Chittaranjan Hota
Chittaranjan Hota
Senior Professor of Comp. Science at BITS, Hyderabad
Verified email at - Homepage
Cited by
Cited by
Big data analytics framework for peer-to-peer botnet detection using random forests
K Singh, SC Guntuku, A Thakur, C Hota
Information Sciences 278, 488-497, 2014
Capability-based cryptographic data access control in cloud computing
C Hota, S Sanka, M Rajarajan, SK Nair
International Journal of Advanced Networking and Applications 3 (3), 1152-1161, 2011
Secure data access in cloud computing
S Sanka, C Hota, M Rajarajan
2010 IEEE 4th International Conference on Internet Multimedia Services …, 2010
Peershark: detecting peer-to-peer botnets by tracking conversations
P Narang, S Ray, C Hota, V Venkatakrishnan
2014 IEEE Security and Privacy Workshops, 108-115, 2014
Attack detection and forensics using honeypot in IoT environment
RK Shrivastava, B Bashir, C Hota
Distributed Computing and Internet Technology: 15th International Conference …, 2019
Advances in secure knowledge management in the big data era
C Hota, S Upadhyaya, JN Al-Karaki
Information Systems Frontiers 17, 983-986, 2015
Dynamic task-scheduling in grid computing using prioritized round robin algorithm
S Bansal, B Kothari, C Hota
International Journal of Computer Science Issues (IJCSI) 8 (2), 472, 2011
Fusion learning: A one shot federated learning
A Kasturi, AR Ellore, C Hota
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
Feature selection for detection of peer-to-peer botnet traffic
P Narang, JM Reddy, C Hota
Proceedings of the 6th ACM India computing convention, 1-9, 2013
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification
P Narang, C Hota, VN Venkatakrishnan
EURASIP Journal on Information security 2014, 1-12, 2014
Machine-learning approaches for P2P botnet detection using signal-processing techniques
P Narang, V Khurana, C Hota
Proceedings of the 8th ACM International Conference on Distributed Event …, 2014
Cooperative spectrum sensing in cognitive radios using perceptron learning for IEEE 802.22 WRAN
V Balaji, P Kabra, P Saieesh, C Hota, G Raghurama
Procedia Computer Science 54, 14-23, 2015
Attack identification framework for IoT devices
JMR Danda, C Hota
Information Systems Design and Intelligent Applications: Proceedings of …, 2016
Scalable honeypot architecture for identifying malicious network activities
GK Sadasivam, C Hota
2015 international conference on emerging information technology and …, 2015
Real-time peer-to-peer botnet detection framework based on bayesian regularized neural network
SC Guntuku, P Narang, C Hota
arXiv preprint arXiv:1307.7464, 2013
Honeynet data analysis and distributed SSH brute-force attacks
GK Sadasivam, C Hota, B Anand
Towards Extensible and Adaptable Methods in Computing, 107-118, 2018
Classification of SSH attacks using machine learning algorithms
GK Sadasivam, C Hota, B Anand
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016
Efficient refinery scheduling heuristic in heterogeneous computing systems
S Bansal, C Hota
Journal of Advances in Information Technology 2 (3), 159-164, 2011
A novel permission-based reliable distributed mutual exclusion algorithm for manets
M Parameswaran, C Hota
2010 Seventh International Conference on Wireless and Optical Communications …, 2010
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets
P Narang, C Hota, HT Sencar
Computer Communications 96, 29-42, 2016
The system can't perform the operation now. Try again later.
Articles 1–20