Παρακολούθηση
Sankardas Roy
Sankardas Roy
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα bgsu.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
A survey of game theory as applied to network security
S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
6792010
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps
F Wei, S Roy, X Ou, Robby
ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-32, 2018
5572018
Deep ground truth analysis of current android malware
F Wei, Y Li, S Roy, X Ou, W Zhou
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
5072017
Secure data aggregation in wireless sensor networks
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 7 (3), 1040-1052, 2012
1962012
Efficient distributed detection of node replication attacks in sensor networks
B Zhu, VGK Addada, S Setia, S Jajodia, S Roy
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
1722007
Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs
S Roy, M Chuah
Lehigh CSE Tech. Rep, 2009
1642009
Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 9 (4), 681-694, 2014
1442014
Localized multicast: efficient and distributed replica detection in large-scale sensor networks
B Zhu, S Setia, S Jajodia, S Roy, L Wang
IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010
1282010
Game theory for cyber security
S Shiva, S Roy, D Dasgupta
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
1242010
Experimental study with real-world data for android app security analysis using machine learning
S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015
1052015
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
Q Wu, S Shiva, S Roy, C Ellis, V Datla
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
792010
Attack-resilient hierarchical data aggregation in sensor networks
S Roy, S Setia, S Jajodia
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
762006
Privacy‐preserving robust data aggregation in wireless sensor networks
M Conti, L Zhang, S Roy, R Di Pietro, S Jajodia, LV Mancini
Security and Communication Networks 2 (2), 195-213, 2009
722009
Securing MAODV: attacks and countermeasures.
S Roy, VGK Addada, S Setia, S Jajodia
SECON, 521-532, 2005
682005
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows
HS Bedi, S Roy, S Shiva
2011 IEEE symposium on computational intelligence in cyber security (CICS …, 2011
672011
The effect of soil physico-chemical properties on rhizome rot and wilt disease complex incidence of ginger under hill agro-climatic region of West Bengal
BR Sharma, S Dutta, S Roy, A Debnath, MD Roy
The Plant Pathology Journal 26 (2), 198-202, 2010
512010
Protective effect of latex of Calotropis procera in Freund's Complete Adjuvant induced monoarthritis
VL Kumar, S Roy
Phytotherapy Research: An International Journal Devoted to Pharmacological …, 2009
472009
Leech bite: a rare gynecologic emergency
PK Saha, S Roy, D Bhattacharya, P Mukherjee, T Naskar, A Bhuiya
Medscape General Medicine 7 (4), 73, 2005
452005
Leptospirosis in the Andaman Islands, India
P Vijayachari, AP Sugunan, S Sharma, S Roy, K Natarajaseenivasan, ...
Transactions of the Royal Society of Tropical Medicine and Hygiene 102 (2 …, 2008
442008
An antiviral protein having deoxyribonuclease and ribonuclease activity from leaves of the post-flowering stage of Celosia cristata
M Begam, S Narwal, S Roy, S Kumar, ML Lodha, HC Kapoor
Biochemistry (moscow) 71, S44-S48, 2006
442006
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20