, Journal of Information Security , Vol No.8, Issue No.3, 2017 |
20 . |
Dr. R. Sridevi, Using An Ant Colony Optimization Algorithm For Image Edge Detection As A Threshold Segmentation For OCR System, Journal of Theoretical & Applied Information Technology, 2017 |
21 . |
P. Srivani, S. Ramachandram , Dr. R. Sridevi, Secure Searchable Encryption Schemes, International Journal of Emerging Tech and Advanced Engineering, ISBN No.2250–2459, Vol No.7, Issue No.9, September, 2017 |
22 . |
Y. BHAVANI, V. JANAKI ,R. SRIDEVI, Survey on Packet Marking Algorithms for IP Traceback, ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, ISBN No. 0974-6471, Vol No.10, Issue No.2, pp.507-512, Oriental Scientific Publishing Co., India, June, 2017 |
23 . |
John Babu, Sridevi Rangu, Pradyusha Manogna, A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysi(WOS), Journal of Information Security, ISBN No. 2153-1234, 2017 |
24 . |
Y. Bhavani, V. Janaki ,R. Sridevi, Modified Probabilistic Packet Marking Algorithm for IPv6 Traceback Using Chinese Remainder Theorem, Part of the Lecture Notes in Networks and Systems book series , ISBN No.978-981-10-3818-1, Vol No.8, pp.253, Springer, Singapore, June, 2017 |
25 . |
N Rajitha, R Sridevi, Implementations of Secure Reconfigurable Cryptoprocessor A Survey, AISC Series, ISBN No.978-81-322-2753-3, pp.11-19, Springer, February, 2016 |
26 . |
N Rajitha, R Sridevi, Cryptographic key protection in a Cryptoprocessor, Elsevier Procedia, Vol No.78, pp.271-275, Elsevier, Jan, 2016 |
27 . |
Vasavi Bande, R Sridevi, Cloud Security Using Fully Homomorphic Encryption, IJCNS, Recent Science Publications, May, 2016 |
28 . |
D Kalyani, R Sridevi, Survey on Identity based and Hierarchical Identity based Encryption Schemes, International Journal of Computer Applications Foundation of Computer Science (FCS), NY, USA, ISBN No.973-93-80890-96-7, Vol No.134, Issue No.14, 2016 |
29 . |
Y.Bhavani, V.janaki, Dr. R. Sridevi, IP Traceback through modified Probabilistic Packet Marking algorithm using Chinese Remainder Theorem, Sham's Engineering Journal, Vol No.6, pp.715-722, Elsevier, 2015 |
30 . |
A .Mallareddy, Dr. R Sridevi , K. Nageswara Rao, Password Management Strategies to Deal with Social Engineering Attacks, International Journal of Research in Information Technology (IJRIT), ISBN No.2001-5569, Vol No.2, Issue No.9, pp.419-425, September, 2014 |
31 . |
Vasavi Bande, R Sridevi, Protected and Rapid Payment System Using Cloud Technologies, ICICSE-2013 , 2013 |
32 . |
R Sridevi, Vasavi Bande, Comparative Study Of Various Existing Security Scenarios In Cloud Computing Environment, JGRCS, Vol No.3, Issue No.9, September , 2012 |
33 . |
R Sridevi, Highly Secured and Randomized Image Steganographic Algorithm, Journal of Global Research in Computer Science, ISBN No.2229-371X, Vol No.3, Issue No.9, pp.12-17, September , 2012 |
34 . |
Dr. R. Sridevi, G. John Babu, Multi-Pixel Steganography, International Journal of Computer Science and Information Security,, ISBN No.1947-5500, Vol No.10, Issue No.6, June, 2012 |
35 . |
R Sridevi, Dr.A.Damodaram, Dr.SVL Narasimham, Efficient method of Audio Steganography by modified LSB Algorithm and strong Encryption key with Enhanced Security, Journal of Theoretical and Applied Information Technology , Vol No.5, Issue No.6, pp.768-771, June , 2009 |
36 . |
R Sridevi, Dr. A Damodaram, Dr.SVL Narasimham, More Secured and Randomized Steganographic Algorithm using Robust Stego Key, International Journal of Computer Engineering and Information Technology , ISBN No.0974-2034, Vol No.9, Issue No.9, November , 2009 |
37 . |
R Sridevi, Dr. A Damodaram, Dr.SVL Narasimham, A Novel Architecture for Enhanced Security through Virtualization and Spoofing, Science Direct Journal of Network Security, Vol No.9, Issue No.9, pp.12-16, Elsevier, September , 2009 |
38 . |
A Damodaram, R Sridevi, Application level untraceable vulnerabilities and countermeasures, International Journal on Computer Science and Network Security, Vol No.8, Issue No.9, pp.357-364, September , 2008 |
