Search Results - "Hota, Chittaranjan"

Refine Results
  1. 1

    UnderTracker: Generating Robust Binaries Using Execution Flow Traces by Shrivastava, Rajesh Kumar, Hota, Chittaranjan

    Published in Information systems frontiers (01-08-2021)
    “…Programs are developed in a manner so that they execute and fulfill their intended purpose. In doing so, programmers trust the language to help them achieve…”
    Get full text
    Journal Article
  2. 2

    OSGAN: One-shot distributed learning using generative adversarial networks by Kasturi, Anirudh, Hota, Chittaranjan

    Published in The Journal of supercomputing (01-08-2023)
    “…With the advancements in mobile technology, a large amount of data is generated by end devices, which has created a renewed interest in developing new AI-based…”
    Get full text
    Journal Article
  3. 3

    A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure by Otta, Soumya Prakash, Panda, Subhrakanta, Gupta, Maanak, Hota, Chittaranjan

    Published in Future internet (01-04-2023)
    “…The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are…”
    Get full text
    Journal Article
  4. 4

    Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests by Singh, Kamaldeep, Guntuku, Sharath Chandra, Thakur, Abhishek, Hota, Chittaranjan

    Published in Information sciences (10-09-2014)
    “…•Developed a test-bed for real-time P2P Botnet detection.•Built scalable implementation of quasi-real-time intrusion detection system.•Used Big Data Analytics…”
    Get full text
    Journal Article
  5. 5

    Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing by S., Saibharath, Mishra, Sudeepta, Hota, Chittaranjan

    Published in Computer communications (15-03-2023)
    “…Network Slicing (NS) is fast evolving as a prominent enabler for providing tailored services in the Fifth Generation of cellular networks (5G). Network Slices…”
    Get full text
    Journal Article
  6. 6

    Secure peer-to-peer learning using feature embeddings by Kasturi, Anirudh, Agrawal, Akshat, Hota, Chittaranjan

    Published in Cluster computing (01-06-2024)
    “…With more personal devices being connected to the internet, individuals are becoming increasingly concerned about privacy. Therefore, it is important to…”
    Get full text
    Journal Article
  7. 7

    Profile-guided code identification and hardening using return oriented programming by Shrivastava, Rajesh Kumar, Hota, Chittaranjan

    “…Protecting code from a security breach needs a systematic defense. The most promising solution in this task is to protect the control flow of the code. A…”
    Get full text
    Journal Article
  8. 8

    Game-theoretic strategies for IDS deployment in peer-to-peer networks by Narang, Pratik, Hota, Chittaranjan

    Published in Information systems frontiers (01-10-2015)
    “…This work studies the problem of optimal positioning of Intrusion Detection Systems (IDSs) in a Peer-to-Peer (P2P) environment involving a number of peers and…”
    Get full text
    Journal Article
  9. 9

    Detection of stealthy single-source SSH password guessing attacks by Sadasivam, Gokul Kannan, Hota, Chittaranjan, Bhojan, Anand

    Published in Evolving systems (01-02-2022)
    “…Many of the network services (protocols like SSH, Telnet, HTTP, and FTP) implement password-based authentication for accessing system resources. Malicious…”
    Get full text
    Journal Article
  10. 10

    Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets by Narang, Pratik, Hota, Chittaranjan, Sencar, Husrev Taha

    Published in Computer communications (15-12-2016)
    “…•A novel approach for P2P botnet detection using ‘signal-processing’ approaches of Fourier transforms and information entropy.•Detection of stealthy P2P…”
    Get full text
    Journal Article
  11. 11

    Code integrity verification using cache memory monitoring by Shrivastava, Rajesh Kumar, Natu, Varun, Hota, Chittaranjan

    Published in Information security journal. (04-03-2022)
    “…This paper addresses the challenges of building a secure software system to prevent Man-at-the-End attacks. Ensuring the security of systems is challenging due…”
    Get full text
    Journal Article
  12. 12

    STEEP: speed and time-based energy efficient neighbor discovery in opportunistic networks by Thakur, Abhishek, Sathiyanarayanan, R., Hota, Chittaranjan

    Published in Wireless networks (01-08-2019)
    “…Neighbor discovery in sparse opportunistic networks can require significant energy. Generally, discovery occurs by sending and waiting for probe messages and…”
    Get full text
    Journal Article
  13. 13

    Interaction of systemic drugs causing ocular toxicity with organic cation transporter: an artificial intelligence prediction by Malani, Manisha, Hiremath, Manthan S., Sharma, Surbhi, Jhunjhunwala, Manisha, Gayen, Shovanlal, Hota, Chittaranjan, Nirmal, Jayabalan

    “…Chronic disease patients (cancer, arthritis, cardiovascular diseases) undergo long-term systemic drug treatment. Membrane transporters in ocular barriers could…”
    Get full text
    Journal Article
  14. 14

    Swap-Based Load Balancing for Fairness in Radio Access Networks by Saibharath, S, Mishra, Sudeepta, Hota, Chittaranjan

    Published in IEEE wireless communications letters (01-11-2021)
    “…5G micro infrastructure comprising micro and picocells would play a pivotal role in densifying the network to provide ample coverage. However, a…”
    Get full text
    Journal Article
  15. 15

    Advances in secure knowledge management in the big data era by Hota, Chittaranjan, Upadhyaya, Shambhu, Al-Karaki, Jamal Nazzal

    Published in Information systems frontiers (01-10-2015)
    “…Issue Title: Advances in secure knowledge management in the big data era Information is increasingly becoming important in our daily lives. We have become…”
    Get full text
    Journal Article
  16. 16

    An efficient approach to kNN algorithm for IoT devices by Gawri, Bhavesh, Kasturi, Anirudh, Neti, Lalita Bhanu Murthy, Hota, Chittaranjan

    “…K nearest neighbor is a popular method for classification, but it suffers from high runtime and space complexity. Various advancements have been made to…”
    Get full text
    Conference Proceeding
  17. 17

    Communication Efficient Distributed Learning Using Variational Auto Encoders by Kasturi, Anirudh, Vishwamithra, S, Hota, Chittaranjan

    “…Advancements in mobile technology led to the manufacturing of smart devices that have started generating massive amounts of data. This triggered a new interest…”
    Get full text
    Conference Proceeding
  18. 18

    PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations by Narang, Pratik, Ray, Subhajit, Hota, Chittaranjan, Venkatakrishnan, Venkat

    Published in 2014 IEEE Security and Privacy Workshops (01-05-2014)
    “…The decentralized nature of Peer-to-Peer (P2P) botnets makes them difficult to detect. Their distributed nature also exhibits resilience against take-down…”
    Get full text
    Conference Proceeding
  19. 19

    Quality of Service Driven Resource Allocation in Network Slicing by Saibharath, S., Mishra, Sudeepta, Hota, Chittaranjan

    “…Network slices are counted as key technology enablers to provide tailored services and isolation for different Fifth Generation (5G) cellular network…”
    Get full text
    Conference Proceeding
  20. 20

    UAV Path Planning Using Informed Search Techniques on Custom Flight Controller by Shashidhar, Kota, Hota, Chittaranjan

    “…Autonomous drones are pivotal in various applications like surveillance, delivery of goods, emergency rescue etc., emphasizing the need for seamless…”
    Get full text
    Conference Proceeding