1. Abdisalam, M-S. (2011). Setting up a Secure Information System Using Information Security Management. International Journal of Research and Reviews in Computer Science. 2(1), 138-143.
2. Ballamudi, V. K. R. (2016). Utilization of Machine Learning in a Responsible Manner in the Healthcare Sector. Malaysian Journal of Medical and Biological Research, 3(2), 117-122. https://mjmbr.my/index.php/mjmbr/article/view/677
3. Dekkati, S., & Thaduri, U. R. (2017). Innovative Method for the Prediction of Software Defects Based on Class Imbalance Datasets. Technology & Management Review, 2, 1–5. https://upright.pub/index.php/tmr/article/view/78
4. Dekkati, S., Thaduri, U. R., & Lal, K. (2016). Business Value of Digitization: Curse or Blessing?. Global Disclosure of Economics and Business, 5(2), 133-138. https://doi.org/10.18034/gdeb.v5i2.702
5. Desamsetti, H. (2016a). A Fused Homomorphic Encryption Technique to Increase Secure Data Storage in Cloud Based Systems. The International Journal of Science & Technoledge, 4(10), 151-155.