National Journals |
1 . |
Sk.Khaja Shareef, Dr. R.Sridevi, Dr. V.Rama Raju, Intelligent Security Mechanism for Blockchain Transactions, Industrial Engineering Journal, ISBN No.0970-2555, 2022 |
2 . |
G.Sowmya, Dr.R.Sridevi, Dr.K.S.Sadasiva Rao, Blockchain technology: Concepts, Types, Security issues and Applications, Industrial Engineering Journal(UGC Care), ISBN No.0970-2555, 2022 |
3 . |
Vasavi Bande, Dr.R.Sridevi, A Secured Framework for Cloud Computing in a Public Cloud Environment, Journal of Adv Research in Dynamical & Control Systems, ISBN No.1943023X, Vol No.11, Issue No.2, pp.1755-1762, May, 2019 |
International Conference |
1 . |
Sk.Khaja Shareef , Dr. R.Sridevi, Dr. V.Rama Raju, A Novel Blockchain Framework For Enhancing Online Transactions, International Virtual Conference on Industry 4.0, ISBN No.978-981-19-9989-5, pp.103-114, Springer, Singapore, April, 2023 |
2 . |
Sheena Mohammed, Sridevi, R., Exploring and Assessing Tools and Methods for Forensic Evidence Collection in Cloud Environment, ICIOT 2023, Fourth International Conference, Springer, Singapore, 2023 |
3 . |
Hala S. Ali,R. Sridevi, Credential-Based Authentication Mechanism for IoT Devices in Fog-Cloud Computing, Lecture Notes in Networks and Systems, ISBN No.978-981-16-5655-2, pp.307-318, Springer, Singapore, January, 2022 |
4 . |
Sk.Khaja Shareef, R. Sridevi Computer Science & Engineering, JNTUH College Of Engineering, Hyderabad, India, V. Rama Raju, K. S. Sadasiva Rao, A Novel Framework for Secure Blockchain Transactions, International Conference on Applied Artificial Intelligence and Computing (ICAAIC-2022), ISBN No.978-1-6654-9709-1, pp.1317-1324, IEEE, May, 2022 |
5 . |
Hala S. Ali , R. Sridevi, Credential-Based Authentication Mechanism for IoT Devices in Fog-Cloud Computing, International Conference on ICT for Sustainable Development (ICT4SD), ISBN No.978-981-16-5655-2, Vol No.314, pp.307-318, Springer, Singapore, January, 2022 |
6 . |
Vemula Harish,R. Sridevi, A Brief Survey on Blockchain Technology, Third International Conference on Computational Intelligence and Informatics, Advances in Intelligent Systems and Computing, ISBN No.978-981-15-1480-7, pp.249-258, Springer, Singapore, March, 2020 |
7 . |
Y. BHAVANI , V. JANAKI,R. SRIDEVI, IP Traceback Through Modified Probabilistic Packet Marking Algorithm Using Record Route, Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. , ISBN No.978-981-15-1480-7, Vol No.1090, pp.481-485, Springer, Singapore, March, 2020 |
8 . |
Sheena Mohammed, Sridevi, R., A Survey on Digital Forensics Phases, Tools and Challenges, Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. , ISBN No.978-981-15-1479-1, Vol No.1090, pp.237-248, Springer, Singapore, March, 2020 |
9 . |
John babu, Dr. R. Sridevi, Contemporary Stegnalysis Schemes for Reliable Detection of Steganography, IEEE WiSPNET, ISBN No.IEEE-8300114, IEEE, 22-24 March, 2018 |
10 . |
D Kalyani, Dr. R. Sridevi, Private communication based on hierarchical identity-based cryptography, IEMIS, ISBN No.978- 981-13- 1500-8, Vol No.1, Springer, February, 2018 |
11 . |
P.Srivani, S. Ramachandram , Dr. R. Sridevi, A Survey on client side and server side approaches to secure web Applications, ICECA, pp.22-26, 2017 |
12 . |
Y. Bhavani, V. Janaki,R. Sridevi, Modified Probabilistic Packet Marking Algorithm for IPv6 Traceback Using Chinese Remainder Theorem, Lecture Notes in Networks and Systems, ISBN No.978-981-10-3818-1, pp.253-263, Springer, Singapore, June, 2017 |
13 . |
P Srivani, S. Ramachandram, Dr. R. Sridevi, RNS Application in Cryptography, International Advanced Computing Conference, pp.22-26, 2016 |
14 . |
D Kalyani, R Sridevi, Robust distributed Key issuing Protocol for Identity based cryptography, Accepted at Symposium on Green Networks and Distributed Systems, September , 2016 |
15 . |
