Enforcement of access control policy for mobile ad hoc networks S Maity, SK Ghosh Proceedings of the Fifth International Conference on Security of Information …, 2012 | 13 | 2012 |
An access control framework for semi-infrastructured Ad hoc networks S Maity, P Bera, SK Ghosh 2010 2nd International Conference on Computer Technology and Development …, 2010 | 11 | 2010 |
Optimal negotiation of SLA in federated cloud using multiobjective genetic algorithms AC Soumya Maity 3rd IEEE International Conference on Cloud Networking, CloudNet 2014 …, 2014 | 9* | 2014 |
Policy based acl configuration synthesis in enterprise networks: A formal approach S Maity, P Bera, SK Ghosh 2012 International Symposium on Electronic System Design (ISED), 314-318, 2012 | 8 | 2012 |
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration S Maity, P Bera, SK Ghosh Proceedings of the 3rd International Conference on Security of Information …, 2010 | 6 | 2010 |
Formal integrated network security analysis tool: formal query‐based network security configuration analysis S Maity, P Bera, SK Ghosh, E Al‐Shaer IET Networks 4 (2), 137-147, 2015 | 5 | 2015 |
QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression A Chaudhuri, S Maity, SK Ghosh Proceedings of the 30th Annual ACM Symposium on Applied Computing, 659-661, 2015 | 4 | 2015 |
A cognitive trust model for access control framework in manet S Maity, SK Ghosh Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 4 | 2012 |
A query based formal security analysis framework for enterprise LAN P Bera, S Maity, SK Ghosh, P Dasgupta 2010 10th IEEE International Conference on Computer and Information …, 2010 | 3 | 2010 |
A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN S Maity, P Bera, SK Ghosh, P Dasgupta International Journal of Network Security & Its Applications (IJNSA) 2 (4 …, 2010 | 3 | 2010 |
PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks S Maity, SK Ghosh, E Al‐Shaer Security and Communication Networks 8 (3), 418-430, 2015 | 2 | 2015 |
Conflict resolution in heterogeneous co-allied MANET: A formal approach S Maity, SK Ghosh Distributed Computing and Networking: 15th International Conference, ICDCN …, 2014 | 1 | 2014 |
Generating policy based security implementation in enterprise network: a formal framework P Bera, S Maity, SK Ghosh Proceedings of the 3rd ACM workshop on Assurable and usable security …, 2010 | 1 | 2010 |
Method and system for establishing trust between nodes in a network based on recommendations S Maity, SK Bikumala US Patent 11,652,877, 2023 | | 2023 |
System for query-based interactive risk model analysis for secure software development S Maity, LB Sudakar US Patent App. 17/380,918, 2022 | | 2022 |
QoS Prediction for Network Data Traffic using Hierarchical Modified Regularized Least Squares Rough Support Vector Regression SKG Arindam Chaudhuri, Soumya Maity The 30th ACM Symposium On Applied Computing (SAC 2015), Salamanca, Spain …, 2015 | | 2015 |
Access Control Models for Mobile Ad Hoc Networks S Maity IIT Kharagpur, 2014 | | 2014 |
Security and Access Control in Mobile ad hoc Networks S Maity, SK Ghosh Building Next-Generation Converged Networks, 241-262, 2013 | | 2013 |
A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model P Bera, S Maity, SK Ghosh, P Dasgupta Recent Trends in Network Security and Applications: Third International …, 2010 | | 2010 |
Access Control in Mobile Ad Hoc Networks S Maity | | |