The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sugata Sanyal: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sampada Chavan, Khusbu Shah, Neha Dave, Sanghamitra Mukherjee, Ajith Abraham, Sugata Sanyal
    Adaptive Neuro-Fuzzy Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:70-74 [Conf]
  2. Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han
    The N/R One Time Password System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:733-738 [Conf]
  3. Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
    CompChall: Addressing Password Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:739-744 [Conf]
  4. Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal
    Jigsaw-based Secure Data Transfer over Computer Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:2-6 [Conf]
  5. Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong Han
    SCIDS: A Soft Computing Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:252-257 [Conf]
  6. Dharma P. Agrawal, Hongmei Deng, Rajani Poosarla, Sugata Sanyal
    Secure Mobile Computing. [Citation Graph (0, 0)][DBLP]
    IWDC, 2003, pp:265-278 [Conf]
  7. Punit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, Ajith Abraham
    Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:541-542 [Conf]
  8. Jeegar Tilak Shah, Madhav P. Desai, Sugata Sanyal
    Inductance Characterization of Small Interconnects Using Test-Signal Method. [Citation Graph (0, 0)][DBLP]
    VLSI Design, 2000, pp:376-0 [Conf]
  9. Bhavyesh Divecha, Ajith Abraham, Crina Grosan, Sugata Sanyal
    Analysis of Dynamic Source Routing and Destination-Sequenced Distance-Vector Protocols for Different Mobility Models. [Citation Graph (0, 0)][DBLP]
    Asia International Conference on Modelling and Simulation, 2007, pp:224-229 [Conf]
  10. Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
    A new protocol to counter online dictionary attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:114-120 [Journal]
  11. Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal
    Jigsaw-based Security in Data Transfer in Computer Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  12. Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal, Ajith Abraham
    A distributed security scheme for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ACM Crossroads, 2004, v:11, n:1, pp:5- [Journal]
  13. Ajith Abraham, Johnson P. Thomas, Sugata Sanyal, Lakhmi C. Jain
    Information Assurance and Security. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:1-3 [Journal]
  14. Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
    A Novel Scheme for Secured Data Transfer Over Computer Networks. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:104-121 [Journal]

  15. Whole Genome Comparison on a Network of Workstations. [Citation Graph (, )][DBLP]


  16. Applying SIMD Approach to Whole Genome Comparison on Commodity Hardware. [Citation Graph (, )][DBLP]


  17. Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System. [Citation Graph (, )][DBLP]


  18. An LSB Data Hiding Technique Using Prime Numbers. [Citation Graph (, )][DBLP]


  19. A Novel Scheme for Secured Data Transfer Over Computer Networks [Citation Graph (, )][DBLP]


  20. Piecemeal Journey To 'HALCYON' World Of Pervasive Computing : From past progress to future challenges [Citation Graph (, )][DBLP]


  21. Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks [Citation Graph (, )][DBLP]


  22. Vcache: Caching Dynamic Documents [Citation Graph (, )][DBLP]


  23. Particle Swarm Optimization Based Diophantine Equation Solver [Citation Graph (, )][DBLP]


  24. Hiding Inside HTML and Other Source Codes [Citation Graph (, )][DBLP]


  25. Data Hiding Techniques Using Prime and Natural Numbers [Citation Graph (, )][DBLP]


  26. An LSB Data Hiding Technique Using Natural Numbers [Citation Graph (, )][DBLP]


  27. A Very Simple Approach for 3-D to 2-D Mapping [Citation Graph (, )][DBLP]


  28. An LSB Data Hiding Technique Using Prime Numbers [Citation Graph (, )][DBLP]


  29. A Spatial Crypto Technique for Secure Data Transmission [Citation Graph (, )][DBLP]


  30. Embedding Secret Data in HTML Web Page [Citation Graph (, )][DBLP]


  31. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks [Citation Graph (, )][DBLP]


  32. ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests [Citation Graph (, )][DBLP]


  33. A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding [Citation Graph (, )][DBLP]


  34. A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks [Citation Graph (, )][DBLP]


Search in 0.035secs, Finished in 0.037secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002