Rajitha Natti, Sridevi Rangu, Implementations of Secure Reconfigurable Cryptoprocessor a Survey, Advances in Intelligent Systems and Computing, ISBN No.978-81-322-2755-7, pp.11-19, Springer, New Delhi, February, 2016 |
16 . |
N Rajitha, R Sridevi, Cryptographic Design Approaches for Secure Key Management, 2nd International Conference Networks, Information and Communications, May, 2015 |
17 . |
Y. Bhavani, Dr. V. Janaki, Dr. R. Sridevi, IP Traceback through Modified Probabilistic Packet Marking Algorithm, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), ISBN No.2159-3450, pp.715-722, June, 2015 |
18 . |
Bhavani Y, Janaki V, Dr. R. Sridevi, IP Traceback through probabilistic packet marking algorithm, TENCON 2013, IEEE, October, 2013 |
19 . |
Dr A Damodaram, R Sridevi, Trusted Architecture for Self Healing Intrusion Detection System, Proceedings of the International Conference on Cybernetics, Informatics and Systemics, Pentagram Research Center, Hyderabad, India, , January , 2008 |
20 . |
Dr A.Damodaram, R Sridevi, K.Venkateswara Rao, M.V.Ramaraju, Preventive Approaches For Web Application Security Attacks, ICACT-2008, 2008 |
National Conference |
1 . |
P. Srivani, Ramachandram Sirandas,R. Sridevi, A Survey Report on CryptDB, Computer Science, Communication and Instrumentation Devices, 2014 |
2 . |
D Kalyani, Dr. R. Sridevi, K S Sadasiva Rao, A Review on identity based cryptography with its extensions, National conference on computational intelligence and applications, NCCIA- 2012,, 2012 |
3 . |
Vasavi Bande, R Sridevi, A Comprehensive Framework for Cloud Computing Security In banking Sector, NCCNIS, 2012 |
4 . |
Dr A Damodaram, R Sridevi, Survey on Intrusion Detection Systems, RESPOGRAPH , 2008 |
|
Workshop |
Events Participated/Organized
Organized |
1.
|
Organized a Workshop on FDP on Cyber Security, Centre of Excellence in Cyber Security, JNTUH, 02-12-2022 to 03-12-2022 |
2.
|
Organized a Refresher Course on Conducted Essay writing and short film competitions on Cyber security and Narcotic Drugs as a part of Golden Jubilee Celebrations, COE, Cyber Security, 24-09-2022 |
3.
|
Organized a Training on Online certificate program on “Excellence in Cyber Security”, Centre of Excellence in Cyber Security, JNTUH, 14-03-2022 to 19-08-2022 |
4.
|
Organized a Training on Online Internship Program on “Cyber Security & Forensics", Centre of Excellence in Cyber Security, JNTUH, 28-06-2021 to 18-09-2021 |
5.
|
Organized a Workshop on Workshop on “Cyber Security and Forensics”, Centre of Excellence in Cyber Security, JNTUH, 30-03-2021 to 21-04-2021 |
6.
|
Organized a Training on 4 week Internship program on Cyber Security, COE in Cyber Security, 07-12-2020 to 09-01-2021 |
7.
|
Organized a FDP on Cyber Security, Centre of Excellence in Cyber Security, JNTUH, 24-08-2020 to 09-09-2020 |
8.
|
Organized a Workshop on FDP on Cyber Security, Centre of Excellence in Cyber Security, JNTUH, 24-08-2020 to 09-09-2020 |
9.
|
Organized a Workshop on FDP on Cyber Security & Forensics,, Centre of Excellence in Cyber Security, JNTUH,, 09-07-2020 to 10-07-2020 |
10.
|
Organized a FDP on Cyber Security & Forensics, Centre of Excellence in Cyber Security, JNTUH, 09-07-2020 to 10-07-2020 |
11.
|
Organized a FDP on 2 Day FDP programme on Blockchain Technology, CSE Department, JNTUHCEH., 20-09-2019 to 21-09-2019 |
12.
|
Organized a Tutorial on HACKATHON On Open Theme powered by SOAL, JNTUCEH, 09-04-2019 to 10-04-2019 |
13.
|
Organized a Conference on Computational Intelligence and Informatics, HYDERABAD, 27-12-2018 to 29-12-2018 |
14.
|
Organized a Refresher Course on 36-hour Hackathon on SMART MACHINES on INDUSTRY 4.0, CSE Department, JNTUHCEH., 21-12-2018 to 22-12-2018 |
15.
|
Organized a Refresher Course on pre-hackathon workshop on 'Internet of Things', CSE Department, JNTUHCEH., 20-12-2018 |
16.
|
Organized a Seminar on Seminar on Guidance for Higher Studies, CSE Department, JNTUHCEH, 11-09-2018 |
17.
|
Organized a Seminar on Seminar on “Cognitive Sciences & Data", CSE Department, JNTUHCEH, 28-08-2018 |
18.
