• Vishesha M et. “Optimized Placement of Service Function Chains in Edge Cloud using LSTM”, SN Computer Science, 2024. (Accepted)
  • Narayan, G., et al. "A Framework for Data Provenance Assurance in Cloud Environment using Ethereum Blockchain: Data Provenance Assurance in Cloud using Blockchain." EAI Endorsed Transactions on Scalable Information Systems 11.2 (2024).
  • Arali, Naveen, D. G. Narayan, and P. S. Hiremath. "An Efficient and Secure Blockchain Consensus Algorithm Using Game Theory." International Journal of Computer Network and Information Security, 16.2 (2024).
  • DG, Narayan, Naveen Arali, and R. Tejas. "DPoSEB: Delegated Proof of Stake with Exponential Backoff Consensus Algorithm for Ethereum Blockchain." Computer Science Journal of Moldova 32.2 (2024).
  • Narayan D. G., Heena M, Amit K, “A Collaborative Approach for Detection of DDoS Attacks in SDN using Entropy and Deep Learning”, Journal of Telecommunications and Information Technology, 2024. (Accepted).
  • Jacob, Joshua, Sumedha Shinde, and D. G. Narayan. "An Efficient Controller Placement Algorithm using Clustering in Software Defined Networks." Journal of Telecommunications and Information Technology 4 (2023): 9-17.
  • S. Patil, D. G. Narayan, A. Bhat, A. Hungund, and D. M. Patil, "Horizontal Pod Autoscaling in Kubernetes Cluster Using Long Short-Term Memory," Lecture Notes in Electrical Engineering, vol. 1189 LNEE, pp. 461–471, 2024.
  • R. Patil and D. G. Narayan, "Mitigation of DDoS Attacks using Entropy and Proof-of-Work Based Puzzle in OpenStack Cloud," in Proc. of the 2023 3rd International Conference on Intelligent Technologies (CONIT), 2023.
close
close
close
mail

info@kletech.ac.in

coe@kletech.ac.in (Controller of Examinations)