关注
Sayonnha Mandal
Sayonnha Mandal
在 unomaha.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Implementation of secure quantum protocol using multiple photons for communication
S Mandal, G Macdonald, ME Rifai, N Punekar, F Zamani, Y Chen, S Kak, ...
arXiv preprint arXiv:1208.6198, 2012
232012
A Framework for Modular Norm Extraction, Modeling and Reasoning
S Mandal
University of Nebraska at Omaha, 2017
202017
Multi-photon implementation of three-stage quantum cryptography protocol
S Mandal, G Macdonald, M El Rifai, N Punekar, F Zamani, Y Chen, S Kak, ...
The International Conference on Information Networking 2013 (ICOIN), 6-11, 2013
202013
Implementing Diffie-Hellman key exchange using quantum EPR pairs
S Mandal, A Parakh
Quantum Information and Computation XIII 9500, 23-29, 2015
92015
Modular norm models: A lightweight approach for modeling and reasoning about legal compliance
S Mandal, R Gandhi, H Siy
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017
82017
Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security
S Mandal, R Gandhi, H Siy
2015 IEEE Eighth International Workshop on Requirements Engineering and Law …, 2015
62015
Gauging the impact of FISMA on software security
RA Gandhi, K Crosby, H Siy, S Mandal
Computer 47 (09), 103-107, 2014
62014
Implementation of the three-stage protocol over free space optics
S Mandal
University of Oklahoma, 2012
52012
Cybersafe: Gamifying Cybersecurity Training with a Training App
C Roque, G Moodley, S Mandal
International Conference on Cyber Warfare and Security 19 (1), 299-307, 2024
22024
Hybrid Learning Framework for Cybersecurity Courses
S Mandal, B George
Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021
22021
Modular norm models: practical representation and analysis of contractual rights and obligations
S Mandal, R Gandhi, H Siy
Requirements Engineering 25, 383-412, 2020
22020
Driving secure software initiatives using FISMA: Issues and Opportunities
R Gandhi, K Crosby, TGR Solutions, LH Siy, S Mandal
CrossTalk 29 (1), 37-41, 2016
22016
Improvements on Hiding x86-64 Instructions by Interleaving
W Mahoney, JT McDonald, G Grispos, S Mandal
International Conference on Cyber Warfare and Security 18 (1), 246-255, 2023
12023
Cybercrime Classification: A Victimology-based approach
S Mandal
International Conference on Cyber Warfare and Security 19 (1), 156-167, 2024
2024
Search and CompAre Reverse (SCAR): A Bioinformatics–Inspired Methodology for Detecting File Remnants in Digital Forensics
G Grispos, W Mahoney, S Mandal
International Conference on Cyber Warfare and Security 18 (1), 119-127, 2023
2023
Modular norm models: practical representation and analysis of contractual rights and obligations (vol 25, pg 383, 2020)
S Mandal, R Gandhi, H Siy
REQUIREMENTS ENGINEERING 25 (3), 413-413, 2020
2020
A Framework for Analyzing Federal Regulations for Information Security
S Mandal
2015
Measures to Abate Evil Twin Attacks in 802.11
S Mandal, N Veldanda
Proceedings of the 7th International Conference on Information Warfare and …, 2012
2012
A Three-stage Phase Encoding Technique for Quantum Key Distribution
F Zamani, S Mandal, PK Verma
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
2012
系统目前无法执行此操作,请稍后再试。
文章 1–19