|
Organized a Seminar on Open session on Democratizing Data Science, CSE Department, JNTUHCEH, 25-08-2018 |
19.
|
Organized a Seminar on Seminar on Career Guidance in Artificial Intelligence, CSE Department, JNTUHCEH., 17-08-2018 |
20.
|
Organized a Refresher Course on Inhouse Hackathon for “Web designing”, CSE Department, JNTUHCEH, 04-08-2018 |
21.
|
Organized a Training on Boot Session on “Page Maker” under Coding Club, CSE Department, JNTUHCEH., 04-08-2018 |
22.
|
Organized a Seminar on Lecture on Compound Effect, CSE Department, JNTUHCEH., 29-07-2018 |
23.
|
Organized a Workshop on A Two day Research Workshop 2018, CSE Department, JNTUHCEH, 23-06-2018 to 24-06-2018 |
24.
|
Organized a Workshop on Workshop on cyber security and internet of things, CSE Department, JNTUHCEH, 15-06-2018 to 17-06-2018 |
25.
|
Organized a Symposium on A Two Day National Level Technical Symposium "QUEST 2K18", CSE Department, JNTUHCEH., 14-03-2018 to 16-03-2018 |
26.
|
Organized a Tutorial on HACKATHON-on DATA SCIENCE USING PYTHON, JNTUHCEH, 11-03-2018 |
27.
|
Organized a Training on DATA SCIENCE USING PYTHON, JNTUHCEH, 03-03-2018 to 04-03-2018 |
28.
|
Organized a Seminar on Techtalk on “Latest Trends in Technology”, CSE Department, JNTUHCEH., 24-02-2018 |
29.
|
Organized a Workshop on Internet of Things, JNTUHCEH, 24-02-2018 to 25-02-2018 |
30.
|
Organized a Workshop on ETHICAL HACKING-hACKSTORM, JNUHCEH, 09-02-2018 to 10-02-2018 |
31.
|
Organized a Seminar on Techtalk on “Big Data Analytics”, CSE Department, JNTUHCEH., 30-01-2018 |
32.
|
Organized a Workshop on Two Week Hands-on Workshop on “COMPUTER PROGRAMMING", CSE Department, JNTUHCEH., 22-01-2018 to 03-02-2018 |
33.
|
Organized a Workshop on Two-week hands-on workshop on “Programming Language Concepts and Data Structures” to improve coding skills for UG students, CSE Department, JNTUHCEH., 22-01-2018 to 26-01-2018 |
34.
|
Organized a Seminar on Seminar on “Professional Ethics & Best Engineering Practice, CSE Department, JNTUHCEH., 16-12-2017 |
35.
|
Organized a Seminar on Seminar on “Intellectual Property rights”, CSE Department, JNTUHCEH., 10-11-2017 |
36.
|
Organized a Workshop on A two-day hands-on workshop on “Python Programming” in collaboration with TCS, CSE Department, JNTUHCEH, 20-10-2017 to 22-10-2017 |
37.
|
Organized a Conference on Computational Intelligence and Informatics, HYDERABAD, 25-09-2017 to 27-09-2017 |
38.
|
Organized a Training on Entrepreneurship development Programme on HOW TO EXPORT, CSE Department, JNTUHCEH, 21-09-2017 to 23-09-2017 |
39.
|
Organized a Training on Entrepreneurship Development Programme, CSE Department, JNTUHCEH., 09-09-2017 to 10-09-2017 |
40.
|
Organized a Workshop on 2 Day Workshop on “Entrepreneurship Development Programme”, CSE Department, JNTUHCEH, 09-09-2017 to 10-09-2017 |
41.
|
Organized a Workshop on ETHICALHACKING &CYBERSECURITY, JNTUHCEH, 11-02-2017 |
42.
