- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Distributed and Parallel Computing Systems
- Smart Agriculture and AI
- Parallel Computing and Optimization Techniques
- Blockchain Technology Applications and Security
- Advanced Data Storage Technologies
- Energy Efficient Wireless Sensor Networks
- Cryptography and Data Security
- IoT Networks and Protocols
- Software Testing and Debugging Techniques
- Caching and Content Delivery
- Software System Performance and Reliability
- Leaf Properties and Growth Measurement
- User Authentication and Security Systems
- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Spam and Phishing Detection
- Spectroscopy and Chemometric Analyses
- Augmented Reality Applications
- Scientific Computing and Data Management
Indian Institute of Technology Roorkee
2015-2024
The Android smartphones are highly prone to spreading the malware due intrinsic feebleness that permits an application access internal resources when user grants permissions knowingly or unknowingly. Hence, researchers have focused on identifying conspicuous lead detection. Most of these permissions, common and normal applications present themselves in different patterns contribute attacks. Therefore, it is essential find significant combinations can be dangerous. this paper aims identify...
Smart phones, particularly Android based, have attracted the users community for their feature rich apps to use with various applications like chatting, browsing, mailing, image editing and video processing. However popularity of these devices malicious attackers as well. Statistics shown that based smart phones are more vulnerable malwares compared other phones. None existing malware detection techniques focused on network traffic features activity. To best our knowledge, almost no work is...
Moving towards Cloud Computing, high performance computing usage of huge data center (DC) and cluster is increasing day by energy consumption these DC dissipation in environment also rising day. The large amount CO <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> has generated the necessity Green (saving recycling it reusing over a period time minimizing wastage terms resources). More processor chips generates more heat, heat requires...
Cloud Environment allows enterprises to scale their application on demand. Microservice design is a new paradigm for cloud development which gaining popularity due its granular approach and loosely coupled services unlike monolithic with single code base. Applications developed using microservice results in better scaling gives extended flexibility the developers minimum cost. In this paper, first, different challenges deployment continuous integration of microservices are analyzed. To...
Two kinds of techniques, namely Static and Dynamic Analysis, have been proposed in the literature to detect Android malware. Permissions Network Traffic are widely used detection attributes. Malicious apps download malware at run-time evade static permissions based while they can be detected by network traffic. The that do not require connectivity traffic which analysis. Therefore, we believe combining system will enhance rate. Hence, this work, combine both attributes propose a hybrid model...
Today, use of mobile devices is very common by everyone, including the farmers. Introduction Information and Communication Technologies (ICT) has seen a keen role in daily life Earlier, farmers used to depend on clouds for rains were looking into Cloud Computing (CC) their solutions towards cultivation better crops modern agricultural world. The conventional methods farmers, particularly India, are slow unreliable. damaged field itself due disease attacks lack information resources. This...
Smartphones have emerged as one of the dominant computing platforms in today's era where Android has been first choice for users well app developers due to its open source nature and feature rich apps. Such popularity come hand-in-hand with an equivalent increase malware targeting Android. Since mobile devices allow easy-to-use, touch-sensitive, anywhere-anytime access resources, mobile-specific applications like SMS, MMS, Bluetooth, e-mail, other services may pose serious threats lead...
In the data science age, decision-making processes are largely dependent. Though, concept of big is in midst evolution with great research and business opportunities, challenges enormous growing equally too. This motivates various scientific disciplines to conglomerate their efforts for deep exploration all dimensions procure evolutionary outcomes. The existing models unable illuminate full potential data. computation capacity falls short increasingly expanded storage capacity. fast-paced...
Close monitoring, proper control and management of plant diseases are essential in the efficient cultivation crops. This paper presents a scheme that uses mobile phones for real-time on-field imaging diseased plants followed by disease diagnosis via analysis visual phenotypes. A threshold based offloading is employed judicious sharing computational load between device central server at pathology laboratory, thereby offering trade-off power consumption transmission cost. The part processing...
Internet-of-Things (IoT) is emerging as one of the popular technologies influencing every aspect human life. The IoT devices equipped with sensors are changing domain world to become smarter. In particular, majorly benifited service sectors agriculture, industries, healthcare, control & automation, retail logistics, and power energy. data generated in these areas massive requiring bigger storage stronger compute. On other hand, limited processing capabilities can not store process sensed...
Permissions and the network traffic features are widely used attributes in static dynamic Android malware detection respectively. However, permissions cannot detect stealthy with update attacks capability, while samples without connectivity. Hence, there is a need to build hybrid model combining both these attributes. In this work, we propose detector that examines malicious samples. The proposed approach based on combination of Supervised Learning (KNN Algorithm) Unsupervised (K-Medoids...
In recent years, Cloud computing has been receiving great attention from various business and research organizations as it promises to provide large storage facilities highly managed remote services. Due its characteristics like on-demand self service, rapid elasticity, ubiquitous network access resource pooling, shows high potential for providing e-Healthcare solutions. It can offer financial functional benefits which includes flexibility the rapidly growing healthcare data, reduced cost,...
Botnets have emerged as a powerful threat on the Internet it is being used to carry out cybercrimes. In this paper, we analysed some machine learning techniques detect peer (P2P) botnets. As detection of P2P botnets widely unexplored area, focused it. We experimented with different (ML) algorithms compare their ability classify botnet traffic from normal by selecting distinguishing features network traffic. Experiments are performed dataset containing traces various Results and tradeoffs...
Rapid growth of the users on Cloud services combined with in number provided to user increases load servers multifold. This problem becomes more critical when some are under loaded and overloaded. necessitates an effective Load Balancing technique that can serve purpose not only properly utilizing but also reducing negative impact services. The existing techniques suffer from various issues like (i) balancing after a server has been overloaded, (ii) constant querying about availability its...