Chandan Mazumdar
Orcid: 0000-0002-4252-8861
According to our database1,
Chandan Mazumdar
authored at least 48 papers
between 1984 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the Risks and Security of Internet and Systems, 2023
2022
Secur. Priv., 2022
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2022
2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
Proceedings of the CENTERIS 2020 - International Conference on ENTERprise Information Systems / ProjMAN 2020 - International Conference on Project MANagement / HCist 2020, 2020
2019
IEEE Syst. J., 2019
IEEE Syst. J., 2019
Proceedings of the Advanced Computing and Systems for Security, 2019
2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Innov. Syst. Softw. Eng., 2017
A Quantitative Methodology for Cloud Security Risk Assessment.
Proceedings of the CLOSER 2017, 2017
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017
2016
Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy.
Enterp. Inf. Syst., 2016
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Columbia-Jadavpur submission for EMNLP 2016 Code-Switching Workshop Shared Task: System description.
Proceedings of the Second Workshop on Computational Approaches to Code Switching@EMNLP 2016, 2016
Proceedings of the Second Workshop on Computational Approaches to Code Switching@EMNLP 2016, 2016
2015
Resolving authorization conflicts by ontology views for controlled access to a digital library.
J. Knowl. Manag., 2015
Innov. Syst. Softw. Eng., 2015
Proceedings of the ICISSP 2015, 2015
2014
A two-phase quantitative methodology for enterprise information security risk analysis.
Comput. Syst. Sci. Eng., 2014
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Performance Comparison of Hadoop Based Tools with Commercial ETL Tools - A Case Study.
Proceedings of the Big Data Analytics - Second International Conference, 2013
2012
Proceedings of the CUBE International IT Conference & Exhibition, 2012
2011
A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System.
J. Netw. Syst. Manag., 2011
A Mark-Up Language for the Specification of Information Security Governance Requirements.
Int. J. Inf. Secur. Priv., 2011
Proceedings of the 2011 International Conference on Communication, 2011
2009
Int. J. Electron. Secur. Digit. Forensics, 2009
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009
A formal methodology for detection of vulnerabilities in an enterprise information system.
Proceedings of the CRiSIS 2009, 2009
2007
Digit. Investig., 2007
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007
2006
Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents.
Digit. Investig., 2006
Proceedings of the Distributed Computing and Internet Technology, 2006
2005
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security .
Proceedings of the Information Systems Security, First International Conference, 2005
2004
Int. J. Digit. EVid., 2004
2002
Int. J. Imaging Syst. Technol., 2002
Proceedings of the Distributed Computing, 2002
1994
Authoring Software for Higher Educational Environment.
Proceedings of the 12st IASTED International Conference on Applied Informatics, 1994
1986
Perform. Evaluation, 1986
1984
Proceedings of the 1984 ACM Annual Conference on Computer Science: The fifth generation challenge, 1984