scispace - formally typeset
C

Chittaranjan Hota

Researcher at Birla Institute of Technology and Science

Publications -  116
Citations -  966

Chittaranjan Hota is an academic researcher from Birla Institute of Technology and Science. The author has contributed to research in topics: Computer science & Overlay network. The author has an hindex of 13, co-authored 105 publications receiving 830 citations.

Papers
More filters
Proceedings ArticleDOI

Energy efficient IoT framework for Smart Buildings

TL;DR: This work provides information on setting up and operating a comprehensive apparatus to accomplish the implementation of analytics and corrective feedback processes in the event of anomalous data that needs addressing, and suggests the extent of wastage of resources.
Journal ArticleDOI

Game-theoretic strategies for IDS deployment in peer-to-peer networks

TL;DR: This work explores the problem of strategically positioning IDSs in a P2P network with a randomized, game-theoretic approach and distributes the responsibility of running the IDs between the peers in a randomized fashion and minimizes the probability of a successful attack.
Proceedings ArticleDOI

Efficient cooperative spectrum sensing in Cognitive Radio using coalitional game model

TL;DR: This paper investigates the optimality of cooperation scheme using coalitional game theory for CSS in cognitive radio, highlighting techniques for identifying steady states, convergence and steady state optimality.
Posted Content

Adaptive Lookup for Unstructured Peer-to-Peer Overlays

TL;DR: This work proposes a novel Quality of Service enabled lookup for unstructured peer-to-peer overlays that will allow the userpsilas query to traverse only those overlay links which satisfy the given constraints.
Journal ArticleDOI

Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques

TL;DR: Several analyses proved that J48 decision tree algorithm and the PART algorithm are best suited for detection of SSH compromises, and it was inferred that inter-arrival time between packets and the size of a packet payload play a significant role in detecting compromises.