Big data analytics framework for peer-to-peer botnet detection using random forests K Singh, SC Guntuku, A Thakur, C Hota Information Sciences 278, 488-497, 2014 | 339 | 2014 |
Capability-based cryptographic data access control in cloud computing C Hota, S Sanka, M Rajarajan, SK Nair International Journal of Advanced Networking and Applications 3 (3), 1152-1161, 2011 | 117 | 2011 |
Secure data access in cloud computing S Sanka, C Hota, M Rajarajan 2010 IEEE 4th International Conference on Internet Multimedia Services …, 2010 | 114 | 2010 |
Peershark: detecting peer-to-peer botnets by tracking conversations P Narang, S Ray, C Hota, V Venkatakrishnan 2014 IEEE Security and Privacy Workshops, 108-115, 2014 | 79 | 2014 |
Attack detection and forensics using honeypot in IoT environment RK Shrivastava, B Bashir, C Hota Distributed Computing and Internet Technology: 15th International Conference …, 2019 | 54 | 2019 |
Advances in secure knowledge management in the big data era C Hota, S Upadhyaya, JN Al-Karaki Information Systems Frontiers 17, 983-986, 2015 | 46 | 2015 |
Dynamic task-scheduling in grid computing using prioritized round robin algorithm S Bansal, B Kothari, C Hota International Journal of Computer Science Issues (IJCSI) 8 (2), 472, 2011 | 41 | 2011 |
Fusion learning: A one shot federated learning A Kasturi, AR Ellore, C Hota Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020 | 39 | 2020 |
Feature selection for detection of peer-to-peer botnet traffic P Narang, JM Reddy, C Hota Proceedings of the 6th ACM India computing convention, 1-9, 2013 | 37 | 2013 |
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification P Narang, C Hota, VN Venkatakrishnan EURASIP Journal on Information security 2014, 1-12, 2014 | 33 | 2014 |
Machine-learning approaches for P2P botnet detection using signal-processing techniques P Narang, V Khurana, C Hota Proceedings of the 8th ACM International Conference on Distributed Event …, 2014 | 29 | 2014 |
Cooperative spectrum sensing in cognitive radios using perceptron learning for IEEE 802.22 WRAN V Balaji, P Kabra, P Saieesh, C Hota, G Raghurama Procedia Computer Science 54, 14-23, 2015 | 26 | 2015 |
Attack identification framework for IoT devices JMR Danda, C Hota Information Systems Design and Intelligent Applications: Proceedings of …, 2016 | 24 | 2016 |
Scalable honeypot architecture for identifying malicious network activities GK Sadasivam, C Hota 2015 international conference on emerging information technology and …, 2015 | 23 | 2015 |
Classification of SSH attacks using machine learning algorithms GK Sadasivam, C Hota, B Anand 2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016 | 22 | 2016 |
Real-time peer-to-peer botnet detection framework based on bayesian regularized neural network SC Guntuku, P Narang, C Hota arXiv preprint arXiv:1307.7464, 2013 | 22 | 2013 |
Honeynet data analysis and distributed SSH brute-force attacks GK Sadasivam, C Hota, B Anand Towards Extensible and Adaptable Methods in Computing, 107-118, 2018 | 20 | 2018 |
A novel permission-based reliable distributed mutual exclusion algorithm for manets M Parameswaran, C Hota 2010 Seventh International Conference on Wireless and Optical Communications …, 2010 | 20 | 2010 |
Efficient refinery scheduling heuristic in heterogeneous computing systems S Bansal, C Hota Journal of Advances in Information Technology 2 (3), 159-164, 2011 | 19 | 2011 |
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets P Narang, C Hota, HT Sencar Computer Communications 96, 29-42, 2016 | 18 | 2016 |