Sateesh Kumar Peddoju
Cited by
Cited by
Malware detection using network traffic analysis in android based mobile devices
A Arora, S Garg, SK Peddoju
2014 Eighth International Conference on Next Generation Mobile Apps …, 2014
Energy efficient computing-green cloud computing
A Jain, M Mishra, SK Peddoju, N Jain
2013 International Conference on Energy Efficient Technologies for …, 2013
HIDS: A host based intrusion detection system for cloud computing environment
P Deshpande, SC Sharma, SK Peddoju, S Junaid
International Journal of System Assurance Engineering and Management 9 (3 …, 2018
A dynamic optimization algorithm for task scheduling in cloud environment
M Choudhary, SK Peddoju
International Journal of Engineering Research and Applications (IJERA) 2 (3 …, 2012
Classification and comparison of NoSQL big data models
S Sharma, US Tim, S Gadia, J Wong, R Shandilya, SK Peddoju
International Journal of Big Data Intelligence 2 (3), 201-221, 2015
Multi-resolution mobile vision system for plant leaf disease diagnosis
S Prasad, SK Peddoju, D Ghosh
Signal, Image and Video Processing 10 (2), 379-388, 2016
AgroMobile: a cloud-based framework for agriculturists on mobile platform
S Prasad, SK Peddoju, D Ghosh
International Journal of advanced science and technology 59, 41-52, 2013
Container-based microservice architecture for cloud applications
V Singh, SK Peddoju
2017 International Conference on Computing, Communication and Automation …, 2017
Handoff strategy for improving energy efficiency and cloud service availability for mobile devices
A Ravi, SK Peddoju
Wireless Personal Communications 81 (1), 101-132, 2015
Minimizing network traffic features for android mobile malware detection
A Arora, SK Peddoju
Proceedings of the 18th International Conference on Distributed Computing …, 2017
Energy efficient mobile vision system for plant leaf disease identification
S Prasad, SK Peddoju, D Ghosh
2014 IEEE Wireless Communications and Networking Conference (WCNC), 3314-3319, 2014
Detection of insider attacks in cloud based e-healthcare environment
G Garkoti, SK Peddoju, R Balasubramanian
2014 International Conference on Information Technology, 195-200, 2014
Behaviour analysis of machine learning algorithms for detecting P2P botnets
S Garg, AK Singh, AK Sarje, SK Peddoju
2013 15th international conference on advanced computing technologies (icact …, 2013
Response time based load balancing in cloud computing
A Sharma, SK Peddoju
2014 International Conference on Control, Instrumentation, Communication and …, 2014
Security and service assurance issues in Cloud environment
P Deshpande, SC Sharma, SK Peddoju, A Abraham
International Journal of System Assurance Engineering and Management 9 (1 …, 2018
Network-based detection of Android malicious apps
S Garg, SK Peddoju, AK Sarje
International Journal of Information Security 16 (4), 385-400, 2017
PermPair: Android Malware Detection Using Permission Pairs
A Arora, SK Peddoju, M Conti
IEEE Transactions on Information Forensics and Security 15, 1968-1982, 2019
Packet monitoring approach to prevent DDoS attack in cloud computing
V Chouhan, SK Peddoju
Int. J. Comput. Sci. Electr. Eng.(IJCSEE) 1 (2), 2315-4209, 2013
Recent trust models in grid
PS Kumar, PS Kumar, S Ramachandram
An efficient low vision plant leaf shape identification system for smart phones
S Prasad, PS Kumar, D Ghosh
Multimedia Tools and Applications 76 (5), 6915-6939, 2017
The system can't perform the operation now. Try again later.
Articles 1–20