Chittaranjan Hota
Chittaranjan Hota
IEEE Senior Member and Professor of Comp. Sc at BITS, Hyderabad
Verified email at - Homepage
Cited by
Cited by
Big data analytics framework for peer-to-peer botnet detection using random forests
K Singh, SC Guntuku, A Thakur, C Hota
Information Sciences 278, 488-497, 2014
Capability-based cryptographic data access control in cloud computing
C Hota, S Sanka, M Rajarajan, SK Nair
International Journal of Advanced Networking and Applications 3 (3), 1152-1161, 2011
Secure data access in cloud computing
S Sanka, C Hota, M Rajarajan
2010 IEEE 4th International Conference on Internet Multimedia Services …, 2010
Peershark: detecting peer-to-peer botnets by tracking conversations
P Narang, S Ray, C Hota, V Venkatakrishnan
2014 IEEE Security and Privacy Workshops, 108-115, 2014
Dynamic task-scheduling in grid computing using prioritized round robin algorithm
S Bansal, B Kothari, C Hota
International Journal of Computer Science Issues (IJCSI) 8 (2), 472, 2011
Feature selection for detection of peer-to-peer botnet traffic
P Narang, JM Reddy, C Hota
Proceedings of the 6th ACM India computing convention, 1-9, 2013
Advances in secure knowledge management in the big data era
C Hota, S Upadhyaya, JN Al-Karaki
Information Systems Frontiers 17 (5), 983-986, 2015
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification
P Narang, C Hota, VN Venkatakrishnan
EURASIP Journal on Information security 2014 (1), 1-12, 2014
Machine-learning approaches for P2P botnet detection using signal-processing techniques
P Narang, V Khurana, C Hota
Proceedings of the 8th ACM International Conference on Distributed Event …, 2014
Cooperative spectrum sensing in cognitive radios using perceptron learning for ieee 802.22 wran
V Balaji, P Kabra, P Saieesh, C Hota, G Raghurama
Procedia Computer Science 54, 14-23, 2015
Real-time peer-to-peer botnet detection framework based on bayesian regularized neural network
SC Guntuku, P Narang, C Hota
arXiv preprint arXiv:1307.7464, 2013
A novel permission-based reliable distributed mutual exclusion algorithm for manets
M Parameswaran, C Hota
2010 Seventh International Conference on Wireless and Optical Communications …, 2010
Scalable honeypot architecture for identifying malicious network activities
GK Sadasivam, C Hota
2015 international conference on emerging information technology and …, 2015
Attack detection and forensics using honeypot in IoT environment
RK Shrivastava, B Bashir, C Hota
International Conference on Distributed Computing and Internet Technology …, 2019
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets
P Narang, C Hota, HT Sencar
Computer Communications 96, 29-42, 2016
Attack identification framework for IoT devices
JMR Danda, C Hota
Information Systems Design and Intelligent Applications, 505-513, 2016
P2p traffic classification using ensemble learning
JM Reddy, C Hota
Proceedings of the 5th IBM collaborative academia research exchange workshop …, 2013
Safeguarding against sybil attacks via social networks and multipath routing
C Hota, J Lindqvist, K Karvonen, A Yla-Jaaski, CKJ Mohan
2007 International Conference on Networking, Architecture, and Storage (NAS …, 2007
Arbitration-based reliable distributed mutual exclusion for mobile ad-hoc networks
M Parameswaran, C Hota
2013 11th International Symposium and Workshops on Modeling and Optimization …, 2013
Heuristic-based real-time p2p traffic identification
JM Reddy, C Hota
2015 International Conference on Emerging Information Technology and …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20