# | List of Publication by Prof. Nirnay Ghosh |
---|---|
1 | Satyaki Roy, Ronojoy Dutta, Nirnay Ghosh, and Preetam Ghosh, Adaptive Motif-based Topology Control in Mobile Software-Defined Wireless Sensor Networks, IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), 2021 |
2 | Satyaki Roy, Ronojoy Dutta, Nirnay Ghosh, and Preetam Ghosh, Leveraging Periodicity to Improve Quality of Service in Mobile Software-Defined Wireless Sensor Networks, IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), 2021 |
3 | Satyaki Roy, Nirnay Ghosh, Preetam Ghosh, and Sajal K Das, bioMCS: A Bio-inspired Collaborative Data Transfer Framework over Fog Computing Platforms in Mobile Crowdsensing, DOI:https://doi.org/10.1145/3369740.3369788, ACM International Conference on Distributed Computing and Networking (ICDCN), 2020 |
4 | Vinay Sachinandan, Suhas Bhairav, Nirnay Ghosh, and Yuval Elovici, PIT: A Probe into Internet of Things by Comprehensive Security Analysis, 522-529, IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom), 2019 |
5 | Nirnay Ghosh, Rishabh Singhal, and Sajal K Das, R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations, 247-254, ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2019 |
6 | Satyaki Roy*, Nirnay Ghosh*, and Sajal K Das, bioSmartSense: A Bio-inspired Data Collection Framework for Energy-efficient, QoI-aware Smart City Applications, 10.1109/PERCOM.2019.8767392, IEEE International Conference on Pervasive Computing and Communications (PerCom), 2019 |
7 | Rajesh P Barnwal, Nirnay Ghosh, Soumya K Ghosh, and Sajal K Das, PS-Sim: A Framework for Scalable Simulation of Participatory Sensing Data, 195-202, IEEE International Conference on Smart Computing (SMARTCOMP), 2018 |
8 | Shameek Bhattacharjee, Nirnay Ghosh, Vijay K Shah, and Sajal K Das, QnQ: A Reputation Model to Secure Mobile Crowdsourcing Applications from Incentive Losses, 10.1109/CNS.2017.8228635, IEEE Conference on Communications and Network Security (CNS), 2017 |
9 | Shameek Bhattacharjee, Nirnay Ghosh, Vijay K Shah, and Sajal K Das, W2Q: A Dual-Weighted QoI Scoring Mechanism in Social Sensing using Community Confidence, 375-380, IEEE IQ2S (PerCom Workshop), 2017 |
10 | Rajesh P Barnwal, Nirnay Ghosh, Soumya K Ghosh, and Sajal K Das, Enhancing Reliability of Vehicular Participatory Sensing Network: A Bayesian Approach, 10.1109/SMARTCOMP.2016.7501689, IEEE International Conference on Smart Computing (SMARTCOMP), 2016 |
11 | Nirnay Ghosh, Rajesh P Barnwal, Soumya K Ghosh, and Sajal K Das, A Probabilistic Approach to Filter out Spam Reports in a Participatory Sensing-based Vehicular Traffic Management System, 10.1109/COMSNETS.2016.7439932, IEEE International Conference on Communication Systems and Networks (COMSNETS), 2016 |
12 | Anant Pushkar, Nirnay Ghosh, Soumya K Ghosh, A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-centric Collaborations, LNCS Vol. 9478, 243-262, International Conference on Information Systems Security (ICISS), 2015 |
13 | Nirnay Ghosh, Ishan Chokshi, Mithun Sarkar, Soumya K Ghosh, Anil K Kaushik, and Sajal K Das, NetSecuritas: An Integrated Attack Graphbased Security Assessment Tool for Enterprise Networks, 10.1145/2684464.2684494, ACM International Conference on Distributed Computing and Networking (ICDCN), 2015 |
14 | Nirnay Ghosh, Debangshu Chatterjee, and Soumya K Ghosh, An Efficient Heuristic-based Role Mapping Framework for Secure and Fair Collaboration in SaaS Cloud, 227-236, IEEE International Conference on Cloud and Autonomic Computing (ICCAC), 2014 |
15 | Nirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, and Soumya K Ghosh, Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach, 329-336, IEEE International Conference on Security and Cryptography (SECRYPT), 2014 |
16 | Ishan Chokshi, Nirnay Ghosh, and Soumya K Ghosh, Efficient Generation of Exploit Dependency Graph by Customized Attack Modelling Technique, 39-45, IEEE International Conference on Advanced Computing and Communications (ADCOM), 2012 |
17 | Arkadeep Kundu, Nirnay Ghosh, Ishan Chokshi, and Soumya K Ghosh, Analysis of Attack Graph-based Metrics for Quantification of Network Security, 530-535, IEEE India Conference (INDICON), 2012 |
18 | Nirnay Ghosh, and Soumya K Ghosh, An Approach to Identify and Monitor SLA Parameters for Storage-as-a-Service Cloud Delivery Model, 724-729, IEEE Globecom Workshops, 2012 |
19 | Nirnay Ghosh, Saurav Nanda, and Soumya K Ghosh, An ACO based Approach for Detection of an Optimal Attack Path in a Dynamic Environment, LNCS Vol. 5935, 509-520, International Conference on Distributed Computing and Networking (ICDCN), 2010 |
20 | Nirnay Ghosh and Soumya K Ghosh, An Approach for Security Assessment of Network Configurations using Attack Graph, 283-288, IEEE International Conference on Networks & Communications (NetCom), 2009 |
21 | Nirnay Ghosh, and Soumya K Ghosh, An Intelligent Technique for Generating Minimal Attack Graph, 42-51, First Workshop on Intelligent Security (Security and Artificial Intelligence) (SecArt 2009), 2009 |
22 | Nirnay Ghosh, Sourav Nanda, and Soumya K Ghosh, A Quantitative Approach towards Detection of an Optimal Attack Path in a Wireless Network using Modified PSO Technique, 10.1109/COMSNETS.2009.4808869, IEEE International Conference on Communication Systems and Networks (COMSNETS), 2009 |
Created: 23 November 2019