CEO, Hatchlab Research Centre and Professor

Dr Krovi Raja Sekhar

Department of Computer Science and Engineering

Interests

  1. Cyber Security and Forensics
  2. Cryptography and Network Security
  3. Game Development and Entrepreneurship

Education

1991

Nagarjuna University, Guntur
BSc

1994

National Institute of Technology, Bhopal
MCA

2006

Acharya Nagarjuna University
Guntur, AP
M.Tech. (CSE)

2014

Acharya Nagarjuna University
Guntur, AP
PhD

Experience

  • 2014 to 2024 – Professor – KLEF Deemed to be University, Vaddeswaram, AP
  • 2009 to 2013 – Associate Professor – KLEF Deemed to be University, Vaddeswaram, AP
  • 2005 to 2009 – Assistant Professor – KLCE, Vaddeswaram, AP
  • 2004 to 2005 – Assistant Professor – DMS SVH College of Engineering, Machilipatnam, AP
  • 1998 to 2004 – Lecturer – DMS SVH College of Engineering, Machilipatnam, AP
  • 1997 to 1998 – Lecturer – The Hindu college, PG Centre, Machilipatnam, AP
  • 1995 to 1997 – Lecturer – The Hindu College, Machilipatnam, AP

Awards & Fellowships

  • 2009 – “Young Professional Award” National Level – Computer Society of India (CSI)
  • 2011 – “Chapter Patron Award” National Level – Computer Society of India (CSI), India
  • 2013 – “IBM Drona” for Mentoring TGMC Projects at National Level – IBM, India
  • 2019 – “Best Mentor Award” State Level – Startup AP Awards Symposium, Visakhapatnam
  • 2021 – “Innovation Ambassador (IA)” – Ministry of Education (MoE), Government of India

Memberships

  • Senior Member of IEEE
  • Senior Member of ACM
  • Life Member of Computer Society of India (CSI)
  • Life Member of Cryptology Research Society of India, ISI, Kolkata (CSI)
  • Honorary Member of Open Web Application Security Project – OWASP Forum