|
Organized a Workshop on Research Aspects in Information Security under TEQIP-II, CSE Department, JNTUHCEH, 06-12-2012 to 07-12-2012 |
Co-ordinated |
14. |
Coordinated for a Workshop on Workshop on "Blockchain Technologies ", CSE Department, JNTUHCEH., 09-03-2019 |
15. |
Coordinated for a Workshop on A National Level Hands on Workshop on Data Science & Machine Learning, CSE Department, JNTUHCEH, 02-02-2019 to 03-02-2019 |
16. |
Coordinated for a Seminar on DIGITAL FORENSICS, JNTUHCEH, 02-02-2019 |
54. |
Coordinated for a Refresher Course on Research Aspects in Information Security, UGC-Academic Staff College, JNTUH, Hyderabad, 23-01-2012 to 28-01-2012 |
58. |
Coordinated for a Refresher Course on Trends in Information System Security, UGC-Academic Staff College, JNTUH, Hyderabad, 05-07-2010 to 24-07-2010 |
60. |
Coordinated for a Refresher Course on Information System Security, UGC-Academic Staff College, JNTUH, Hyderabad, 09-11-2009 to 30-11-2009 |
67. |
Coordinated for a Refresher Course on Information Security, UGC-Academic Staff College, JNTUH, Hyderabad, 17-11-2008 to 06-12-2008 |
73. |
Coordinated for a Refresher Course on Network Security and Cryptography, UGC-Academic Staff College, JNTUH, Hyderabad, 10-12-2007 to 29-12-2007 |
75. |
Coordinated for a Workshop on C# and .NET Framework, CSE Department, JNTUHCEH, 26-11-2007 to 28-11-2007 |
76. |
Coordinated for a Symposium on QUEST '07, CSE Department, JNTUHCEH, 01-03-2007 |
Presented |
1. |
Presented a paper in International conference on emerging ICT for bridging future, CSI Hyderabad, 12-12-2014 to 14-12-2014 |
Resource Person |
1. |
Resource Person in a Conference on Innovations in Engineering & Technology, JNTUH, 15-09-2022 to 17-09-2022 |
2. |
Resource Person in a Conference on ICRSKT-2014, JNTUHCEH, 09-11-2014 to 11-11-2014 |
3. |
Resource Person in a Workshop on Android, Sree Datta Engineering College, Hyderabad, 10-09-2012 |
4. |
Resource Person in a Training on Computer Science Fundamentals, AP Police Academy, Hyderabad, 03-09-2012 |
5. |
Resource Person in a Refresher Course on Information Technology, UGC-ASC, Moulana Azad Urdu University, Gachibowli, Hyderabad, 03-08-2012 |
6. |
Resource Person in a Workshop on C& Data Structures, SR Engineering College,Warangal, 03-07-2012 |
7. |
Resource Person in a Workshop on Network Security, GNITS College for Women, Hyderabad, 22-12-2011 |
8. |
Resource Person in a Workshop on Information Security, Royal Engineering College, Hyderabad, 18-10-2010 |
9. |
Resource Person in a Refresher Course on Information System Security, UGC-Academic Staff College, JNTUH-Hyderabad, 09-11-2009 to 30-11-2009 |
10. |
Resource Person in a Orientation Course on Information technology, UGC-ASC Moulana Azad Urdu UNIVERSITY, Hyderabad, 01-03-2009 |
11. |
Resource Person in a Refresher Course on Information Security, UGC-ASC, JNTUH, 17-11-2008 to 06-12-2008 |
12. |
Resource Person in a Training on Fundamentals of Information Technology for police personnel, AP POLICE DEPARTMENT, Hyderabad, 03-08-2008 |
13. |
Resource Person in a Refresher Course on Network Security and Cryptography, UGC-ASC, JNTUH, 10-12-2007 to 29-12-2007 |
14. |
Resource Person in a Workshop on C& Data Structures, G.Narayanamma Institute of Technology &Science, Hyderabad, |
Participated |
1. |
Participated in a Conference on 2nd International Conference on Networks, Information & Communications 2015, Sri Venkateswara College of Engineering Benguluru, 18-05-2015 to 20-05-2015 |
2. |
Participated in a Workshop on MultiCore Technologies, JNIAS,Hyderabad, 03-09-2011 |
3. |
Participated in a Workshop on Recent Trends in Technical Education, UGC-ASC-JNTUH, 20-03-2010 |
4. |
Participated in a Workshop on Outcome Based Education in Engineering, Teaching and Assessment, Hyderabad, 25-08-2009 |
5. |
Participated in a Workshop on Multi Core Technologies, IIIT, Hyderabad, 23-07-2009 to 25-07-2009 |
6. |
Participated in a Orientation Course on Value Education, UGC-Academic Staff College, JNTUH-Hyderabad, 02-03-2009 to 28-03-2009 |
7. |
Participated in a Conference on Information System Security, JNTU College of Engineering, 16-12-2008 to 20-12-2008 |
8. |
Participated in a Workshop on Microsoft Windows Internals, Microsoft & UGC-ASC,JNTU, 17-11-2008 |
9. |
Participated in a Workshop on Ubi Comp India 2008, CDAC, Hyderabad, 05-09-2008 |
10. |
Participated in a Conference on RESPOGRAPH -2008, Hyderabad, 18-04-2008 to 19-04-2008 |
11. |
Participated in a Workshop on NLP and Localization using Free-Software, JNTU College of Engineering, Hyderabad, 04-01-2007 |
12. |
Participated in a Workshop on Secured Networks, Vasavi College of Engineering, Hyderabad, 10-08-2006 to 11-08-2006 |
13. |
Participated in a Conference on Pattern Recognition and Machine Intelligence IMAGES-2005, Karshak Engineering College, Hyderabad, 10-02-2006 to 11-02-2006 |
14. |
Participated in a Workshop on Network Protocols & Security, G.Narayanamma Institute of Technology &Science, Hyderabad, 18-08-2005 to 20-08-2005 |
15. |
Participated in a Workshop on IEEE Women Student Congress, Infosys Technologies, Gachibowli, Hyderabad, 30-07-2005 to 31-07-2005 |
16. |
Participated in a Workshop on Guidance to Faculty aspiring to do Doctorate in Computer Science, G.Narayanamma Institute of Technology &Science, Hyderabad, 16-07-2005 |
17. |
Participated in a Workshop on Cryptography and Network Security, Sreenidhi Institute of Science & Technology, Hyderabad, 20-06-2005 to 24-06-2005 |
18. |
Participated in a Workshop on Communicative Skills, Bhoj Reddy Engineering College for Women, 30-08-2004 to 31-08-2004 |
19. |
Participated in a Workshop on OOAD using the UML with Fundamentals of Rational Rose, Education Centers for IBM Software, 20-08-2004 to 21-08-2004 |
|
|
Honors & Professional Activities
Awards
1.
