Search Results - "Boppana, Rajendra V."

Refine Results
  1. 1

    On Designing Low-Risk Honeypots Using Generative Pre-trained Transformer Models with Curated Inputs by Ragsdale, Jarrod, Boppana, Rajendra V.

    Published in IEEE access (01-01-2023)
    “…Honeypots are utilized as defensive tools within a monitored environment to engage attackers and gather artifacts for the development of indicators of…”
    Get full text
    Journal Article
  2. 2

    Detection of Ransomware Attacks Using Processor and Disk Usage Data by Thummapudi, Kumar, Lama, Palden, Boppana, Rajendra V.

    Published in IEEE access (2023)
    “…Ransomware often evades antivirus tools, encrypts files, and renders the target computer and its data unusable. The current approaches to detect such…”
    Get full text
    Journal Article
  3. 3

    On Early Detection of Anomalous Network Flows by Fox, Garett, Boppana, Rajendra V.

    Published in IEEE access (01-01-2023)
    “…There are numerous methods of identifying network-based attacks using machine learning, but processing complexity often constrains it to analyses of previously…”
    Get full text
    Journal Article
  4. 4

    Detection of Malicious Network Flows with Low Preprocessing Overhead by Fox, Garett, Boppana, Rajendra V.

    Published in Network (Basel) (01-12-2022)
    “…Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to…”
    Get full text
    Journal Article
  5. 5

    A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges by Chaganti, Rajasekhar, Boppana, Rajendra V., Ravi, Vinayakumar, Munir, Kashif, Almutairi, Mubarak, Rustam, Furqan, Lee, Ernesto, Ashraf, Imran

    Published in IEEE access (2022)
    “…With the proliferation of the blockchain technology ecosystems such as mining pools, crypto exchanges, full Bitcoin nodes, wallets, and pool protocol servers…”
    Get full text
    Journal Article
  6. 6

    Fault-tolerant wormhole routing algorithms for mesh networks by Boppana, R.V., Chalasani, S.

    Published in IEEE transactions on computers (01-07-1995)
    “…We present simple methods to enhance the current minimal wormhole routing algorithms developed for high radix, low dimensional mesh networks for fault tolerant…”
    Get full text
    Journal Article
  7. 7

    Crosscheck mechanism to identify malicious nodes in ad hoc networks by Su, Xu, Boppana, Rajendra V.

    Published in Security and communication networks (01-01-2009)
    “…Route falsification attacks are easy to launch in mobile ad hoc networks with on demand routing protocols that employ network‐wide flooding of control packets…”
    Get full text
    Journal Article
  8. 8

    Adaptive Multimodule Routers for Multiprocessor Architectures by Chalasani, Suresh, Boppana, Rajendra V

    Published in Information systems frontiers (01-07-2005)
    “…Recent multiprocessors such as Cray T3D support interprocessor communication using partitioned dimension-order routers (PDRs). In a PDR implementation, the…”
    Get full text
    Journal Article
  9. 9

    Fault-tolerant communication with partitioned dimension-order routers by Boppana, R.V., Chalasani, S.

    “…The current fault-tolerant routing methods require extensive changes to practical routers such as the Cray T3D's dimension-order router to handle faults. In…”
    Get full text
    Journal Article
  10. 10

    A framework for designing deadlock-free wormhole routing algorithms by Boppana, R.V., Chalasani, S.

    “…This paper presents a framework to design fully-adaptive, deadlock-free wormhole algorithms for a variety of network topologies. The main theoretical…”
    Get full text
    Journal Article
  11. 11

    Computing large sparse multivariate optimization problems with an application in biophysics by Brookes, Emre H., Boppana, Rajendra V., Demeler, Borries

    “…We present a novel divide and conquer method for parallelizing a large scale multivariate linear optimization problem, which is commonly solved using a…”
    Get full text
    Conference Proceeding
  12. 12

    Data Architectures for RFID Transactions by Chalasani, S., Boppana, R.

    “…We focus on the data models for storing the data generated by radio frequency identification (RFID) transactions and architectures for processing such data. We…”
    Get full text
    Journal Article
  13. 13

    Attack-Specific Feature Construction to Detect Malicious TCP Flows by Vedula, Vasudha, Boppana, Rajendra V., Lama, Palden

    “…Malicious network flow detection and mitigation is a major part of network security and has been a widely researched topic for decades now. Various approaches,…”
    Get full text
    Conference Proceeding
  14. 14

    Towards Live Detection of Ransomware Attacks by Thummapudi, Kumar, Boppana, Rajendra V., Lama, Palden

    “…Ransomware attacks continue to be a top risk for organizations today. Recent studies focused on the behavioral and runtime analysis of ransomware. However,…”
    Get full text
    Conference Proceeding
  15. 15

    Mitigating malicious control packet floods in ad hoc networks by Desilva, S., Boppana, R.V.

    “…We investigate the impact of hacker attacks by malicious nodes on the overall network performance. These malicious nodes mimic normal nodes in all aspects,…”
    Get full text
    Conference Proceeding
  16. 16

    On the impact of noise sensitivity on performance in 802.11 based ad hoc networks by Desilva, S., Boppana, R.V.

    “…The IEEE 802.11 Medium Access Control (MAC) layer plays a crucial role on the overall throughput obtained in a mobile ad hoc network. We show that the virtual…”
    Get full text
    Conference Proceeding
  17. 17

    A comparison of adaptive wormhole routing algorithms by Boppana, Rajendra V., Chalasani, Suresh

    “…Improvement of message latency and network utilization in torus interconnection networks by increasing adaptivity in wormhole routing algorithms is studied. A…”
    Get full text
    Conference Proceeding
  18. 18

    Performance Prediction of Parallel Applications Based on Small-Scale Executions by Escobar, Rodrigo, Boppana, Rajendra V.

    “…Predicting the execution time of parallel applications in High Performance Computing (HPC) clusters has served different objectives, including helping…”
    Get full text
    Conference Proceeding
  19. 19

    On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks by Xu Su, Boppana, R.V.

    “…Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band…”
    Get full text
    Conference Proceeding
  20. 20