The SCEAS System
Navigation Menu

Search the dblp DataBase


Amitabha Das: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhuowei Li, Amitabha Das, Jianying Zhou
    Model Generalization and Its Implications on Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:222-237 [Conf]
  2. Zhuowei Li, Amitabha Das
    Visualizing and Identifying Intrusion Context from System Calls Trace. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:61-70 [Conf]
  3. Amitabha Das, Wee Keong Ng, Yew Kwong Woon
    Rapid Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    CIKM, 2001, pp:474-481 [Conf]
  4. Zhuowei Li, Amitabha Das, Sukumar Nandi
    Utilizing Statistical Characteristics of N-grams for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CW, 2003, pp:486-493 [Conf]
  5. Wan Suwu, Amitabha Das
    An Agent System Architecture for E-Commerce. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2001, pp:715-719 [Conf]
  6. Guandong Wang, Amitabha Das
    Models and Protocol Structures for Software Agent Based Complex E-Commerce Transactions. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2001, pp:121-132 [Conf]
  7. Zhuowei Li, Amitabha Das
    M of N Features vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:994-1003 [Conf]
  8. Keng-Pang Lim, Man-Nang Chong, Amitabha Das
    A New MRF Model for Robust Estimate of Occlusion and Motion Vectors Fields. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 1997, pp:843-846 [Conf]
  9. Amitabha Das, Louise E. Moser, P. M. Melliar-Smith
    PAL: A Language for Parallel Asynchronous Computation. [Citation Graph (0, 0)][DBLP]
    ICPP (2), 1992, pp:166-173 [Conf]
  10. Amitabha Das, Koh Yen Kai
    Tradeoff between Client and Server Transaction Validation in Mobile Environment. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2001, pp:265-272 [Conf]
  11. Amitabha Das, Louise E. Moser, P. M. Melliar-Smith
    A Parallel Processing Paradigm for Irregular Applications. [Citation Graph (0, 0)][DBLP]
    IRREGULAR, 1995, pp:249-254 [Conf]
  12. Amitabha Das, Yao Gongxuan
    A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment. [Citation Graph (0, 0)][DBLP]
    ISEC, 2001, pp:33-41 [Conf]
  13. Zhuowei Li, Amitabha Das, Sabu Emmanuel
    Model Redundancy vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:217-229 [Conf]
  14. Zhuowei Li, Amitabha Das, Jianying Zhou
    USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2005, pp:702-712 [Conf]
  15. Wen-Jing Hsu, Amitabha Das, Moon-Jung Chung
    Linear Recursive Networks and Their Applications in Topological Design and Data Routing. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1993, pp:249-257 [Conf]
  16. Yew Kwong Woon, Wee Keong Ng, Amitabha Das
    Fast Online Dynamic Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    WISE (1), 2001, pp:278-287 [Conf]
  17. Jaya Shankar Pathmasuntharam, Amitabha Das, Prasant Mohapatra
    A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:143-149 [Conf]
  18. Anil K. Gupta, Xiaoqun Wang, Amitabha Das
    Minimizing cell delay variation in CRMA/ATM interworking. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:13, pp:1225-1233 [Journal]
  19. Zhuowei Li, Amitabha Das
    Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  20. Zhuowei Li, Amitabha Das
    Analyzing and evaluating dynamics in stide performance for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2006, v:19, n:7, pp:576-591 [Journal]
  21. Keng-Pang Lim, Amitabha Das, Man-Nang Chong
    Estimation of Occlusion and Dense Motion Fields in a Bidirectional Bayesian Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2002, v:24, n:5, pp:712-718 [Journal]
  22. Keng-Pang Lim, Man-Nang Chong, Amitabha Das
    Low-bit-rate video coding using dense motion field and uncovered background prediction. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2001, v:10, n:1, pp:164-166 [Journal]
  23. Wen-Jing Hsu, Moon-Jung Chung, Amitabha Das
    Linear Recursive Networks and Their Applications in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1997, v:8, n:7, pp:673-680 [Journal]
  24. Zhuowei Li, Amitabha Das, Jianying Zhou
    Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:54-64 [Conf]
  25. Viet Thang Nguyen, Jagdish Chandra Patra, Amitabha Das
    A post nonlinear geometric algorithm for independent component analysis. [Citation Graph (0, 0)][DBLP]
    Digital Signal Processing, 2005, v:15, n:3, pp:276-294 [Journal]

  26. A Reversible Watermarking Scheme for JPEG-2000 Compressed Images. [Citation Graph (, )][DBLP]

  27. A CRT based watermark for multiparty multilevel DRM architecture. [Citation Graph (, )][DBLP]

  28. Watermarking video content using visual cryptography and scene averaged image. [Citation Graph (, )][DBLP]

  29. Generalized Self-healing Key Distribution Using Vector Space Access Structure. [Citation Graph (, )][DBLP]

  30. Secure multimedia content delivery with multiparty multilevel DRM architecture. [Citation Graph (, )][DBLP]

  31. Evaluating the Effects of Model Generalization on Intrusion Detection Performance. [Citation Graph (, )][DBLP]

  32. A Reservation-Based TDMA MAC Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  33. CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs. [Citation Graph (, )][DBLP]

  34. Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs. [Citation Graph (, )][DBLP]

  35. A survey on MAC protocols in OSA networks. [Citation Graph (, )][DBLP]

  36. CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS. [Citation Graph (, )][DBLP]

  37. Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks. [Citation Graph (, )][DBLP]

Search in 0.030secs, Finished in 0.032secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002