Seguir
Chittaranjan Hota
Chittaranjan Hota
Senior Professor of Comp. Science at BITS, Hyderabad
Dirección de correo verificada de hyderabad.bits-pilani.ac.in - Página principal
Título
Citado por
Citado por
Año
Big data analytics framework for peer-to-peer botnet detection using random forests
K Singh, SC Guntuku, A Thakur, C Hota
Information Sciences 278, 488-497, 2014
3362014
Capability-based cryptographic data access control in cloud computing
C Hota, S Sanka, M Rajarajan, SK Nair
International Journal of Advanced Networking and Applications 3 (3), 1152-1161, 2011
1172011
Secure data access in cloud computing
S Sanka, C Hota, M Rajarajan
2010 IEEE 4th International Conference on Internet Multimedia Services …, 2010
1132010
Peershark: detecting peer-to-peer botnets by tracking conversations
P Narang, S Ray, C Hota, V Venkatakrishnan
2014 IEEE Security and Privacy Workshops, 108-115, 2014
772014
Attack detection and forensics using honeypot in IoT environment
RK Shrivastava, B Bashir, C Hota
Distributed Computing and Internet Technology: 15th International Conference …, 2019
532019
Advances in secure knowledge management in the big data era
C Hota, S Upadhyaya, JN Al-Karaki
Information Systems Frontiers 17, 983-986, 2015
462015
Dynamic task-scheduling in grid computing using prioritized round robin algorithm
S Bansal, B Kothari, C Hota
International Journal of Computer Science Issues (IJCSI) 8 (2), 472, 2011
412011
Feature selection for detection of peer-to-peer botnet traffic
P Narang, JM Reddy, C Hota
Proceedings of the 6th ACM India computing convention, 1-9, 2013
372013
Fusion learning: A one shot federated learning
A Kasturi, AR Ellore, C Hota
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
362020
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification
P Narang, C Hota, VN Venkatakrishnan
EURASIP Journal on Information security 2014, 1-12, 2014
332014
Machine-learning approaches for P2P botnet detection using signal-processing techniques
P Narang, V Khurana, C Hota
Proceedings of the 8th ACM International Conference on Distributed Event …, 2014
292014
Cooperative spectrum sensing in cognitive radios using perceptron learning for IEEE 802.22 WRAN
V Balaji, P Kabra, P Saieesh, C Hota, G Raghurama
Procedia Computer Science 54, 14-23, 2015
252015
Attack identification framework for IoT devices
JMR Danda, C Hota
Information Systems Design and Intelligent Applications: Proceedings of …, 2016
242016
Scalable honeypot architecture for identifying malicious network activities
GK Sadasivam, C Hota
2015 international conference on emerging information technology and …, 2015
232015
Real-time peer-to-peer botnet detection framework based on bayesian regularized neural network
SC Guntuku, P Narang, C Hota
arXiv preprint arXiv:1307.7464, 2013
212013
Honeynet data analysis and distributed SSH brute-force attacks
GK Sadasivam, C Hota, B Anand
Towards Extensible and Adaptable Methods in Computing, 107-118, 2018
202018
Classification of SSH attacks using machine learning algorithms
GK Sadasivam, C Hota, B Anand
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016
202016
A novel permission-based reliable distributed mutual exclusion algorithm for manets
M Parameswaran, C Hota
2010 Seventh International Conference on Wireless and Optical Communications …, 2010
202010
Efficient refinery scheduling heuristic in heterogeneous computing systems
S Bansal, C Hota
Journal of Advances in Information Technology 2 (3), 159-164, 2011
192011
P2p traffic classification using ensemble learning
JM Reddy, C Hota
Proceedings of the 5th IBM collaborative academia research exchange workshop …, 2013
182013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20