Name
Papers
Collaborators
SUGATA SANYAL
100
121
Citations 
PageRank 
Referers 
481
65.88
723
Referees 
References 
1435
748
Search Limit
1001000
Title
Citations
PageRank
Year
Deep learning techniques for classification of brain MRI.00.342020
A framework for phishing attack identification using rough set and formal concept analysis.00.342017
Book Review: Big Data Analytics.00.342015
Comparative Analysis of Cryptography Library in IoT.00.342015
Application Security framework for Mobile App Development in Enterprise setup.20.402015
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment.00.342015
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs.00.342015
Survey of Operating Systems for the IoT Environment.20.392015
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments00.342014
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems.20.432014
Energy Harvesting in M2M and WSN Space.00.342014
Reversible and Irreversible Data Hiding Technique.30.412014
Steganalysis: Detecting LSB Steganographic Techniques.00.342014
Digital Watermarking Techniques in Spatial and Frequency Domain.00.342014
Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program.10.352014
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution00.342014
Secure Authentication of Cloud Data Mining API.00.342013
Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services.110.702013
Machine Translation Systems in India00.342013
RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks.120.792013
Impact of mobile transmitter sources on radio frequency wireless energy harvesting80.942013
Finding numerical solutions of diophantine equations using ant colony optimization10.392013
Impact of mobile transmitter sources on radio frequency wireless energy harvesting10.352013
Cloud Computing -- An Approach with Modern Cryptography20.382013
Clustering online social network communities using genetic algorithms.20.382013
Detection and prevention of botnets and malware in an enterprise network40.422013
Inter-Cloud Data Security Strategies20.382013
Increasing Security in Cloud Environment20.382013
Sleep Deprivation Attack Detection in Wireless Sensor Network210.972012
Reciprocally induced coevolution: A computational metaphor in Mathematics00.342012
TSET: Token based Secure Electronic Transaction00.342012
Collusion resistant self-healing key distribution in mobile wireless networks30.412012
Training artificial neural networks using APPM191.192012
Rule Based Expert System for Cerebral Palsy Diagnosis30.872012
A Hybrid Approach Towards Intrusion Detection Based on Artificial Immune System and Soft Computing10.362012
Proactive TCP mechanism to improve Handover performance in Mobile Satellite and Terrestrial Networks00.342012
Prover and Verifier Based Password Protection: PVBPP00.342012
Rule Based Expert System for Diagnosis of Neuromuscular Disorders00.342012
A PAXOS based State Machine Replication System for Anomaly Detection20.382012
Implementation of a Real Time Passenger Information System20.392012
Routing Protocols for Mobile and Vehicular Ad-Hoc Networks: A Comparative Analysis20.392012
A Multi-Dimensional approach towards Intrusion Detection System70.632012
Performance analysis of deterministic key allocation schemes for wireless sensor networks00.342012
A Connectionist Network Approach to Find Numerical Solutions of Diophantine Equations10.372012
A Review of Techniques to Mitigate Sybil Attacks20.382012
Security Architecture for Cluster based Ad Hoc Networks10.362012
A Survey on Various Data Hiding Techniques and their Comparative Analysis30.422012
A Heuristic Reputation Based System to Detect Spam activities in a Social Networking Platform, HRSSSNP00.342012
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques200.932012
Optimal Allocation Of Rates In Guaranteed Service Networks10.352012
  • 1
  • 2