PermPair: Android Malware Detection Using Permission Pairs A Arora, SK Peddoju, M Conti IEEE Transactions on Information Forensics and Security 15, 1968-1982, 2019 | 165 | 2019 |
Malware detection using network traffic analysis in android based mobile devices A Arora, S Garg, SK Peddoju 2014 Eighth International Conference on Next Generation Mobile Apps …, 2014 | 159 | 2014 |
HIDS: A host based intrusion detection system for cloud computing environment P Deshpande, SC Sharma, SK Peddoju, S Junaid International Journal of System Assurance Engineering and Management 9, 567-576, 2018 | 156 | 2018 |
Energy efficient computing-green cloud computing A Jain, M Mishra, SK Peddoju, N Jain 2013 international conference on energy efficient technologies for …, 2013 | 144 | 2013 |
Container-based microservice architecture for cloud applications V Singh, SK Peddoju 2017 International Conference on Computing, Communication and Automation …, 2017 | 138 | 2017 |
Multi-resolution mobile vision system for plant leaf disease diagnosis S Prasad, SK Peddoju, D Ghosh Signal, image and video processing 10 (2), 379-388, 2016 | 124 | 2016 |
Predictive and prescriptive analytics in big data era P Deshpande Computing, Communication and Signal Processing: Proceedings of ICCASP 2018 …, 2019 | 83 | 2019 |
AgroMobile: a cloud-based framework for agriculturists on mobile platform S Prasad, SK Peddoju, D Ghosh International Journal of advanced science and technology 59, 41-52, 2013 | 83 | 2013 |
Minimizing network traffic features for android mobile malware detection A Arora, SK Peddoju Proceedings of the 18th international conference on distributed computing …, 2017 | 82 | 2017 |
A dynamic optimization algorithm for task scheduling in cloud environment M Choudhary, SK Peddoju International Journal of Engineering Research and Applications (IJERA) 2 (3 …, 2012 | 77 | 2012 |
Classification and comparison of NoSQL big data models S Sharma, US Tim, S Gadia, J Wong, R Shandilya, SK Peddoju International Journal of Big Data Intelligence 2 (3), 201-221, 2015 | 72 | 2015 |
Energy efficient mobile vision system for plant leaf disease identification S Prasad, SK Peddoju, D Ghosh 2014 IEEE Wireless Communications and Networking Conference (WCNC), 3314-3319, 2014 | 64 | 2014 |
Security and service assurance issues in Cloud environment P Deshpande, SC Sharma, SK Peddoju, A Abraham International Journal of System Assurance Engineering and Management 9, 194-207, 2018 | 63 | 2018 |
NTPDroid: a hybrid android malware detector using network traffic and system permissions A Arora, SK Peddoju 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 62 | 2018 |
Study of internet-of-things messaging protocols used for exchanging data with external sources A Chaudhary, SK Peddoju, K Kadarla 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems …, 2017 | 60 | 2017 |
Network-based detection of Android malicious apps S Garg, SK Peddoju, AK Sarje International Journal of Information Security 16, 385-400, 2017 | 58 | 2017 |
Handoff strategy for improving energy efficiency and cloud service availability for mobile devices A Ravi, SK Peddoju Wireless Personal Communications 81, 101-132, 2015 | 51 | 2015 |
Hybrid Android malware detection by combining supervised and unsupervised learning A Arora, SK Peddoju, V Chouhan, A Chaudhary Proceedings of the 24th Annual International Conference on Mobile Computing …, 2018 | 49 | 2018 |
Detection of insider attacks in cloud based e-healthcare environment G Garkoti, SK Peddoju, R Balasubramanian 2014 International Conference on Information Technology, 195-200, 2014 | 48 | 2014 |
Behaviour analysis of machine learning algorithms for detecting P2P botnets S Garg, AK Singh, AK Sarje, SK Peddoju 2013 15th international conference on advanced computing technologies (icact …, 2013 | 47 | 2013 |