Best Paper Award for paper titled Trusted Architecture for Self Healing Intrusion Detection System, International Conference on Cybernetics, Informatics and Systemics ICSCI-2008, Pentagram Research Center ,Hyderabad ,India , 2008
Professional Activities
Teaching
Data Structures in B.Tech(CSE) I Semester (II Year) | Cyber Crime Investigation and Digital Forensics in M.TECH(CFIS) II Semester (I Year) | Network Security & Cryptography in B.Tech(CSE) I Semester (IV Year) | Network Security & Cryptography Lab in B Tech (CSE) I Semester (IV) | Scripting Languages in B Tech (CSE)-IDP I Semester (V Year) | Information Security in M Tech (CSE) II Semester (I Year) |
|
|
Adminstrative Positions Held
|
1. Additional Controller of Examinations (EDEP)
, JNTUH, 2013 - 2016
|
|
2. Head of the Department
, JNTUCEH, 2017 - 2020
|
|
3. Additional Controller of Examinations (RP)
, JNTUH, 2016 - 2017
|
|
|
Project/Research Guidance
JOHN BABU |
An Efficient Feature Selection And Classification Algorithms For Identifying The Stego Images |
2021 |
|
Vasavi.Bande |
A Framework for providing Security Services in Public Cloud Environment |
2021 |
|
Y.Bhavani |
A Novel Approach for IP Traceback using PPM Algorithm |
2020 |
|
P. Srivani |
An Efficient and Secure Index Based Searchable Encryption Schemes for Cloud Environment |
2020 |
|
D Kalyani |
An improved Distributed Key Issuing Protocol for Hierarchical Identity-based encryption with Key Escrow Elimination |
2020 |
|
Vanama Anitha |
Efficient Framework for Fast nearest Neighbour search |
0 |
Download |
Racherla Swapna |
Stock Market Prediction using Machine Learning and NLP |
0 |
Download |
G sowmya |
AN EFFICIENT TOOL FOR FORMAL VERIFICATION OF SMART CONTRACTS |
0 |
Download |
Thota Chenchu Swetha Priya |
Providing Data Security with Cluster based data aggregation in wireless sensor networks using blockchain technology |
0 |
Download |
A. Malla Reddy |
Enforcing Security with very small Performance Penalties in Cloud Environment |
0 |
|
V.Harish |
Privacy preserving in online social networks using multilevel anonymization |
0 |
|
Sheena |
Development of Cloud Forensic Evidence Analysis tool through Deep Learning |
0 |
|
Khaja Shareef |
Security Issues Related to Data Sharing in Big Data Using Cloud Computing |
0 |
|
N Rajitha |
Cryptographic key protection in a Cryptoprocessor |
0 |
|
Muqamuddin Muhib |
|
0 |
|
Advaitha Kampelli |
A Tool to analyze and recover wiped contents of VSS in windows 10-NTFS |
2022 |
Download |
Pravallika Medarametla |
E Voting system using blockchain |
2021 |
Download |
Vishal Adada |
Behaviour based malware analysis and detection in virtual infrastructures using one class SVM Algorithm |
2019 |
Download |
Nishitha Kethidi |
Vehicle Accident Detection and Prevention Device |
2019 |
Download |
Komati Monika |
Forensics Analysis of Trinity Botnet in Android Devices |
2019 |
Download |
Shaik Raza Sikander |
A Framework for Dynamic Access Control system for cloud Federations using blockchain |
2019 |
Download |
Sai Dinesh Kondeti |
A Forensic Tool to find the Artifacts of the hacker in the Man-in-the-browser Attack |
2019 |
Download |
P. Saraswathi Saladi |
Home security application using Raspberry pi with motion sensor and camera |
2019 |
Download |
Nishitha Kethidi |
Vehicle Accident Detection and Prevention Device |
2019 |
Download |
A.Sushma |
Secured search over encrypted cloud data based on Multi keyword Ranking system |
2016 |
Download |
Rajalingu Cheggam |
Data Security Model for Cloud computing |
2016 |
Download |
L.Spandana |
Optimizing redundancy using chorus in wireless networks |
2015 |
Download |
Vidya Devi Saroja P |
Security improvisation of image steganography using cover Quantization |
2014 |
Download |
Vangala Divya Rani |
Enhanced data access control for Multi authority cloud storage |
2014 |
Download |
Shaik Imran |
Wavelet transformation based secure communication in case of steganography |
2014 |
Download |
Uyyala Sathish Kumar |
