Ramesh Singh Rawat - Academia.edu (original) (raw)
Uploads
Papers by Ramesh Singh Rawat
2023 Second International Conference on Electronics and Renewable Systems (ICEARS)
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)
2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT)
2019 International Conference on Innovative Sustainable Computational Technologies (CISCT)
In the last decade, the botnet has developed as an intense danger to digital security by demonstr... more In the last decade, the botnet has developed as an intense danger to digital security by demonstrating its ability to trade-off many PCs and making them do the unlawful work. There are various available option by which botnet can be observed. Because of the inclusion of a gigantic measure of information, the place of botnet utilizing AI calculations is in the enormous pattern. The prepared allotments were connected to the gathered information to assess the outcomes. Examination of system stream information is used as a strategy for identification since it doesn't rely on the parcel content thus giving resistance towards the most recent type of encryption together with obscurity used up assailants to protect their bots. The result is clearly showing the purpose and methods of Datasets which we put in orange. The Datasets showing the traffic of bots showing the accuracy and false-positive rate. Moreover, pretty much every kind of botnet as it may be identified utilizing the expected model.
Int. J. Netw. Secur., 2018
Botnet is a network of compromised computers controlled by the attacker(s) from remote locations ... more Botnet is a network of compromised computers controlled by the attacker(s) from remote locations via Command and Control (C&C) channels. The botnets are one of the largest global threats to the Internet-based commercial and social world. The decentralized Peer-to-Peer (P2P) botnets have appeared in the recent past and are growing at a faster pace. These P2P botnets are continuously evolving from diverse C&C protocols using hybrid structures and are turning to be more complicated and stealthy. In this paper, we present a comprehensive survey of the evolution, functionalities, modelling and the development life cycle of P2P botnets. Further, we investigate the various P2P botnet detection approaches. Finally, discuss the key research challenges useful for the research initiatives. This paper is useful in understanding the P2P botnets and gives an insight into the usefulness and limitations of the various P2P botnet detection techniques proposed by the researchers. The study will enabl...
International Journal of Information Technology, 2021
This paper presents a new approach of reconstruction of Binary search tree using its Pre order tr... more This paper presents a new approach of reconstruction of Binary search tree using its Pre order tree-traversal only. There are many approaches given with the help of combination of two-tree traversals. But, in this paper we have not used any other combination of tree traversals to reconstruct the Binary search tree. Our work shows the implementation of this algorithm in C language. Our algorithm is found to be very simple and faster than other non recursive algorithms due to its unique implementation. Due to this reason the time and space complexities are significantly reduced.
Communications in Computer and Information Science, 2012
This paper presents vowel recognition from speech using mel frequency cepstral coefficients (MFCC... more This paper presents vowel recognition from speech using mel frequency cepstral coefficients (MFCCs). In this work, microphone recorded speech and telephonic speech are used for conducting vowel recognition studies. The vowels considered for recognition are from Hindi alphabet namely अ(a), इ(i), उ(u), ए(e), ऐ(ai), ओ(o) and औ(au). Gaussian mixture models are used for developing vowel recognition models. Vowel recognition performance for microphone recorded speech and telephonic speech are 91.4% and 84.2% respectively.
2023 Second International Conference on Electronics and Renewable Systems (ICEARS)
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)
2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT)
2019 International Conference on Innovative Sustainable Computational Technologies (CISCT)
In the last decade, the botnet has developed as an intense danger to digital security by demonstr... more In the last decade, the botnet has developed as an intense danger to digital security by demonstrating its ability to trade-off many PCs and making them do the unlawful work. There are various available option by which botnet can be observed. Because of the inclusion of a gigantic measure of information, the place of botnet utilizing AI calculations is in the enormous pattern. The prepared allotments were connected to the gathered information to assess the outcomes. Examination of system stream information is used as a strategy for identification since it doesn't rely on the parcel content thus giving resistance towards the most recent type of encryption together with obscurity used up assailants to protect their bots. The result is clearly showing the purpose and methods of Datasets which we put in orange. The Datasets showing the traffic of bots showing the accuracy and false-positive rate. Moreover, pretty much every kind of botnet as it may be identified utilizing the expected model.
Int. J. Netw. Secur., 2018
Botnet is a network of compromised computers controlled by the attacker(s) from remote locations ... more Botnet is a network of compromised computers controlled by the attacker(s) from remote locations via Command and Control (C&C) channels. The botnets are one of the largest global threats to the Internet-based commercial and social world. The decentralized Peer-to-Peer (P2P) botnets have appeared in the recent past and are growing at a faster pace. These P2P botnets are continuously evolving from diverse C&C protocols using hybrid structures and are turning to be more complicated and stealthy. In this paper, we present a comprehensive survey of the evolution, functionalities, modelling and the development life cycle of P2P botnets. Further, we investigate the various P2P botnet detection approaches. Finally, discuss the key research challenges useful for the research initiatives. This paper is useful in understanding the P2P botnets and gives an insight into the usefulness and limitations of the various P2P botnet detection techniques proposed by the researchers. The study will enabl...
International Journal of Information Technology, 2021
This paper presents a new approach of reconstruction of Binary search tree using its Pre order tr... more This paper presents a new approach of reconstruction of Binary search tree using its Pre order tree-traversal only. There are many approaches given with the help of combination of two-tree traversals. But, in this paper we have not used any other combination of tree traversals to reconstruct the Binary search tree. Our work shows the implementation of this algorithm in C language. Our algorithm is found to be very simple and faster than other non recursive algorithms due to its unique implementation. Due to this reason the time and space complexities are significantly reduced.
Communications in Computer and Information Science, 2012
This paper presents vowel recognition from speech using mel frequency cepstral coefficients (MFCC... more This paper presents vowel recognition from speech using mel frequency cepstral coefficients (MFCCs). In this work, microphone recorded speech and telephonic speech are used for conducting vowel recognition studies. The vowels considered for recognition are from Hindi alphabet namely अ(a), इ(i), उ(u), ए(e), ऐ(ai), ओ(o) and औ(au). Gaussian mixture models are used for developing vowel recognition models. Vowel recognition performance for microphone recorded speech and telephonic speech are 91.4% and 84.2% respectively.