Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security A Mondal, RT Goswami Microprocessors and Microsystems 81, 103719, 2021 | 55 | 2021 |
Cloud computing security issues & challenges: A Review A Mondal, S Paul, RT Goswami, S Nath 2020 International Conference on Computer Communication and Informatics …, 2020 | 43 | 2020 |
Review Study on Different Attack Strategies of Worm in a Network. A Mondal, AK Das, S Nath, RT Goswami Webology 17 (2), 363-375, 2020 | 9 | 2020 |
Combined MST-graph coloring algorithm for PCI distribution of LTE-advanced self-organizing network S Acharya, AK Das, A Mondal, RT Goswami Ambient Communications and Computer Systems: RACCCS 2017, 261-270, 2018 | 7 | 2018 |
Automated signature generation for polymorphic worms using substrings extraction and principal component analysis A Mondal, S Paul, A Mitra, B Gope 2015 IEEE International Conference on Computational Intelligence and …, 2015 | 5 | 2015 |
Destination source correlation algorithm to monitor local networks: A worm detection technique S Nath, D Pal, A Mondal Materials Today: Proceedings 81, 141-147, 2023 | 3 | 2023 |
PCA and substring extraction technique to generate signature for polymorphic worm: An automated approach A Mondal, AK Das, S Satpathi, RT Goswami Emerging Technologies in Data Mining and Information Security: Proceedings …, 2021 | 3 | 2021 |
An Efficient Detection and Prevention Approach of Unknown Malicious Attack: A Novel Honeypot Approach A Sarfaraz, A Jha, A Mondal, RT Goswami Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 11-19, 2022 | 2 | 2022 |
Generate signature for polymorphic worm: A real-time Honeypot approach A Mondal, S Nath, P Bose, RT Goswami Proceedings of 6th International Conference on Recent Trends in Computing …, 2021 | 2 | 2021 |
Cloud Allocation Technique: A Comparative Study S Nath, P Bose, A Mondal, AK Das 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile …, 2020 | 1 | 2020 |