Secret image sharing using greyscale payload decomposition and irreversible image steganography |
2014 |
Download |
Dachavaram Mahendranath |
Secret sharing with multi cover adaptive steganography |
2014 |
Download |
Vasudevula Chaithanya |
Reversible dynamic secure steganography for medical image using graph coloring |
2014 |
Download |
Buhsra Anjum |
Hybrid Approach using Image steganography and visual cryptography |
2014 |
Download |
M.V.Priyadarshniki |
Scalable and secure sharing of personal health records in cloud computing using attribute based encryption using DES |
2014 |
Download |
Marakala Gayathri |
Secret image sharing scheme with Adaptive Authentication strength |
2014 |
Download |
Pooja Karpey Sai Rao |
Reliable P2P file sharing network |
2014 |
Download |
Vijaya Lakshmi Paruchuri |
Image steganography for Separable Reversible data hiding |
2013 |
Download |
Jawahar Abdulwahab Fadhil |
A new method for improving the capacity of data hiding in an image steganography |
2013 |
Download |
CH. Lakshmi Kumari |
Restricting Deviated users in anonymizing networks |
2013 |
Download |
B. Suvarna Lata |
Access Control using IButton TM |
2013 |
Download |
Santhosh Bhukya |
Authentication of secret information in Image steganography |
2013 |
Download |
Wang Peng |
Network coding based privacy preservation against Traffic Analysis in multi hop wireless networks |
2012 |
Download |
Esam Hamood Mohsen Al_Mahbashi |
Reducing selective forwarding attacks based on CAD algorithm in WMNs |
2012 |
Download |
A.Harish Kumar |
Unmasking of C worms |
2012 |
Download |
Maloth Anil Kumar |
Design of Intelligent traffic signal controller |
2012 |
Download |
P.Maitreyi |
Spray and wait protocol using secured Intermittently connected mobile networks |
2010 |
Download |
M Vijaya Rama Raju |
A salution for attack vectors against web applications using AJAX |
2010 |
Download |
B. Lakshmi Roopa |
Instruction set randomization for prevention of sql injection attacks |
2010 |
Download |
M.Veeresh Babu |
Asymmetric mobile Ad hoc networks with bidirectional routing |
2010 |
Download |
G. Hima Bindu |
Signature detection and matching for document image Retrieval |
2010 |
Download |
K.Kishore Kumar |
Extensionbility of Controller area network Protocols |
2008 |
Download |
R Prem Kumar |
Decentralized voting system using blockchain |
2022 |
Download |
K. Nitheesh |
Decentralized voting system using blockchain |
2022 |
Download |
M. Mohan |
Decentralized voting system using blockchain |
2022 |
Download |
Sourav Das |
Decentralized voting system using blockchain |
2022 |
Download |
G. Rakesh |
Secure Video steganography using Adaptive Data hiding Algorithm |
2022 |
Download |
G Rachana |
Secure Video steganography using Adaptive Data hiding Algorithm |
2022 |
Download |
K. Rajesh |
Secure Video steganography using Adaptive Data hiding Algorithm |
2022 |
Download |
N Ramyasree |
Secure Video steganography using Adaptive Data hiding Algorithm |
2022 |
Download |
Charitha Reddy Mandli |
Blockchain and cryptocurrency simulation |
2022 |
Download |
Nworah William Chinaza |
Blockchain and cryptocurrency simulation |
2022 |
Download |
Dhrithi Krishna Guduru |
Blockchain and cryptocurrency simulation |
2022 |
Download |
Thokachilu sudeep |
Blockchain and cryptocurrency simulation |
2022 |
Download |
K. Ravi Teja |
Design Evolution of Peer to Peer Application |
2019 |
Download |
T. Rohit Girikshith |
Design Evolution of Peer to Peer Application |
2019 |
Download |
Denim Deshmukh |
Design Evolution of Peer to Peer Application |
2019 |
Download |
Koyyada Sai Pranav |
Simulation of dynamic memory management algorithm based on implicit user productivity- first prioritization approach over a Benchmark engine |
2019 |
Download |
Nampelli Akhil |
Live VM Migration (VMware) |
2018 |
Download |
B. Ankitha Yamini |
Fight Data Visualization and Analytics --A Web Application |
2018 |
Download |
T. Sai Krishna |
Fight Data Visualization and Analytics --A Web Application |
2018 |
Download |
N.Tharun |
