Implementation of secure quantum protocol using multiple photons for communication S Mandal, G Macdonald, ME Rifai, N Punekar, F Zamani, Y Chen, S Kak, ... arXiv preprint arXiv:1208.6198, 2012 | 23 | 2012 |
A Framework for Modular Norm Extraction, Modeling and Reasoning S Mandal University of Nebraska at Omaha, 2017 | 20 | 2017 |
Multi-photon implementation of three-stage quantum cryptography protocol S Mandal, G Macdonald, M El Rifai, N Punekar, F Zamani, Y Chen, S Kak, ... The International Conference on Information Networking 2013 (ICOIN), 6-11, 2013 | 20 | 2013 |
Implementing Diffie-Hellman key exchange using quantum EPR pairs S Mandal, A Parakh Quantum Information and Computation XIII 9500, 23-29, 2015 | 9 | 2015 |
Modular norm models: A lightweight approach for modeling and reasoning about legal compliance S Mandal, R Gandhi, H Siy 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 8 | 2017 |
Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security S Mandal, R Gandhi, H Siy 2015 IEEE Eighth International Workshop on Requirements Engineering and Law …, 2015 | 6 | 2015 |
Gauging the impact of FISMA on software security RA Gandhi, K Crosby, H Siy, S Mandal Computer 47 (09), 103-107, 2014 | 6 | 2014 |
Implementation of the three-stage protocol over free space optics S Mandal University of Oklahoma, 2012 | 5 | 2012 |
Cybersafe: Gamifying Cybersecurity Training with a Training App C Roque, G Moodley, S Mandal International Conference on Cyber Warfare and Security 19 (1), 299-307, 2024 | 2 | 2024 |
Hybrid Learning Framework for Cybersecurity Courses S Mandal, B George Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021 | 2 | 2021 |
Modular norm models: practical representation and analysis of contractual rights and obligations S Mandal, R Gandhi, H Siy Requirements Engineering 25, 383-412, 2020 | 2 | 2020 |
Driving secure software initiatives using FISMA: Issues and Opportunities R Gandhi, K Crosby, TGR Solutions, LH Siy, S Mandal CrossTalk 29 (1), 37-41, 2016 | 2 | 2016 |
Improvements on Hiding x86-64 Instructions by Interleaving W Mahoney, JT McDonald, G Grispos, S Mandal International Conference on Cyber Warfare and Security 18 (1), 246-255, 2023 | 1 | 2023 |
Cybercrime Classification: A Victimology-based approach S Mandal International Conference on Cyber Warfare and Security 19 (1), 156-167, 2024 | | 2024 |
Search and CompAre Reverse (SCAR): A Bioinformatics–Inspired Methodology for Detecting File Remnants in Digital Forensics G Grispos, W Mahoney, S Mandal International Conference on Cyber Warfare and Security 18 (1), 119-127, 2023 | | 2023 |
Modular norm models: practical representation and analysis of contractual rights and obligations (vol 25, pg 383, 2020) S Mandal, R Gandhi, H Siy REQUIREMENTS ENGINEERING 25 (3), 413-413, 2020 | | 2020 |
A Framework for Analyzing Federal Regulations for Information Security S Mandal | | 2015 |
Measures to Abate Evil Twin Attacks in 802.11 S Mandal, N Veldanda Proceedings of the 7th International Conference on Information Warfare and …, 2012 | | 2012 |
A Three-stage Phase Encoding Technique for Quantum Key Distribution F Zamani, S Mandal, PK Verma Proceedings of the International Conference on Security and Management (SAM), 1, 2012 | | 2012 |