Search Results - "Hota, Chittaranjan"
-
1
UnderTracker: Generating Robust Binaries Using Execution Flow Traces
Published in Information systems frontiers (01-08-2021)“…Programs are developed in a manner so that they execute and fulfill their intended purpose. In doing so, programmers trust the language to help them achieve…”
Get full text
Journal Article -
2
OSGAN: One-shot distributed learning using generative adversarial networks
Published in The Journal of supercomputing (01-08-2023)“…With the advancements in mobile technology, a large amount of data is generated by end devices, which has created a renewed interest in developing new AI-based…”
Get full text
Journal Article -
3
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
Published in Future internet (01-04-2023)“…The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are…”
Get full text
Journal Article -
4
Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests
Published in Information sciences (10-09-2014)“…•Developed a test-bed for real-time P2P Botnet detection.•Built scalable implementation of quasi-real-time intrusion detection system.•Used Big Data Analytics…”
Get full text
Journal Article -
5
Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing
Published in Computer communications (15-03-2023)“…Network Slicing (NS) is fast evolving as a prominent enabler for providing tailored services in the Fifth Generation of cellular networks (5G). Network Slices…”
Get full text
Journal Article -
6
Secure peer-to-peer learning using feature embeddings
Published in Cluster computing (01-06-2024)“…With more personal devices being connected to the internet, individuals are becoming increasingly concerned about privacy. Therefore, it is important to…”
Get full text
Journal Article -
7
Profile-guided code identification and hardening using return oriented programming
Published in Journal of information security and applications (01-10-2019)“…Protecting code from a security breach needs a systematic defense. The most promising solution in this task is to protect the control flow of the code. A…”
Get full text
Journal Article -
8
Game-theoretic strategies for IDS deployment in peer-to-peer networks
Published in Information systems frontiers (01-10-2015)“…This work studies the problem of optimal positioning of Intrusion Detection Systems (IDSs) in a Peer-to-Peer (P2P) environment involving a number of peers and…”
Get full text
Journal Article -
9
Detection of stealthy single-source SSH password guessing attacks
Published in Evolving systems (01-02-2022)“…Many of the network services (protocols like SSH, Telnet, HTTP, and FTP) implement password-based authentication for accessing system resources. Malicious…”
Get full text
Journal Article -
10
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets
Published in Computer communications (15-12-2016)“…•A novel approach for P2P botnet detection using ‘signal-processing’ approaches of Fourier transforms and information entropy.•Detection of stealthy P2P…”
Get full text
Journal Article -
11
Code integrity verification using cache memory monitoring
Published in Information security journal. (04-03-2022)“…This paper addresses the challenges of building a secure software system to prevent Man-at-the-End attacks. Ensuring the security of systems is challenging due…”
Get full text
Journal Article -
12
STEEP: speed and time-based energy efficient neighbor discovery in opportunistic networks
Published in Wireless networks (01-08-2019)“…Neighbor discovery in sparse opportunistic networks can require significant energy. Generally, discovery occurs by sending and waiting for probe messages and…”
Get full text
Journal Article -
13
Interaction of systemic drugs causing ocular toxicity with organic cation transporter: an artificial intelligence prediction
Published in Journal of biomolecular structure & dynamics (02-07-2024)“…Chronic disease patients (cancer, arthritis, cardiovascular diseases) undergo long-term systemic drug treatment. Membrane transporters in ocular barriers could…”
Get full text
Journal Article -
14
Swap-Based Load Balancing for Fairness in Radio Access Networks
Published in IEEE wireless communications letters (01-11-2021)“…5G micro infrastructure comprising micro and picocells would play a pivotal role in densifying the network to provide ample coverage. However, a…”
Get full text
Journal Article -
15
Advances in secure knowledge management in the big data era
Published in Information systems frontiers (01-10-2015)“…Issue Title: Advances in secure knowledge management in the big data era Information is increasingly becoming important in our daily lives. We have become…”
Get full text
Journal Article -
16
An efficient approach to kNN algorithm for IoT devices
Published in 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS) (04-01-2022)“…K nearest neighbor is a popular method for classification, but it suffers from high runtime and space complexity. Various advancements have been made to…”
Get full text
Conference Proceeding -
17
Communication Efficient Distributed Learning Using Variational Auto Encoders
Published in 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS) (04-01-2022)“…Advancements in mobile technology led to the manufacturing of smart devices that have started generating massive amounts of data. This triggered a new interest…”
Get full text
Conference Proceeding -
18
PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations
Published in 2014 IEEE Security and Privacy Workshops (01-05-2014)“…The decentralized nature of Peer-to-Peer (P2P) botnets makes them difficult to detect. Their distributed nature also exhibits resilience against take-down…”
Get full text
Conference Proceeding -
19
Quality of Service Driven Resource Allocation in Network Slicing
Published in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (01-05-2020)“…Network slices are counted as key technology enablers to provide tailored services and isolation for different Fifth Generation (5G) cellular network…”
Get full text
Conference Proceeding -
20
UAV Path Planning Using Informed Search Techniques on Custom Flight Controller
Published in 2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT) (04-07-2024)“…Autonomous drones are pivotal in various applications like surveillance, delivery of goods, emergency rescue etc., emphasizing the need for seamless…”
Get full text
Conference Proceeding