Sugata Sanyal

According to our database1, Sugata Sanyal authored at least 106 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Reducing Time Complexity of Fuzzy C Means Algorithm.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2021

2020
Deep learning techniques for classification of brain MRI.
Int. J. Intell. Syst. Technol. Appl., 2020

2017
A framework for phishing attack identification using rough set and formal concept analysis.
Int. J. Commun. Networks Distributed Syst., 2017

2015
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs.
CoRR, 2015

Comparative Analysis of Cryptography Library in IoT.
CoRR, 2015

Heuristic Algorithm using Internet of Things and Mobility for solving demographic issues in Financial Inclusion projects.
CoRR, 2015

Application Security framework for Mobile App Development in Enterprise setup.
CoRR, 2015

Technical Analysis of Security Infrastructure in RFID Technology.
CoRR, 2015

Survey of Operating Systems for the IoT Environment.
CoRR, 2015

Survey of Security and Privacy Issues of Internet of Things.
CoRR, 2015

Authentication Systems in Internet of Things.
CoRR, 2015

Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment.
CoRR, 2015

Book Review: Big Data Analytics.
IEEE Intell. Informatics Bull., 2015

2014
Digital Watermarking Techniques in Spatial and Frequency Domain.
CoRR, 2014

Steganalysis: Detecting LSB Steganographic Techniques.
CoRR, 2014

Reversible and Irreversible Data Hiding Technique.
CoRR, 2014

Energy Harvesting in M2M and WSN Space.
CoRR, 2014

Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution.
CoRR, 2014

Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments.
CoRR, 2014

Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program.
CoRR, 2014

Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems.
CoRR, 2014

2013
Machine Translation Systems in India
CoRR, 2013

Inter-Cloud Data Security Strategies
CoRR, 2013

Cloud Computing -- An Approach with Modern Cryptography
CoRR, 2013

Increasing Security in Cloud Environment
CoRR, 2013

RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks.
CoRR, 2013

Clustering online social network communities using genetic algorithms.
CoRR, 2013

Secure Authentication of Cloud Data Mining API.
CoRR, 2013

Finding numerical solutions of diophantine equations using ant colony optimization.
Appl. Math. Comput., 2013

Impact of mobile transmitter sources on radio frequency wireless energy harvesting.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

2012
Optimal Allocation of Rates in Guaranteed Service Networks.
Informatica (Slovenia), 2012

Detection and prevention of botnets and malware in an enterprise network.
Int. J. Wirel. Mob. Comput., 2012

Performance analysis of deterministic key allocation schemes for wireless sensor networks.
Int. J. Wirel. Mob. Comput., 2012

Collusion resistant self-healing key distribution in mobile wireless networks.
Int. J. Wirel. Mob. Comput., 2012

Training artificial neural networks using APPM.
Int. J. Wirel. Mob. Comput., 2012

Prover and Verifier Based Password Protection: PVBPP
CoRR, 2012

A Heuristic Reputation Based System to Detect Spam activities in a Social Networking Platform, HRSSSNP
CoRR, 2012

A Review of Techniques to Mitigate Sybil Attacks
CoRR, 2012

Rule Based Expert System for Diagnosis of Neuromuscular Disorders
CoRR, 2012

Security Architecture for Cluster based Ad Hoc Networks
CoRR, 2012

Rule Based Expert System for Cerebral Palsy Diagnosis
CoRR, 2012

A PAXOS based State Machine Replication System for Anomaly Detection
CoRR, 2012

A Connectionist Network Approach to Find Numerical Solutions of Diophantine Equations
CoRR, 2012

A Survey on Various Data Hiding Techniques and their Comparative Analysis
CoRR, 2012

Routing Protocols for Mobile and Vehicular Ad-Hoc Networks: A Comparative Analysis
CoRR, 2012

Reciprocally induced coevolution: A computational metaphor in Mathematics
CoRR, 2012

Implementation of a Real Time Passenger Information System
CoRR, 2012

Proactive TCP mechanism to improve Handover performance in Mobile Satellite and Terrestrial Networks
CoRR, 2012

A Hybrid Approach Towards Intrusion Detection Based on Artificial Immune System and Soft Computing
CoRR, 2012

