Search the dblp DataBase
Amitabha Das :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Zhuowei Li , Amitabha Das , Jianying Zhou Model Generalization and Its Implications on Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:222-237 [Conf ] Zhuowei Li , Amitabha Das Visualizing and Identifying Intrusion Context from System Calls Trace. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:61-70 [Conf ] Amitabha Das , Wee Keong Ng , Yew Kwong Woon Rapid Association Rule Mining. [Citation Graph (0, 0)][DBLP ] CIKM, 2001, pp:474-481 [Conf ] Zhuowei Li , Amitabha Das , Sukumar Nandi Utilizing Statistical Characteristics of N-grams for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] CW, 2003, pp:486-493 [Conf ] Wan Suwu , Amitabha Das An Agent System Architecture for E-Commerce. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 2001, pp:715-719 [Conf ] Guandong Wang , Amitabha Das Models and Protocol Structures for Software Agent Based Complex E-Commerce Transactions. [Citation Graph (0, 0)][DBLP ] EC-Web, 2001, pp:121-132 [Conf ] Zhuowei Li , Amitabha Das M of N Features vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2005, pp:994-1003 [Conf ] Keng-Pang Lim , Man-Nang Chong , Amitabha Das A New MRF Model for Robust Estimate of Occlusion and Motion Vectors Fields. [Citation Graph (0, 0)][DBLP ] ICIP (2), 1997, pp:843-846 [Conf ] Amitabha Das , Louise E. Moser , P. M. Melliar-Smith PAL: A Language for Parallel Asynchronous Computation. [Citation Graph (0, 0)][DBLP ] ICPP (2), 1992, pp:166-173 [Conf ] Amitabha Das , Koh Yen Kai Tradeoff between Client and Server Transaction Validation in Mobile Environment. [Citation Graph (0, 0)][DBLP ] IDEAS, 2001, pp:265-272 [Conf ] Amitabha Das , Louise E. Moser , P. M. Melliar-Smith A Parallel Processing Paradigm for Irregular Applications. [Citation Graph (0, 0)][DBLP ] IRREGULAR, 1995, pp:249-254 [Conf ] Amitabha Das , Yao Gongxuan A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment. [Citation Graph (0, 0)][DBLP ] ISEC, 2001, pp:33-41 [Conf ] Zhuowei Li , Amitabha Das , Sabu Emmanuel Model Redundancy vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:217-229 [Conf ] Zhuowei Li , Amitabha Das , Jianying Zhou USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP ] PAKDD, 2005, pp:702-712 [Conf ] Wen-Jing Hsu , Amitabha Das , Moon-Jung Chung Linear Recursive Networks and Their Applications in Topological Design and Data Routing. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1993, pp:249-257 [Conf ] Yew Kwong Woon , Wee Keong Ng , Amitabha Das Fast Online Dynamic Association Rule Mining. [Citation Graph (0, 0)][DBLP ] WISE (1), 2001, pp:278-287 [Conf ] Jaya Shankar Pathmasuntharam , Amitabha Das , Prasant Mohapatra A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop Networks. [Citation Graph (0, 0)][DBLP ] WOWMOM, 2006, pp:143-149 [Conf ] Anil K. Gupta , Xiaoqun Wang , Amitabha Das Minimizing cell delay variation in CRMA/ATM interworking. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:13, pp:1225-1233 [Journal ] Zhuowei Li , Amitabha Das Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Zhuowei Li , Amitabha Das Analyzing and evaluating dynamics in stide performance for intrusion detection. [Citation Graph (0, 0)][DBLP ] Knowl.-Based Syst., 2006, v:19, n:7, pp:576-591 [Journal ] Keng-Pang Lim , Amitabha Das , Man-Nang Chong Estimation of Occlusion and Dense Motion Fields in a Bidirectional Bayesian Framework. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Pattern Anal. Mach. Intell., 2002, v:24, n:5, pp:712-718 [Journal ] Keng-Pang Lim , Man-Nang Chong , Amitabha Das Low-bit-rate video coding using dense motion field and uncovered background prediction. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2001, v:10, n:1, pp:164-166 [Journal ] Wen-Jing Hsu , Moon-Jung Chung , Amitabha Das Linear Recursive Networks and Their Applications in Distributed Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1997, v:8, n:7, pp:673-680 [Journal ] Zhuowei Li , Amitabha Das , Jianying Zhou Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:54-64 [Conf ] Viet Thang Nguyen , Jagdish Chandra Patra , Amitabha Das A post nonlinear geometric algorithm for independent component analysis. [Citation Graph (0, 0)][DBLP ] Digital Signal Processing, 2005, v:15, n:3, pp:276-294 [Journal ] A Reversible Watermarking Scheme for JPEG-2000 Compressed Images. [Citation Graph (, )][DBLP ] A CRT based watermark for multiparty multilevel DRM architecture. [Citation Graph (, )][DBLP ] Watermarking video content using visual cryptography and scene averaged image. [Citation Graph (, )][DBLP ] Generalized Self-healing Key Distribution Using Vector Space Access Structure. [Citation Graph (, )][DBLP ] Secure multimedia content delivery with multiparty multilevel DRM architecture. [Citation Graph (, )][DBLP ] Evaluating the Effects of Model Generalization on Intrusion Detection Performance. [Citation Graph (, )][DBLP ] A Reservation-Based TDMA MAC Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks. [Citation Graph (, )][DBLP ] CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs. [Citation Graph (, )][DBLP ] Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs. [Citation Graph (, )][DBLP ] A survey on MAC protocols in OSA networks. [Citation Graph (, )][DBLP ] CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS. [Citation Graph (, )][DBLP ] Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks. [Citation Graph (, )][DBLP ] Search in 0.030secs, Finished in 0.032secs