Search Results - "Boppana, Rajendra V."
-
1
On Designing Low-Risk Honeypots Using Generative Pre-trained Transformer Models with Curated Inputs
Published in IEEE access (01-01-2023)“…Honeypots are utilized as defensive tools within a monitored environment to engage attackers and gather artifacts for the development of indicators of…”
Get full text
Journal Article -
2
Detection of Ransomware Attacks Using Processor and Disk Usage Data
Published in IEEE access (2023)“…Ransomware often evades antivirus tools, encrypts files, and renders the target computer and its data unusable. The current approaches to detect such…”
Get full text
Journal Article -
3
On Early Detection of Anomalous Network Flows
Published in IEEE access (01-01-2023)“…There are numerous methods of identifying network-based attacks using machine learning, but processing complexity often constrains it to analyses of previously…”
Get full text
Journal Article -
4
Detection of Malicious Network Flows with Low Preprocessing Overhead
Published in Network (Basel) (01-12-2022)“…Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to…”
Get full text
Journal Article -
5
A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges
Published in IEEE access (2022)“…With the proliferation of the blockchain technology ecosystems such as mining pools, crypto exchanges, full Bitcoin nodes, wallets, and pool protocol servers…”
Get full text
Journal Article -
6
Fault-tolerant wormhole routing algorithms for mesh networks
Published in IEEE transactions on computers (01-07-1995)“…We present simple methods to enhance the current minimal wormhole routing algorithms developed for high radix, low dimensional mesh networks for fault tolerant…”
Get full text
Journal Article -
7
Crosscheck mechanism to identify malicious nodes in ad hoc networks
Published in Security and communication networks (01-01-2009)“…Route falsification attacks are easy to launch in mobile ad hoc networks with on demand routing protocols that employ network‐wide flooding of control packets…”
Get full text
Journal Article -
8
Adaptive Multimodule Routers for Multiprocessor Architectures
Published in Information systems frontiers (01-07-2005)“…Recent multiprocessors such as Cray T3D support interprocessor communication using partitioned dimension-order routers (PDRs). In a PDR implementation, the…”
Get full text
Journal Article -
9
Fault-tolerant communication with partitioned dimension-order routers
Published in IEEE transactions on parallel and distributed systems (01-10-1999)“…The current fault-tolerant routing methods require extensive changes to practical routers such as the Cray T3D's dimension-order router to handle faults. In…”
Get full text
Journal Article -
10
A framework for designing deadlock-free wormhole routing algorithms
Published in IEEE transactions on parallel and distributed systems (01-02-1996)“…This paper presents a framework to design fully-adaptive, deadlock-free wormhole algorithms for a variety of network topologies. The main theoretical…”
Get full text
Journal Article -
11
Computing large sparse multivariate optimization problems with an application in biophysics
Published in Conference on High Performance Networking and Computing: Proceedings of the 2006 ACM/IEEE conference on Supercomputing; 11-17 Nov. 2006 (11-11-2006)“…We present a novel divide and conquer method for parallelizing a large scale multivariate linear optimization problem, which is commonly solved using a…”
Get full text
Conference Proceeding -
12
Data Architectures for RFID Transactions
Published in IEEE transactions on industrial informatics (01-08-2007)“…We focus on the data models for storing the data generated by radio frequency identification (RFID) transactions and architectures for processing such data. We…”
Get full text
Journal Article -
13
Attack-Specific Feature Construction to Detect Malicious TCP Flows
Published in 2024 IEEE International Conference on Cyber Security and Resilience (CSR) (02-09-2024)“…Malicious network flow detection and mitigation is a major part of network security and has been a widely researched topic for decades now. Various approaches,…”
Get full text
Conference Proceeding -
14
Towards Live Detection of Ransomware Attacks
Published in 2024 IEEE International Conference on Cyber Security and Resilience (CSR) (02-09-2024)“…Ransomware attacks continue to be a top risk for organizations today. Recent studies focused on the behavioral and runtime analysis of ransomware. However,…”
Get full text
Conference Proceeding -
15
Mitigating malicious control packet floods in ad hoc networks
Published in IEEE Wireless Communications and Networking Conference, 2005 (2005)“…We investigate the impact of hacker attacks by malicious nodes on the overall network performance. These malicious nodes mimic normal nodes in all aspects,…”
Get full text
Conference Proceeding -
16
On the impact of noise sensitivity on performance in 802.11 based ad hoc networks
Published in 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577) (2004)“…The IEEE 802.11 Medium Access Control (MAC) layer plays a crucial role on the overall throughput obtained in a mobile ad hoc network. We show that the virtual…”
Get full text
Conference Proceeding -
17
A comparison of adaptive wormhole routing algorithms
Published in International Symposium on Computer Architecture: Proceedings of the 20th annual international symposium on Computer architecture; 16-19 May 1993 (01-05-1993)“…Improvement of message latency and network utilization in torus interconnection networks by increasing adaptivity in wormhole routing algorithms is studied. A…”
Get full text
Conference Proceeding -
18
Performance Prediction of Parallel Applications Based on Small-Scale Executions
Published in 2016 IEEE 23rd International Conference on High Performance Computing (HiPC) (01-12-2016)“…Predicting the execution time of parallel applications in High Performance Computing (HPC) clusters has served different objectives, including helping…”
Get full text
Conference Proceeding -
19
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
Published in 2007 IEEE International Conference on Communications (01-06-2007)“…Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band…”
Get full text
Conference Proceeding -
20
Performance Prediction of Parallel CPU and GPU Applications Using Fractals
Published in 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (01-06-2018)“…Accurate estimates of parallel application runtimes can be used for better job scheduling and utilization of high performance computing resources, application…”
Get full text
Conference Proceeding