C
Chittaranjan Hota
Researcher at Birla Institute of Technology and Science
Publications - 116
Citations - 966
Chittaranjan Hota is an academic researcher from Birla Institute of Technology and Science. The author has contributed to research in topics: Computer science & Overlay network. The author has an hindex of 13, co-authored 105 publications receiving 830 citations.
Papers
More filters
Proceedings ArticleDOI
Energy efficient IoT framework for Smart Buildings
TL;DR: This work provides information on setting up and operating a comprehensive apparatus to accomplish the implementation of analytics and corrective feedback processes in the event of anomalous data that needs addressing, and suggests the extent of wastage of resources.
Journal ArticleDOI
Game-theoretic strategies for IDS deployment in peer-to-peer networks
Pratik Narang,Chittaranjan Hota +1 more
TL;DR: This work explores the problem of strategically positioning IDSs in a P2P network with a randomized, game-theoretic approach and distributes the responsibility of running the IDs between the peers in a randomized fashion and minimizes the probability of a successful attack.
Proceedings ArticleDOI
Efficient cooperative spectrum sensing in Cognitive Radio using coalitional game model
V. Balaji,Chittaranjan Hota +1 more
TL;DR: This paper investigates the optimality of cooperation scheme using coalitional game theory for CSS in cognitive radio, highlighting techniques for identifying steady states, convergence and steady state optimality.
Posted Content
Adaptive Lookup for Unstructured Peer-to-Peer Overlays
TL;DR: This work proposes a novel Quality of Service enabled lookup for unstructured peer-to-peer overlays that will allow the userpsilas query to traverse only those overlay links which satisfy the given constraints.
Journal ArticleDOI
Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques
TL;DR: Several analyses proved that J48 decision tree algorithm and the PART algorithm are best suited for detection of SSH compromises, and it was inferred that inter-arrival time between packets and the size of a packet payload play a significant role in detecting compromises.