Shantanu Pal

Orcid: 0000-0002-8784-0154

According to our database1, Shantanu Pal authored at least 71 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring factors influencing blockchain adoption's effectiveness in organizations for generating business value: a systematic literature review and thematic analysis.
Enterp. Inf. Syst., August, 2024

Big Data-Enabled Authentication Framework for Offshore Maritime Communication Using Drones.
IEEE Trans. Veh. Technol., July, 2024

Federated Zero Trust Architecture using Artificial Intelligence.
IEEE Wirel. Commun., April, 2024

Analysing Performances of DL-Based ECG Noise Classification Models Deployed in Memory-Constraint IoT-Enabled Devices.
IEEE Trans. Consumer Electron., February, 2024

A Blockchain-Based Approach for Parametric Insurance Under Multiple Sources of Truth.
IEEE Trans. Serv. Comput., 2024

Current approaches and future directions for Cyber Threat Intelligence sharing: A survey.
J. Inf. Secur. Appl., 2024

SYN-GAN: A robust intrusion detection system using GAN-based synthetic data for IoT security.
Internet Things, 2024

Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain.
Comput. Networks, 2024

Robustness of Deep Learning models in electrocardiogram noise detection and classification.
Comput. Methods Programs Biomed., 2024

Enhancing quality of service through federated learning in edge-cloud architecture.
Ad Hoc Networks, 2024

A privacy-preserving location data collection framework for intelligent systems in edge computing.
Ad Hoc Networks, 2024

The Impact of Simultaneous Adversarial Attacks on Robustness of Medical Image Analysis.
IEEE Access, 2024

Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

A Framework for User Biometric Privacy Protection in UAV Delivery Systems with Edge Computing.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024


A Prognostic Framework for Post-Operative Patient Survival Prediction in IoMT.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

A Robust Feature Integration for Multiclass Metamorphic Malware Detection in IoT Network.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Multimodal Social Data Analytics on the Design and Implementation of an EEG-Mechatronic System Interface.
ACM J. Data Inf. Qual., September, 2023

A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments.
IEEE Internet Things Mag., March, 2023

The Role of Cyber Threat Intelligence Sharing in the Metaverse.
IEEE Internet Things Mag., March, 2023

Correlation-Based Anomaly Detection in Industrial Control Systems.
Sensors, February, 2023

A Blockchain-Based Interoperable Architecture for IoT with Selective Disclosure of Information.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

Security, Privacy and Trust for the Metaverse of Things.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Cloud-Assisted Security Framework for Drone-Enabled Offshore Communications.
Proceedings of the IEEE INFOCOM 2023, 2023

The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence.
Proceedings of the 16th International Conference on Sensing Technology, 2023

Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust.
Proceedings of the 16th International Conference on Sensing Technology, 2023

A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture.
Proceedings of the IEEE International Conference on Blockchain, 2023

BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

2022
TrackInk: An IoT-Enabled Real-Time Object Tracking System in Space.
Sensors, 2022

Blockchain for IoT access control: Recent trends and future research directions.
J. Netw. Comput. Appl., 2022

Device Identification in Blockchain-Based Internet of Things.
IEEE Internet Things J., 2022

Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing.
CoRR, 2022

Design and Implementation of EEG-Mechatronic System Interface for Computational Intelligence.
CoRR, 2022

A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain.
Proceedings of the IEEE International Conference on Trust, 2022

A Universal Deduplication Architecture for Secure and Efficient Cloud Storage.
Proceedings of the 4th IEEE International Conference on Trust, 2022

A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Design and Development of Automated Threat Hunting in Industrial Control Systems.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

2021
Development and Progress in Sensors and Technologies for Human Emotion Recognition.
Sensors, 2021

Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities.
Sensors, 2021

Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives.
CoRR, 2021

Blockchain in Supply Chain: Opportunities and Design Considerations.
CoRR, 2021

A blockchain-based trust management framework with verifiable interactions.
Comput. Networks, 2021

Controlling Resource Allocation using Blockchain-Based Delegation.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Internet of Things and Access Control - Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems
37, Springer, ISBN: 978-3-030-64997-5, 2021

2020
On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain.
IEEE Trans. Ind. Informatics, 2020

Security Requirements for the Internet of Things: A Systematic Approach.
Sensors, 2020

On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation.
IEEE Internet Things J., 2020

2019
Policy-based access control for constrained healthcare resources in the context of the Internet of Things.
J. Netw. Comput. Appl., 2019

Design and implementation of a secure and flexible access-right delegation for resource constrained environments.
Future Gener. Comput. Syst., 2019

Limitations and Approaches in Access Control and Identity Management for Constrained IoT Resources.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Towards the Design of a Trust Management Framework for the Internet of Things.
Proceedings of the 13th International Conference on Sensing Technology, 2019

2018
Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018

Policy-Based Access Control for Constrained Healthcare Resources.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

Modeling Identity for the Internet of Things: Survey, Classification and Trends.
Proceedings of the 12th International Conference on Sensing Technology, 2018

2017
Evaluating the impact of network loads and message size on mobile opportunistic networks in challenged environments.
J. Netw. Comput. Appl., 2017

On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Towards a Secure Access Control Architecture for the Internet of Things.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

On the design of security mechanisms for the Internet of Things.
Proceedings of the Eleventh International Conference on Sensing Technology, 2017

2015
Extending Mobile Cloud Platforms Using Opportunistic Networks: Survey, Classification and Open Issues.
J. Univers. Comput. Sci., 2015

2013
MobOCloud: extending cloud computing with mobile opportunistic networks.
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks, 2013

Storage Security and Technical Challenges of Cloud Computing.
Proceedings of the Data Intensive Storage Services for Cloud Environments., 2013

2011
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security
CoRR, 2011

2010
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison.
J. Univers. Comput. Sci., 2010


  Loading...