Sateesh Kumar Peddoju

Orcid: 0000-0003-0202-3196

According to our database1, Sateesh Kumar Peddoju authored at least 40 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Investigating performance metrics for container-based HPC environments using x86 and OpenPOWER systems.
J. Cloud Comput., December, 2023

Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration.
J. Grid Comput., September, 2023

cHPCe: Data Locality and Memory Bandwidth Contention-aware Containerized HPC.
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023

2022
<i>dualDup</i>: A secure and reliable cloud storage framework to deduplicate the encrypted data and key.
J. Inf. Secur. Appl., 2022

IoT-Cache: Caching Transient Data at the IoT Edge.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

2021
Reliable verification of distributed encoded data fragments in the cloud.
J. Ambient Intell. Humaniz. Comput., 2021

Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey.
Int. J. Cloud Appl. Comput., 2021

Impact of Clustering Algorithms and Energy Harvesting Scheme on IoT/WSN Infrastructures.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

2020
PermPair: Android Malware Detection Using Permission Pairs.
IEEE Trans. Inf. Forensics Secur., 2020

Investigation of Optimal Data Encoding Parameters Based on User Preference for Cloud Storage.
IEEE Access, 2020

2018
HIDS: A host based intrusion detection system for cloud computing environment.
Int. J. Syst. Assur. Eng. Manag., 2018

Security and service assurance issues in Cloud environment.
Int. J. Syst. Assur. Eng. Manag., 2018

A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network.
Int. J. Syst. Assur. Eng. Manag., 2018

NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Poster: Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Mobile Computation Bursting: An application partitioning and offloading decision engine.
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018

2017
An adaptive plant leaf mobile informatics using RSSC.
Multim. Tools Appl., 2017

An efficient low vision plant leaf shape identification system for smart phones.
Multim. Tools Appl., 2017

Network-based detection of Android malicious apps.
Int. J. Inf. Sec., 2017

Performance Evaluation of Container-Based High Performance Computing Ecosystem Using OpenPOWER.
Proceedings of the High Performance Computing, 2017

Energy - Service Trade-Off Model for Mobile Cloud Computing.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Study of Internet-of-Things Messaging Protocols Used for Exchanging Data with External Sources.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Minimizing Network Traffic Features for Android Mobile Malware Detection.
Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017

2016
Multi-resolution mobile vision system for plant leaf disease diagnosis.
Signal Image Video Process., 2016

Scalable P2P bot detection system based on network data stream.
Peer-to-Peer Netw. Appl., 2016

2015
Handoff Strategy for Improving Energy Efficiency and Cloud Service Availability for Mobile Devices.
Wirel. Pers. Commun., 2015

Efficient Multimedia Data Storage in Cloud Environment.
Informatica (Slovenia), 2015

Classification and comparison of NoSQL big data models.
Int. J. Big Data Intell., 2015

Data Storage Security in Cloud Paradigm.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

2014
Energy efficient mobile vision system for plant leaf disease identification.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Improved Detection of P2P Botnets through Network Behavior Analysis.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Mobile Mixed Reality Based Damage Level Estimation of Diseased Plant Leaf.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

Detection of Insider Attacks in Cloud Based e-Healthcare Environment.
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
Hierarchal Identity Based Socket for Datacenters.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Energy Efficient Seamless Service Provisioning in Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Implementation of a Private Cloud: A Case Study.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Mobile augmented reality based interactive teaching & learning system with low computation approach.
Proceedings of the IEEE Symposium on Computational Intelligence in Control and Automation, 2013

2012
Distributed frequent itemset mining framework for incremental data using MPI-style WSRF services.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Control of computer process using image processing and computer vision for low-processing devices.
Proceedings of the 2012 International Conference on Advances in Computing, 2012


  Loading...