Sateesh K. Peddoju

ORCID: 0000-0003-0202-3196
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Distributed and Parallel Computing Systems
  • Smart Agriculture and AI
  • Parallel Computing and Optimization Techniques
  • Blockchain Technology Applications and Security
  • Advanced Data Storage Technologies
  • Energy Efficient Wireless Sensor Networks
  • Cryptography and Data Security
  • IoT Networks and Protocols
  • Software Testing and Debugging Techniques
  • Caching and Content Delivery
  • Software System Performance and Reliability
  • Leaf Properties and Growth Measurement
  • User Authentication and Security Systems
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Spam and Phishing Detection
  • Spectroscopy and Chemometric Analyses
  • Augmented Reality Applications
  • Scientific Computing and Data Management

Indian Institute of Technology Roorkee
2015-2024

The Android smartphones are highly prone to spreading the malware due intrinsic feebleness that permits an application access internal resources when user grants permissions knowingly or unknowingly. Hence, researchers have focused on identifying conspicuous lead detection. Most of these permissions, common and normal applications present themselves in different patterns contribute attacks. Therefore, it is essential find significant combinations can be dangerous. this paper aims identify...

10.1109/tifs.2019.2950134 article EN IEEE Transactions on Information Forensics and Security 2019-10-29

10.1007/s13198-014-0277-7 article EN International Journal of Systems Assurance Engineering and Management 2014-06-23

Smart phones, particularly Android based, have attracted the users community for their feature rich apps to use with various applications like chatting, browsing, mailing, image editing and video processing. However popularity of these devices malicious attackers as well. Statistics shown that based smart phones are more vulnerable malwares compared other phones. None existing malware detection techniques focused on network traffic features activity. To best our knowledge, almost no work is...

10.1109/ngmast.2014.57 article EN 2014-09-01

Moving towards Cloud Computing, high performance computing usage of huge data center (DC) and cluster is increasing day by energy consumption these DC dissipation in environment also rising day. The large amount CO <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> has generated the necessity Green (saving recycling it reusing over a period time minimizing wastage terms resources). More processor chips generates more heat, heat requires...

10.1109/iceets.2013.6533519 article EN International Conference on Energy Efficient Technologies for Sustainability 2013-04-01

Cloud Environment allows enterprises to scale their application on demand. Microservice design is a new paradigm for cloud development which gaining popularity due its granular approach and loosely coupled services unlike monolithic with single code base. Applications developed using microservice results in better scaling gives extended flexibility the developers minimum cost. In this paper, first, different challenges deployment continuous integration of microservices are analyzed. To...

10.1109/ccaa.2017.8229914 article EN 2017-05-01

Two kinds of techniques, namely Static and Dynamic Analysis, have been proposed in the literature to detect Android malware. Permissions Network Traffic are widely used detection attributes. Malicious apps download malware at run-time evade static permissions based while they can be detected by network traffic. The that do not require connectivity traffic which analysis. Therefore, we believe combining system will enhance rate. Hence, this work, combine both attributes propose a hybrid model...

10.1109/trustcom/bigdatase.2018.00115 article EN 2018-08-01

Today, use of mobile devices is very common by everyone, including the farmers. Introduction Information and Communication Technologies (ICT) has seen a keen role in daily life Earlier, farmers used to depend on clouds for rains were looking into Cloud Computing (CC) their solutions towards cultivation better crops modern agricultural world. The conventional methods farmers, particularly India, are slow unreliable. damaged field itself due disease attacks lack information resources. This...

10.14257/ijast.2013.59.04 article EN International Journal of Advanced Science and Technology 2013-10-31

Smartphones have emerged as one of the dominant computing platforms in today's era where Android has been first choice for users well app developers due to its open source nature and feature rich apps. Such popularity come hand-in-hand with an equivalent increase malware targeting Android. Since mobile devices allow easy-to-use, touch-sensitive, anywhere-anytime access resources, mobile-specific applications like SMS, MMS, Bluetooth, e-mail, other services may pose serious threats lead...

10.1145/3007748.3007763 article EN 2017-01-04

In the data science age, decision-making processes are largely dependent. Though, concept of big is in midst evolution with great research and business opportunities, challenges enormous growing equally too. This motivates various scientific disciplines to conglomerate their efforts for deep exploration all dimensions procure evolutionary outcomes. The existing models unable illuminate full potential data. computation capacity falls short increasingly expanded storage capacity. fast-paced...

10.1504/ijbdi.2015.070602 article EN International Journal of Big Data Intelligence 2015-01-01

10.1007/s13198-016-0525-0 article EN International Journal of Systems Assurance Engineering and Management 2016-08-09

Close monitoring, proper control and management of plant diseases are essential in the efficient cultivation crops. This paper presents a scheme that uses mobile phones for real-time on-field imaging diseased plants followed by disease diagnosis via analysis visual phenotypes. A threshold based offloading is employed judicious sharing computational load between device central server at pathology laboratory, thereby offering trade-off power consumption transmission cost. The part processing...

10.1109/wcnc.2014.6953083 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2014-04-01

10.1007/s10207-016-0343-z article EN International Journal of Information Security 2016-08-01

10.1109/tifs.2025.3531230 article EN IEEE Transactions on Information Forensics and Security 2025-01-01

10.1016/j.jisa.2024.103962 article EN Journal of Information Security and Applications 2025-01-21

Internet-of-Things (IoT) is emerging as one of the popular technologies influencing every aspect human life. The IoT devices equipped with sensors are changing domain world to become smarter. In particular, majorly benifited service sectors agriculture, industries, healthcare, control & automation, retail logistics, and power energy. data generated in these areas massive requiring bigger storage stronger compute. On other hand, limited processing capabilities can not store process sensed...

10.1109/mass.2017.85 article EN 2017-10-01

Permissions and the network traffic features are widely used attributes in static dynamic Android malware detection respectively. However, permissions cannot detect stealthy with update attacks capability, while samples without connectivity. Hence, there is a need to build hybrid model combining both these attributes. In this work, we propose detector that examines malicious samples. The proposed approach based on combination of Supervised Learning (KNN Algorithm) Unsupervised (K-Medoids...

10.1145/3241539.3267768 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2018-10-15

In recent years, Cloud computing has been receiving great attention from various business and research organizations as it promises to provide large storage facilities highly managed remote services. Due its characteristics like on-demand self service, rapid elasticity, ubiquitous network access resource pooling, shows high potential for providing e-Healthcare solutions. It can offer financial functional benefits which includes flexibility the rapidly growing healthcare data, reduced cost,...

10.1109/icit.2014.43 article EN International Conference on Information Technology 2014-12-01

Botnets have emerged as a powerful threat on the Internet it is being used to carry out cybercrimes. In this paper, we analysed some machine learning techniques detect peer (P2P) botnets. As detection of P2P botnets widely unexplored area, focused it. We experimented with different (ML) algorithms compare their ability classify botnet traffic from normal by selecting distinguishing features network traffic. Experiments are performed dataset containing traces various Results and tradeoffs...

10.1109/icact.2013.6710523 article EN 2013-09-01

Rapid growth of the users on Cloud services combined with in number provided to user increases load servers multifold. This problem becomes more critical when some are under loaded and overloaded. necessitates an effective Load Balancing technique that can serve purpose not only properly utilizing but also reducing negative impact services. The existing techniques suffer from various issues like (i) balancing after a server has been overloaded, (ii) constant querying about availability its...

10.1109/iccicct.2014.6993159 article EN 2014-07-01
Coming Soon ...