Publications

  • Performance evaluation parameters of image steganography techniques Pradhan, A., Sahu, A.K., Swain, G., Sekhar K R, International Conference on Research Advances in Integrated Navigation, RAINS 2016, 764399, 30, (2016)
  • Digital Image Steganography based on seven-way pixel value differencing, A Pradhan, Raja Sekhar Krovi, G Swain, Indian Journal of Science and Technology 9 (37), 88557, (2016)
  • An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks, D Aluvala, S., Sekhar, K.R., Vodnala, Procedia Computer Science 92, 554-561, 2016
  • A Novel technique for node authentication in mobile ad hoc networks, DV Srinivas Aluvala, Dr. K. Raja Sekhar, Recent Trends in Engineering and Material Sciences 8, 680-682 (2016)
  • Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks, G Pradhan, A., Sekhar, K.R., Swain, Security and Communication Networks 1924618 (8), 1924618, (2017)
  • Digital Image Steganography Using LSB Substitution, PVD, and EMD, G Pradhan, A., Sekhar, K.R., Swain, Mathematical Problems in Engineering 8 (1804953), (2018)
  • Redactable Blockchain and its Implementation in Bitcoin, K Rajasekhar, SH Yalavarthy, S Mullapudi, M Gowtham, International Journal of Engineering & Technology 7 (1), 401-405, (2018)
  • Digital Image Steganography combining LSB substitution with five-way PVD in 2×3-pixel blocks, G Pradhan, A., Raja Sekhar, K., Swain, International Journal of Pharmacy and Technology 8 (4), 22051-22061 (2018)
  • Secure system of attack patterns towards application security metric derivation, KR Sekhar, LSS Reddy, UJ Kameswari, International Journal of Computer Applications 53 (1), 11-18, (2012)
  • Study on improving the network lifetime maximization for wireless sensor network using cross layer approach, K Bhandari, R.R., Raja Sekhar, International Journal of Electrical and Computer Engineering 6 (6), 3080-3086 (2016)
  • An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks, DV Srinivas Aluvala, Dr. K. Raja Sekhar, 2nd International Conference on Intelligent Computing, Communication, 92, 554-561 (2016)
  • User activity monitoring using keylogger, Venkatesh, R., Raja Sekhar K, Asian Journal of Information Technology 15 (23), 4758-4762 (2016)
  • A Fabric architecture towards block chain application using hyper ledger, M Haseeb, M., Raja Sekhar Krovi, Spandana, Y.V., Syam, International Journal of Engineering and Technology (UAE) 7 (2), 83-85 (2018)
  • Templates to derive security metric based on attack patterns, KR Sekhar, LSS Reddy, UJ Kameswari, 2012 CSI Sixth International Conference on Software Engineering (CONSEG), 1-9 (2012)
  • Energy-efficient routing-based clustering approaches and sleep scheduling algorithm for network lifetime maximization in sensor network: A survey, Bhandari, R.R., K Rajasekhar, Lecture Notes in Networks and Systems 89, 293-306 (2020)
  • Entrepreneurial Eco System in Autonomous Institutions, K Raja Sekhar, TS Johnson, Bookwell Publications, Delhi, (2019)
  • A Systematic study of asset management using hybrid cyber security maturity model, Krovi Raja Sekhar, Veerapaneni, S.S., International Journal of Recent Technology and Engineering 7 (6), 140-145, (2019)
  • Secure and congestion free routing techniques in vehicular Ad-Hoc Network (VANET), Kadam, N.N., Sekhar KR, International Journal of Recent Technology and Engineering, 915-922 (2019)
  • A Systematic study of asset management using hybrid cyber security maturity model, Veerapanenic, S.S., Raja Sekhar K, International Journal of Recent Technology and Engineering 7 (6), 678-683 (2019)
  • Mobility aware clustering routing algorithm (MACRON) to improve lifetime of wireless sensor network, Bhandari, R.R., Raja Sekhar K, International Journal of Recent Technology and Engineering 8 (2), 76-85, (2019)
  • A Systematic Review of Vulnerability Analysis & penetration Testing Tools, Dr. K Raja Sekhar, M Pavanasurya, GG Komal Bharti, International Journal of Engineering & Technology 7 (1), 411-413, (2018)
  • A Framework using blockchain application to monitor & control logs, K Tapasvi, U.K., Kranthi, S., Raja Sekhar, Journal of Advanced Research in Dynamical and Control Systems 2 (10), 459-465, (2018)
  • An integrated approach towards vulnerability assessment & penetration testing for a web application, Siva Prasad, K., Raja Sekhar, K., Rajarajeswari P, International Journal of Engineering and Technology (UAE) 7, 431-435 (2018)
  • IMPLEMENTATION OF MICRO AVALANCHE EFFECT-DES OPERATIONS, KR Sekhar, AN Reddy, KVA Prasad, R Sri, GSS Vineeth, J Amudhavel, Advances and Applications in Mathematical Sciences 17 (1), 31-45 (2017)
  • Implementation of AES algorithm using GF (3n) modulo system, Mallepeddi, V.S.U., Pathakottu, S.R., Gattupalli, V.K.C., Rajasekhar K, Journal of Advanced Research in Dynamical and Control Systems 9 (6), 1054-1064, (2017)
  • Analysis of Security Threats and Issues in MANETs, DV Srinivas Aluvala, K. Raja Sekhar. International Journal On Advanced Computer Theory And Engineering (IJACTE), 2319-2526, (2015)