A Multi-Dimensional approach towards Intrusion Detection System
CoRR, 2012

Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques
CoRR, 2012

TSET: Token based Secure Electronic Transaction
CoRR, 2012

Sleep Deprivation Attack Detection in Wireless Sensor Network
CoRR, 2012

2011
A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs)
CoRR, 2011

Steganography and Steganalysis: Different Approaches
CoRR, 2011

A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices
CoRR, 2011

Modeling Smart Grid using Generalized Stochastic Petri Net
CoRR, 2011

QoS Routing using OLSR with Optimization for Flooding
CoRR, 2011

A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security
CoRR, 2011

Distributed framework for tele health monitoring system.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2010
A Multifactor Secure Authentication System for Wireless Payment.
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010

Piecemeal Journey to 'HALCYON' World of Computing: From Past Progress to Future Challenges.
Informatica (Slovenia), 2010

A Note on the Bounds for the Generalized Fibonacci-P-Sequence and its Application in Datahiding.
Int. J. Comput. Sci. Appl., 2010

Particle swarm optimisation based Diophantine equation solver.
Int. J. Bio Inspired Comput., 2010

New Frontiers of Network Security: The Threat Within
CoRR, 2010

A Microwave Imaging and Enhancement Technique from Noisy Synthetic Data
CoRR, 2010

Steepest Ascent Hill Climbing For A Mathematical Problem
CoRR, 2010

A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
CoRR, 2010

A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding
CoRR, 2010

ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
CoRR, 2010

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
CoRR, 2010

Embedding Secret Data in HTML Web Page
CoRR, 2010

A Spatial Crypto Technique for Secure Data Transmission
CoRR, 2010

A Very Simple Approach for 3-D to 2-D Mapping
CoRR, 2010

An LSB Data Hiding Technique Using Natural Numbers
CoRR, 2010

Data Hiding Techniques Using Prime and Natural Numbers
CoRR, 2010

Hiding Inside HTML and Other Source Codes
CoRR, 2010

Particle Swarm Optimization Based Diophantine Equation Solver
CoRR, 2010

Vcache: Caching Dynamic Documents
CoRR, 2010

Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
CoRR, 2010

Piecemeal Journey To 'HALCYON' World Of Pervasive Computing : From past progress to future challenges
CoRR, 2010

Error concealment of H.264 encoded video through a hybrid scheme.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

2009
Dynamic Reconfiguration of Wireless Sensor Networks.
Int. J. Comput. Sci. Appl., 2009

2008
Hiding Techniques Using Prime and Natural Numbers.
J. Digit. Inf. Manag., 2008

Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

2007
Impact of Node Mobility on MANET Routing Protocols Models.
J. Digit. Inf. Manag., 2007

Applying SIMD Approach to Whole Genome Comparison on Commodity Hardware.
Proceedings of the Parallel Processing and Applied Mathematics, 2007

Whole Genome Comparison on a Network of Workstations.
Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC 2007), 2007

An LSB Data Hiding Technique Using Natural Number Decomposition.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Analysis of Dynamic Source Routing and Destination-Sequenced Distance-Vector Protocols for Different Mobility Models.
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007

An LSB Data Hiding Technique Using Prime Numbers.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A new protocol to counter online dictionary attacks.
Comput. Secur., 2006

2005
A Novel Scheme for Secured Data Transfer Over Computer Networks.
J. Univers. Comput. Sci., 2005

Information Assurance and Security.
J. Univers. Comput. Sci., 2005

The N/R One Time Password System.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
Grid Security and Integration with Minimal Performance Degradation.
J. Digit. Inf. Manag., 2004

CompChall: Addressing Password Guessing Attacks.
IACR Cryptol. ePrint Arch., 2004

A distributed security scheme for ad hoc networks.
ACM Crossroads, 2004

Jigsaw-based Security in Data Transfer in Computer Networks
CoRR, 2004

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks.
Proceedings of the Distributed Computing, 2004

SCIDS: A Soft Computing Intrusion Detection System.
Proceedings of the Distributed Computing, 2004

Jigsaw-based Secure Data Transfer over Computer Networks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Adaptive Neuro-Fuzzy Intrusion Detection Systems.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
Secure Mobile Computing.
Proceedings of the Distributed Computing, 2003

2002
The next generation Internet protocol.
Informatica (Slovenia), 2002

2000
Inductance Characterization of Small Interconnects Using Test-Signal Method.
Proceedings of the 13th International Conference on VLSI Design (VLSI Design 2000), 2000


  Loading...