Madhusudhan Dasari Sreeramulu

Madhusudhan Dasari Sreeramulu
American Express · Department of cyber security

Master of Technology

About

16
Publications
535
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
63
Citations
Introduction
Working as senior data engineer in cyber security/ cyber analytics department in American Express.
Education
June 2004 - July 2006

Publications

Publications (16)
Conference Paper
Full-text available
Artificial Intelligence (AI) has also started to be regularly introduced in cloud-based systems as it can help improve performance and skyrocket efficiency. It is a challenge for such systems to schedule tasks in real time, and computing sources need to be allocated promptly and efficiently. The current scheduling mechanisms being relatively static...
Conference Paper
Full-text available
The advent of artificial intelligence (AI) has driven an emergence in applications demanding online responses to immense amounts of data. Typically, the cloud-based deployment of these applications requires resource management to be optimized for high performance while meeting cost efficiency. However, conventional static resource allocation method...
Conference Paper
Full-text available
The specification provides a new, resource-efficient method of Dynamic Workload Balancing in AI-driven Real-time Applications over Cloud Infrastructure. The real-time application keeps processing data at high speeds, and it is too difficult to get or make this type of arrangement using our traditional cloud setups as the system employs artificial i...
Conference Paper
Full-text available
As businesses increasingly depend on these cloud-based services, secure cloud computing is vital. There is no free way with the cloud network, and our information is susceptible to vulnerability. Mitigation strategies to address these network vulnerabilities in cloud computing and analysis of the man-in-the-middle attack and Distributed Denial of S...
Conference Paper
Full-text available
This abstract provides a state-of-the-art review of secure access control schemes for cloud networks. The rise of cloud computing and the security of the cloud have increased the need for robust access control for securing data and resources. In this paper, role-based, attribute-based, multi-factor authentication access control methods and their st...
Conference Paper
Full-text available
Cellular ad Hoc Networks (MANETs) have become increasingly popular in cell computing packages, inclusive of cellular computing, fitness care, automobile, and army packages. As such, safety protocols used in the transmission of records over MANETs are of essential importance for their hit usage. In this paper, we endorse an evaluation of safety prot...
Conference Paper
Full-text available
The increasing use of cloud computing has also resulted in a higher vulnerability to cyber attacks. Network Intrusion Detection Systems (NIDS) play a vital role in protecting cloud computing environments from these attacks. However, the unique characteristics of cloud computing, such as its dynamic and distributed nature, pose challenges for tradit...
Patent
IncidentoAlert emerges as a groundbreaking solution in the realm of accident detection and alert systems (ADAS), integrating cutting-edge technologies such as AI, financial analytics, cloud computing, IoT, Big Data, and sensor networks. In the event of an accident, IncidentoAlert serves as a pivotal lifeline, rapidly detecting incidents and orchest...
Patent
UK Patent design number 6380314. A device with a display to detect software malware is a specialized tool like a hardware security appliance and a dedicated monitoring system designed to detect, analyze, and report malicious activity in software applications.
Article
Full-text available
Cloud computing using hosts that are accessed online, data is maintained und managed using the storage arrangement for storing information. This means that instead of storing data on local storage devices like hard drives, Data is kept on servers that cloud vendors maintain. Cloud computing storage offers many benefits over traditional storage meth...
Article
Full-text available
Natural Language Processing has emerged as a powerful tool in various fields, including code generation. This paper explores the application of NLP techniques for the automatic generation of code from natural language specifications. The goal is to bridge the gap between human-readable requirements and machine-executable code, making software devel...
Article
Full-text available
Data protection in the online environment pertains to the safeguarding of sensitive or important data kept, analyzed, or sent in cloud-based systems. It entails assuring data confidentiality, integrity, and availability, as well as adhering to appropriate data protection requirements. In a nutshell, cloud data protection seeks to protect data again...
Article
Full-text available
The wireless networks have become integral to our daily lives, powering everything from smart phones to smart home devices. However, alongside their benefits, wireless networks also bring forth significant security challenges. Wireless networks, unlike traditional wired networks, transmit data over the airwaves, making them susceptible to various f...
Article
Full-text available
The emergence of cloud computing networks has led to a sharp rise in the frequency of cyberattacks. As a result, networks' appropriate security has become an issue for organisations. Organisations' information security advisors must make difficult and complex choices when evaluating and choosing information security measures that allow for the prot...
Article
Full-text available
Natural Language Processing (NLP) constitutes a crucial field in the realm of artificial intelligence, concentrating on the interplay between computers and human language. The goal is to empower machines to understand, interpret, and produce human language, thereby closing the divide between humans and computers. Various techniques have been propos...

Network