User profiles for Sateesh Kumar Peddoju

Sateesh Kumar Peddoju

IIT Roorkee
Verified email at cs.iitr.ac.in
Cited by 2579

HIDS: A host based intrusion detection system for cloud computing environment

P Deshpande, SC Sharma, SK Peddoju… - International Journal of …, 2018 - Springer
The paper reports a host based intrusion detection model for Cloud computing environment
along with its implementation and analysis. This model alerts the Cloud user against the …

Energy efficient computing-green cloud computing

A Jain, M Mishra, SK Peddoju… - … conference on energy …, 2013 - ieeexplore.ieee.org
Moving towards Cloud Computing, high performance computing usage of huge data center (DC)
and huge cluster is increasing day by day and energy consumption by these DC and …

[PDF][PDF] A dynamic optimization algorithm for task scheduling in cloud environment

M Choudhary, SK Peddoju - International Journal of Engineering …, 2012 - Citeseer
Cloud computing has emerged as a popular computing model to support on demand services.
It is a style of computing where massively scalable resources are delivered as a service to …

A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network

K Bhanot, SK Peddoju, T Bhardwaj - International Journal of System …, 2018 - Springer
Electrocardiogram (ECG) data is one of the most important physiological parameter for
detecting heartbeat, emotions and stress levels of patients. The problem is to develop a model …

[PDF][PDF] Packet monitoring approach to prevent DDoS attack in cloud computing

V Chouhan, SK Peddoju - About ICCC-2012, 2012 - core.ac.uk
In cloud environment, cloud servers providing requested cloud services, sometimes may
crash after receiving huge amount of requests. This is exactly what happens in a denial of …

Android malware detection techniques in traditional and cloud computing platforms: a state-of-the-art survey

…, P Mishra, C Negi, SK Peddoju - International Journal of …, 2021 - igi-global.com
In the mobile world, Android is the most popular choice of manufacturers and users alike.
Meanwhile, a number of malicious applications abbreviated as malapps or malware have …

Cloud and traditional ERP systems in small and medium enterprises

I Saini, A Khanna, SK Peddoju - 2014 International Conference …, 2014 - ieeexplore.ieee.org
Cloud computing is the new buzz word today attracting high interest among various domains
like business enterprises, particularly in Small and Medium Enterprises. As it is a pay-per-…

Improved detection of P2P botnets through network behavior analysis

S Garg, AK Sarje, SK Peddoju - Recent Trends in Computer Networks and …, 2014 - Springer
Botnets are becoming powerful threats on the Internet because they launch targeted attacks
towards organizations and the individuals. P2P botnets are resilient and more difficult to …

Cloud based wireless infrastructure for health monitoring

…, SK Peddoju, SK Peddoju - Virtual and Mobile …, 2020 - igi-global.com
The wireless infrastructure based devices can collect data for long period of time even with
a tiny power source as they perform specific function of collection of health related data and …

PacDroid: lightweight android malware detection using permissions and intent features

A Kadir, SK Peddoju - Multimedia Tools and Applications, 2024 - Springer
The popularity of the Android platform and the widespread use of mobile applications have
made them prime targets for cyber threats. Conventional single-feature-based detection …