Attack graph generation and analysis techniques MS Barik, A Sengupta, C Mazumdar Defence science journal 66 (6), 559, 2016 | 73 | 2016 |
e-Commerce security—A life cycle approach A Sengupta, C Mazumdar, MS Barik Sadhana 30 (2), 119-140, 2005 | 69 | 2005 |
A Two-Phase Quantitative Methodology for Enterprise Information Security Risk Analysis J Bhattacharjee, A Sengupta, C Mazumdar, MS Barik International Journal of Computer Systems Science & Engineering (IJCSSE) 29 (1), 2014 | 24 | 2014 |
A two-phase quantitative methodology for enterprise information security risk analysis J Bhattacharjee, A Sengupta, C Mazumdar, MS Barik Proceedings of the CUBE International Information Technology Conference, 809-815, 2012 | 24 | 2012 |
A formal methodology for detecting managerial vulnerabilities and threats in an enterprise information system A Sengupta, C Mazumdar, A Bagchi Journal of Network and Systems Management 19 (3), 319-342, 2011 | 18 | 2011 |
A formal methodology for detection of vulnerabilities in an enterprise information system A Sengupta, C Mazumdar, A Bagchi 2009 Fourth International Conference on Risks and Security of Internet and …, 2009 | 17 | 2009 |
A survey of trust models for enterprise information systems A Manna, A Sengupta, C Mazumdar Procedia Computer Science 85, 527-534, 2016 | 15 | 2016 |
A formal methodology for enterprise information security risk assessment J Bhattacharjee, A Sengupta, C Mazumdar 2013 International Conference on Risks and Security of Internet and Systems …, 2013 | 13 | 2013 |
A quantitative methodology for information security control gap analysis S Bandopadhyay, A Sengupta, C Mazumdar Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 10 | 2011 |
A quantitative methodology for cloud security risk assessment S Basu, A Sengupta, C Mazumdar International Conference on Cloud Computing and Services Science 2, 120-131, 2017 | 8 | 2017 |
A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes. J Bhattacharjee, A Sengupta, C Mazumdar ICISSP, 388-399, 2016 | 8 | 2016 |
A formal approach to information security metrics A Chakraborty, A Sengupta, C Mazumdar 2012 Third International Conference on Emerging Applications of Information …, 2012 | 8 | 2012 |
A Structured Control Selection Methodology for Insider Threat Mitigation P Roy, A Sengupta, C Mazumdar Procedia Computer Science 181, 1187-1195, 2021 | 7 | 2021 |
A quantitative methodology for business process-based data privacy risk computation A Manna, A Sengupta, C Mazumdar Advanced Computing and Systems for Security: Volume Ten, 17-33, 2020 | 7 | 2020 |
Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy S Basu, A Sengupta, C Mazumdar Enterprise Information Systems 10 (9), 1024-1046, 2016 | 7 | 2016 |
A Methodology for Conversion of Enterprise-Level Information Security Policies to Implementation-Level Policies/Rule A Sengupta, C Mazumdar, A Bagchi 2011 Second International Conference on Emerging Applications of Information …, 2011 | 7 | 2011 |
An Analytical Study of Methodologies and Tools for Enterprise Information Security Risk Management J Bhattacharjee, A Sengupta, MS Barik, C Mazumdar Global Business Expansion: Concepts, Methodologies, Tools, and Applications …, 2018 | 5 | 2018 |
An Analytical Study of Methodologies and Tools for Enterprise Information Security Risk Management J Bhattacharjee, A Sengupta, MS Barik, C Mazumdar Information Technology Risk Management and Compliance in Modern …, 2018 | 5 | 2018 |
A web-enabled enterprise security management framework based on a unified model of enterprise information system security A Sengupta, A Mukhopadhyay, K Ray, AG Roy, D Aich, MS Barik, ... Information Systems Security: First International Conference, ICISS 2005 …, 2005 | 5 | 2005 |
Managing the Cyber Security Life‐Cycle of Smart Cities MS Barik, A Sengupta, C Mazumdar Smart cities: Foundations, principles, and applications, 391-407, 2017 | 4 | 2017 |