  • Analysis of avalanche effect in modified DES algorithm, Krovi, R.S., Jetty P, International Journal of Applied Engineering Research 10 (11), 29327-29336, (2015)
  • Implementation of parallelism on block cipher modes using DES in lab view, Raja Sekhar, K., Sankeerthanreddy, V., Priyanka, D., Gopi Krishna, S B, International Journal of Applied Engineering Research 10 (10), 2015, 25081-25094, (2015)
  • Taxonomy Towards Application Security Metric Generation using Attack Patterns, K Seetha Devi, U Jyothi Kameswari, K Raja Sekhar, International Journal of Computer Science & Technology 2 (4), 2012, 251-256, (2011)
  • A Prototype Model to Generate Attack Patterns Towards Application Security Generation, U Jyothi Kameswari, K Ravindranath, K Raja Sekhar, N Praveena, Global Journal of Computer Application and Technology 1 (4), 2011, 661-664, (2011)
  • An Integrated Security Engineering Paradigm with Attack Patterns, RS Krovi, International Journal of Systems & Technologies 1 (1), 61-67, (2009)
  • An Integrated Security Engineering Paradigm with attack patterns, KR Sekhar, NCSOFT'07 1 (Proceedings of NCSOFT’07), 92-98, (2007)
  • An Overview of Security attacks on software (Source Code)”, K. Raja Sekhar, VSRK Sarma, Proceedings of IDEA 2007, Sangrur, Punjab, (2007)
  • A Human Gait Recognition Against Information Theft in Smartphone using Residual Convolutional Neural Network, Goginenei Krishna Chaitanya, Raja Sekhar Krovi, International Journal of Advanced Computer Science and Applications (IJCSA) 11(5), 333-340 (2020)
  • GAIT based Behavioral Authentication using Hybrid Swarm based Feed Forward Neural Network, Gogineni Krishna Chaitanya, Krovi Raja Sekhar, 11(9), 332-339 (2020)
  • Verification of pattern unlock and gait behavioural authentication through a machine learning approach, Gogineni Krishna Chaitanya, Krovi Raja Sekhar, International Journal of Intelligent Unmanned Systems, 2049-6427, 10(1), 48-64, (2021)
  • Knowledge-based gait behavioural authentication through a machine learning approach, Goginenei Krishna Chaitanya, Krovi Raja Sekhar, International Journal of Biomedical Engineering and Technology, 36(1), 25-42 (2021)
  • A Machine learning approach of hybrid KSVN algorithm to detect DDoS attack in VANET, Kadam Nivedita, Krovi Raja Sekhar, International Journal of Advanced Computer Science and Applications, 12(7), 718-722 (2021)
  • Priority-mobility aware clustering routing algorithm for lifetime improvement of dynamic wireless sensor network, Rajiv R Bhandari, Krovi Raja Sekhar, International Journal of Advanced Computer Science and Applications 12(2), 797-802 (2021)
  • Enhancement of attribute-based encryption schemes through machine learning techniques: research challenges and opportunities, P Prathap Nayudu, Krovi Raja Sekhar, Journal of Jilin University (Engineering and Technology Edition), 40(7), 53-70 (2021)
  • Accountable specific attribute-based encryption scheme for cloud access control, P Prathap Nayudu, Krovi Raja Sekhar, International Journal of System Assurance Engineering and Management, https://doi.org/10.1007/s13198-022-01689-z, (2022)
  • Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization, P Prathap Nayudu, Krovi Raja Sekhar, Intelligent automation & Soft Computing, 35(3), 3801-3813 (2023)
  • Routing with Multi-Criteria QoS for Flying Ad-hoc Networks (FANETs), Ch Naveen Kumar Reddy, Krovi Raja Sekhar, International Journal of Advanced Computer Science and Applications, 13(11), 248-256 (2022)
  • Improved fuzzy-based MCDM–TOPSIS model to find and prevent the financial system vulnerability and hazards in real time, Naga Simhadri Appaarao Polireddy, Krovi Raja Sekhar, Soft Computing, https://doi.org/10.1007/s00500-023-08318-2, (2023)
  • Cloud environment: A review on dynamic resource allocation schemes, P Prathap Nayudu, K Raja Sekhar, International Journal of Applied Engineering Research, 13(6), 4568-4575, (2018)
  • The Fault Management System Using Amazon EC2: Web Application Deployment on Cloud, K Raja Sekhar, Sarat Chalamalasetty, Prahasith Kasturi, Varun Jajam, International Journal of Computer Science and Information Technologies, 3(1), 3063-3067, (2012)
  • Secure federated learning architecture for fuzzy classifier in healthcare environment, Santosh Vishwakarma, Rajat Subhra Goswami, P Prathap Nayudu, Krovi Raja Sekhar, Pandu Ranga Rao Arepalli, Ramya Tatikonda, & Wael M F Abdel Rehim, Soft Computing, https://doi.org/10.1007/s00500-023-08629-4, (2023)
  • Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment, P Prathap Nayudu, Krovi Raja Sekhar, Computer Systems Science & Engineering, Tech Science Press, DOI: 10.32604/csse.2023.033961, 1079-1092 (2023)
  • An efficient ciphertext-policy attribute-based encryption with attribute and user revocation scheme in cloud environment, P Prathap Nayudu, Krovi Raja Sekhar, International Journal of System of systems Engineering, 13(4), 371-385, (2023)
  • Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard, Hosakota Vamsi Krishna, Krovi Raja Sekhar, Soft Computing, 28, 2671-2681, (2024)

Contact Details

  • E-mail id:rajasekhar.k@srmap.edu.in
TOP