Name
Affiliation
Papers
SAMRAT MONDAL
Indian Institute of Technology, Kharagpur, Kharagpur, India
47
Collaborators
Citations 
PageRank 
36
100
18.02
Referers 
Referees 
References 
154
695
464
Search Limit
100695
Title
Citations
PageRank
Year
On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things00.342021
On Designing An Unaided Authentication Service With Threat Detection And Leakage Control For Defeating Opportunistic Adversaries00.342021
Intelligent Scheduling of V2G, V2V, G2V Operations in a Smart Microgrid00.342020
A Graph Combination With Edge Pruning‐Based Approach for Author Name Disambiguation10.352020
A Fast and Efficient Way to Obtain the Optimal Number of Ports in Electric Vehicle Charging Stations00.342020
A Many Objective Optimization Based Entity Matching Framework for Bibliographic Database00.342019
Multiobjective Optimal Scheduling Framework for HVAC Devices in Energy-Efficient Buildings10.352019
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services10.352019
A divide-and-conquer based efficient non-dominated sorting approach.20.392019
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services.00.342019
Dispersion Ratio based Decision Tree Model for Classification.00.342019
Coordinated Scheduling of Residential Appliances and Heterogeneous Energy Sources in a Smart Microgrid.00.342019
Divide-and-conquer based non-dominated sorting with Reduced Comparisons00.342019
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness00.342018
SGP - A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones.00.342018
drPass - A Dynamic and Reusable Password Generator Protocol.00.342018
Towards optimal scheduling of thermal comfortability and smoothening of load profile in energy efficient buildings: work-in-progress.00.342018
GBOS: Generalized Best Order Sort algorithm for non-dominated sorting.10.352018
An Approach To Obtain The Upper Bound On The Number Of Non-Dominated Fronts In A Population00.342018
On Evaluation Of Entity Matching Techniques For Bibliographic Database00.342018
Towards Obtaining Upper Bound on Sensitivity Computation Process for Cluster Validity Measures.00.342018
Efficient Scheduling of Nonpreemptive Appliances for Peak Load Optimization in Smart Grid.00.342018
MBOS: Modified Best Order Sort Algorithm for Performing Non-Dominated Sorting10.352018
Multi-Objective Heuristic Charge Scheduling and Eco-Routing Mechanism for Electric Vehicles.00.342018
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations.20.412017
GAEMTBD: Genetic algorithm based entity matching techniques for bibliographic databases.00.342017
On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness.00.342017
Intelligent Scheduling of Thermostatic Devices for Efficient Energy Management in Smart Grid.10.412017
Sg-Pass: A Safe Graphical Password Scheme To Resist Shoulder Surfing And Spyware Attack00.342016
A multiobjective optimization based entity matching technique for bibliographic databases.10.352016
Sensitivity - An Important Facet of Cluster Validation Process for Entity Matching Technique.00.342016
Sposs: Secure Pin-Based-Authentication Obviating Shoulder Surfing20.392016
A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability.00.342015
Few notes towards making honeyword system more secure and usable10.352015
Improved Solution to the Non-Domination Level Update Problem30.392015
CRDT: Correlation Ratio Based Decision Tree Model for Healthcare Data Mining20.392015
SLASS: Secure Login against Shoulder Surfing.20.462014
Tag Digit Based Honeypot to Detect Shoulder Surfing Attack.40.462014
On Validation of Clustering Techniques for Bibliographic Databases20.352014
Entity Matching Technique for Bibliographic Database.50.412013
Security analysis of GTRBAC and its variants using model checking40.412011
Role Based Access Control with Spatiotemporal Context for Mobile Applications290.912009
Supporting Negative Authorization in Spatiotemporal Role Based Access Control00.342009
Towards formal security analysis of GTRBAC using timed automata160.652009
XML-based policy specification framework for spatiotemporal access control20.392009
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper)40.412008
Security Analysis of Temporal-RBAC Using Timed Automata130.642008