Sugata Sanyal
TitleCited byYear
Adaptive neuro-fuzzy intrusion detection systems
S Chavan, K Shah, N Dave, S Mukherjee, A Abraham, S Sanyal
International Conference on Information Technology: Coding and Computing …, 2004
Impact of node mobility on MANET routing protocols models
B Divecha, A Abraham, C Grosan, S Sanyal
JDIM 5 (1), 19-23, 2007
A survey on security issues in cloud computing
R Bhadauria, R Chaki, N Chaki, S Sanyal
ACTA TECHNICACORVINIENSIS: Bulleting of Engineering 7 (4), 159-177, 2014
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques
R Bhadauria, S Sanyal
International Journal of Computer Applications 47 (18), 47-66, 2012
Survey of Security and Privacy Issues of Internet of Things
T Borgohain, U Kumar, S Sanyal, 2015
A multi-factor security protocol for wireless payment-secure web authentication using mobile devices
A Tiwari, S Sanyal, A Abraham, SJ Knapskog, S Sanyal
arXiv preprint arXiv:1111.3010, 2011
Sleep Deprivation Attack Detection in Wirelss Sensor network
T Bhattasali, R Chaki, S Sanyal
International Journal of Computer Applications,, 2012
Steganography and Steganalysis: different approaches
S Das, S Das, B Bandyopadhyay, S Sanyal
arXiv preprint arXiv:1111.3758, 2011
An LSB data hiding technique using prime numbers
S Dey, A Abraham, S Sanyal
Third international symposium on information assurance and security, 101-108, 2007
Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services
B Roy, S Banik, P Dey, S Sanyal, N Chaki
Journal of Emerging Trends in Computing and Information Sciences 3 (1), 10-14, 2011
A new trusted and collaborative agent based approach for ensuring cloud security
S Pal, S Khatua, N Chaki, S Sanyal
arXiv preprint arXiv:1108.4100, 2011
Analysis of dynamic source routing and destination-sequenced distance-vector protocols for different mobility models
B Divecha, A Abraham, C Grosan, S Sanyal
First Asia International Conference on Modelling & Simulation (AMS'07), 224-229, 2007
Finding Numerical Solutions of Diophantine Equations using Ant Colony Optimization
S Abraham, S Sanyal, M Sanglikar
Applied Mathematics and Computation [arXiv:1306.0896 [cs.NE]] 219 (24 …, 2013
RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks
AK Trivedi, R Kapoor, R Arora, S Sanyal, S Sanyal
Third International Conference on Computers and Devices for Communications …, 2006
A distributed security scheme for ad hoc networks
D Gada, R Gogri, P Rathod, Z Dedhia, N Mody, S Sanyal, A Abraham
ACM Crossroads 11 (1), 1-10, 2004
Particle swarm optimization based diophantine equation solver
S Abraham, S Sanyal, M Sanglikar
arXiv preprint arXiv:1003.2724, 2010
Evolution induced secondary immunity: An artificial immune system based intrusion detection system
D Dal, S Abraham, A Abraham, S Sanyal, M Sanglikar
2008 7th Computer Information Systems and Industrial Management Applications …, 2008
A novel multipath approach to security in mobile ad hoc networks (MANETs)
R Vasudevan, S Sanyal
Proc. of Intl Conf. Computers and Devices for Communication (CODEC’04 …, 2004
Training Artificial Neural Networks using APPM
Z Cui, C Yang, S Sanyal
International Journal of Wireless and Mobile Computing 5 (2), 168-174, 2012
An LSB data hiding technique using natural number decomposition
S Dey, A Abraham, S Sanyal
Third International Conference on Intelligent Information Hiding and …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20