User profiles for Sateesh Kumar Peddoju
![]() | Sateesh Kumar PeddojuIIT Roorkee Verified email at cs.iitr.ac.in Cited by 2579 |
HIDS: A host based intrusion detection system for cloud computing environment
P Deshpande, SC Sharma, SK Peddoju… - International Journal of …, 2018 - Springer
The paper reports a host based intrusion detection model for Cloud computing environment
along with its implementation and analysis. This model alerts the Cloud user against the …
along with its implementation and analysis. This model alerts the Cloud user against the …
Energy efficient computing-green cloud computing
A Jain, M Mishra, SK Peddoju… - … conference on energy …, 2013 - ieeexplore.ieee.org
Moving towards Cloud Computing, high performance computing usage of huge data center (DC)
and huge cluster is increasing day by day and energy consumption by these DC and …
and huge cluster is increasing day by day and energy consumption by these DC and …
[PDF][PDF] A dynamic optimization algorithm for task scheduling in cloud environment
M Choudhary, SK Peddoju - International Journal of Engineering …, 2012 - Citeseer
Cloud computing has emerged as a popular computing model to support on demand services.
It is a style of computing where massively scalable resources are delivered as a service to …
It is a style of computing where massively scalable resources are delivered as a service to …
A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network
Electrocardiogram (ECG) data is one of the most important physiological parameter for
detecting heartbeat, emotions and stress levels of patients. The problem is to develop a model …
detecting heartbeat, emotions and stress levels of patients. The problem is to develop a model …
[PDF][PDF] Packet monitoring approach to prevent DDoS attack in cloud computing
V Chouhan, SK Peddoju - About ICCC-2012, 2012 - core.ac.uk
In cloud environment, cloud servers providing requested cloud services, sometimes may
crash after receiving huge amount of requests. This is exactly what happens in a denial of …
crash after receiving huge amount of requests. This is exactly what happens in a denial of …
Android malware detection techniques in traditional and cloud computing platforms: a state-of-the-art survey
…, P Mishra, C Negi, SK Peddoju - International Journal of …, 2021 - igi-global.com
In the mobile world, Android is the most popular choice of manufacturers and users alike.
Meanwhile, a number of malicious applications abbreviated as malapps or malware have …
Meanwhile, a number of malicious applications abbreviated as malapps or malware have …
Cloud and traditional ERP systems in small and medium enterprises
I Saini, A Khanna, SK Peddoju - 2014 International Conference …, 2014 - ieeexplore.ieee.org
Cloud computing is the new buzz word today attracting high interest among various domains
like business enterprises, particularly in Small and Medium Enterprises. As it is a pay-per-…
like business enterprises, particularly in Small and Medium Enterprises. As it is a pay-per-…
Improved detection of P2P botnets through network behavior analysis
S Garg, AK Sarje, SK Peddoju - Recent Trends in Computer Networks and …, 2014 - Springer
Botnets are becoming powerful threats on the Internet because they launch targeted attacks
towards organizations and the individuals. P2P botnets are resilient and more difficult to …
towards organizations and the individuals. P2P botnets are resilient and more difficult to …
Cloud based wireless infrastructure for health monitoring
…, SK Peddoju, SK Peddoju - Virtual and Mobile …, 2020 - igi-global.com
The wireless infrastructure based devices can collect data for long period of time even with
a tiny power source as they perform specific function of collection of health related data and …
a tiny power source as they perform specific function of collection of health related data and …
PacDroid: lightweight android malware detection using permissions and intent features
A Kadir, SK Peddoju - Multimedia Tools and Applications, 2024 - Springer
The popularity of the Android platform and the widespread use of mobile applications have
made them prime targets for cyber threats. Conventional single-feature-based detection …
made them prime targets for cyber threats. Conventional single-feature-based detection …