Folgen
Chittaranjan Hota
Chittaranjan Hota
IEEE Senior Member and Professor of Comp. Sc at BITS, Hyderabad
Bestätigte E-Mail-Adresse bei hyderabad.bits-pilani.ac.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Big data analytics framework for peer-to-peer botnet detection using random forests
K Singh, SC Guntuku, A Thakur, C Hota
Information Sciences 278, 488-497, 2014
2942014
Capability-based cryptographic data access control in cloud computing
C Hota, S Sanka, M Rajarajan, SK Nair
International Journal of Advanced Networking and Applications 3 (3), 1152-1161, 2011
1122011
Secure data access in cloud computing
S Sanka, C Hota, M Rajarajan
2010 IEEE 4th International Conference on Internet Multimedia Services …, 2010
982010
Peershark: detecting peer-to-peer botnets by tracking conversations
P Narang, S Ray, C Hota, V Venkatakrishnan
2014 IEEE Security and Privacy Workshops, 108-115, 2014
712014
Dynamic task-scheduling in grid computing using prioritized round robin algorithm
S Bansal, B Kothari, C Hota
International Journal of Computer Science Issues (IJCSI) 8 (2), 472, 2011
412011
Advances in secure knowledge management in the big data era
C Hota, S Upadhyaya, JN Al-Karaki
Information Systems Frontiers 17 (5), 983-986, 2015
392015
Feature selection for detection of peer-to-peer botnet traffic
P Narang, JM Reddy, C Hota
Proceedings of the 6th ACM India computing convention, 1-9, 2013
342013
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification
P Narang, C Hota, VN Venkatakrishnan
EURASIP Journal on Information security 2014 (1), 1-12, 2014
302014
Attack detection and forensics using honeypot in IoT environment
RK Shrivastava, B Bashir, C Hota
International Conference on Distributed Computing and Internet Technology …, 2019
282019
Machine-learning approaches for P2P botnet detection using signal-processing techniques
P Narang, V Khurana, C Hota
Proceedings of the 8th ACM International Conference on Distributed Event …, 2014
242014
Cooperative spectrum sensing in cognitive radios using perceptron learning for ieee 802.22 wran
V Balaji, P Kabra, P Saieesh, C Hota, G Raghurama
Procedia Computer Science 54, 14-23, 2015
222015
Attack identification framework for IoT devices
JMR Danda, C Hota
Information Systems Design and Intelligent Applications, 505-513, 2016
192016
Real-time peer-to-peer botnet detection framework based on bayesian regularized neural network
SC Guntuku, P Narang, C Hota
arXiv preprint arXiv:1307.7464, 2013
192013
A novel permission-based reliable distributed mutual exclusion algorithm for manets
M Parameswaran, C Hota
2010 Seventh International Conference on Wireless and Optical Communications …, 2010
192010
Scalable honeypot architecture for identifying malicious network activities
GK Sadasivam, C Hota
2015 international conference on emerging information technology and …, 2015
172015
P2p traffic classification using ensemble learning
JM Reddy, C Hota
Proceedings of the 5th IBM collaborative academia research exchange workshop …, 2013
162013
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets
P Narang, C Hota, HT Sencar
Computer Communications 96, 29-42, 2016
152016
Classification of SSH attacks using machine learning algorithms
GK Sadasivam, C Hota, B Anand
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016
152016
Game-theoretic strategies for IDS deployment in peer-to-peer networks
P Narang, C Hota
Information Systems Frontiers 17 (5), 1017-1028, 2015
142015
Efficient cooperative spectrum sensing in cognitive radio using coalitional game model
V Balaji, C Hota
2014 International Conference on Contemporary Computing and Informatics …, 2014
142014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20