Ketan Anand

ORCID: 0000-0001-7107-8807
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Complex Network Analysis Techniques
  • Coding theory and cryptography
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Internet of Things and AI
  • Cryptography and Residue Arithmetic
  • Spam and Phishing Detection

Koneru Lakshmaiah Education Foundation
2017

KTH Royal Institute of Technology
2012

Anomaly in Online Social Network can be referred as abnormal or unexpected behavior which deviates from majority of users. Due to popularity social networking sites such Facebook, Twitter etc., malicious activities have increased recent past. detection has become an important area for researchers looked upon. This survey gives overview existing techniques, is further kept under two different types, structural based and behavioral techniques anomaly network. It also discusses major problem/s...

10.1109/icicct.2017.7975239 article EN 2017-03-01

The Mobile agents are well suited for accessing contents of distributed web based applications including internet business. Such kinds access must be secure enough enabling only authorized mobile to retrieve the from servers. This kind security is provided by several algorithms RSA digital signature and elliptic curve cryptography. main differences among past literatures lie in computational time encryption decryption keys used encrypting decrypting content. In this paper we propose a...

10.1016/j.proeng.2012.06.177 article EN Procedia Engineering 2012-01-01

Cloud computing may be described as a collection of software applications and hardware components that are used in tandem to provide users with variety cloud services response their specific needs. ensures significant position the technological business by allowing access from almost any location globe. computing's biggest concerns data privacy integrity. The cloud's distributed nature makes it challenging build unified communication system. Therefore, is crucial establish security measures...

10.1109/conit59222.2023.10205751 article EN 2023-06-23
Coming Soon ...