Fight Data Visualization and Analytics --A Web Application |
2018 |
Download |
Gajula Ajay chandra |
Student Profiling System |
2018 |
Download |
Jarupula Gorya |
Student Profiling System |
2018 |
Download |
Boosa Ravi Teja |
Student Profiling System |
2018 |
Download |
Sama Srikanth Reddy |
Student Profiling System |
2018 |
Download |
Priyanka Potnuru |
Portware context sensitive help |
2017 |
Download |
Venkatesh Kariappa |
Portware context sensitive help |
2017 |
Download |
Nemali Keshav |
Secure data sharing in cloud computing |
2017 |
Download |
Sailesh V Sunkara |
Secure data sharing in cloud computing |
2017 |
Download |
Pawan Kumar chaudhary |
Secure data sharing in cloud computing |
2017 |
Download |
Honey Kiron |
Image steganography using Texture synthesis |
2016 |
Download |
Farheen shaik |
Image steganography using Texture synthesis |
2016 |
Download |
B. Christine Cruze |
Image steganography using Texture synthesis |
2016 |
Download |
Leela Praveera K.N.D |
Software metric tool for Quality assessment |
2015 |
Download |
M.Suhrullekha |
Software metric tool for Quality assessment |
2015 |
Download |
V. Divya Rani |
Digital signature based Image authentication |
2015 |
Download |
G. Sri Sujitha |
Digital signature based Image authentication |
2015 |
Download |
K. Srinidhi |
Digital signature based Image authentication |
2015 |
Download |
A.Sushma |
Digital signature based Image authentication |
2015 |
Download |
P.Gayathri |
Visual Cryptography |
2015 |
Download |
G.Monika Rani |
Visual Cryptography |
2015 |
Download |
R.Sai Kiran |
Visual Cryptography |
2015 |
Download |
B V Swetha |
Reliable P2p File sharing network |
2014 |
Download |
Anusha Kumar |
Reliable P2p File sharing network |
2014 |
Download |
M.V.N.A. Uday |
Detecting targeted malicious email |
2014 |
Download |
K. Mahith |
Detecting targeted malicious email |
2014 |
Download |
Ch. Ramkumar |
Detecting targeted malicious email |
2014 |
Download |
A Leela Kumari |
Transportation system |
2014 |
Download |
S. Navya |
Smarter work management system |
2014 |
Download |
K Kanchana Mala |
Local language mobile service for india |
2013 |
Download |
B Jayaprabha |
Web service based alert system |
2013 |
Download |
Faiz Almaweri |
Optimal service pricing for a cloud cache |
2013 |
Download |
Nasr Almurisi |
Optimal service pricing for a cloud cache |
2013 |
Download |
N. Anish Kumar |
Steganography using side match method |
2013 |
Download |
M. Santhosh Kumar |
Steganography using side match method |
2013 |
Download |
A Surya Prakash |
Steganography using side match method |
2013 |
Download |
Chandra shekhar pabbu |
Authentication of secret information in Image steganography |
2013 |
Download |
Nagendra babu kondru |
Authentication of secret information in Image steganography |
2013 |
Download |
G.A.Raju |
Security Filters for web services |
2013 |
Download |
C. Sowjanya Reddy |
Monitoring the Application layer DDoS Attacks for popular websites |
2012 |
Download |
R. Gowtham Goud |
Web based student automation system |
2012 |
Download |
P. Rajesh |
Web based student automation system |
2012 |
Download |
P.Syam |
Audio steganography using pseudo random number generator |
2012 |
Download |
V.J.C. Vivek |
Audio steganography using pseudo random number generator |
2012 |
Download |
B.Vinod Kumar |
Image steganography using Key based 4 bit LSB |
2012 |
|
V. Teja Suryanarayana Raju |
Image steganography using key based 4 bit LSB |
2012 |
|
R. Gowtham Goud |
Web based student automation system |
2012 |
|
P.Rajesh |
Web based student automation system |
2012 |
|
Dinakar Nerusu |
Face Recognition System |
2007 |
Download |
|
|
Contact : |
|
|
Dr. R SRIDEVI
Professor & Director, Directorate of Entrepreneurship, Innovation and Start-ups, JNTUH
Computer Science & Engineering
JNTUH University College of Engineering , Science & Technology Hyderabad
Official Email: sridevirangu@jntuh.ac.in
Alternate Email: deis@jntuh.ac.in, coecybersecurity@jntuh.ac.in
Phone: 040-32408718 |
|
| |