Volgen
Biswajit Panja
Biswajit Panja
Geverifieerd e-mailadres voor emich.edu
Titel
Geciteerd door
Geciteerd door
Jaar
A secure hierarchical model for sensor network
M Tubaishat, J Yin, B Panja, S Madria
ACM Sigmod Record 33 (1), 7-13, 2004
1102004
Energy and communication efficient group key management protocol for hierarchical sensor networks
B Panja, SK Madria, B Bhargava
IEEE international conference on sensor networks, ubiquitous, and …, 2006
772006
A role-based access in a hierarchical sensor network architecture to provide multilevel security
B Panja, SK Madria, B Bhargava
Computer Communications 31 (4), 793-806, 2008
412008
Cybersecurity in banking and financial sector: Security analysis of a mobile banking application
B Panja, D Fattaleh, M Mercado, A Robinson, P Meharia
2013 international conference on collaboration technologies and systems (CTS …, 2013
352013
Wirelessly sensing open parking spaces: Accounting and management of parking facility
B Panja, B Schneider, P Meharia
222011
Handling cross site scripting attacks using cache check to reduce webpage rendering time with elimination of sanitization and filtering in light weight mobile web browser
B Panja, T Gennarelli, P Meharia
2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-7, 2015
172015
Real-time logic verification of a wireless sensor network
J Green, S Bhattacharyya, B Panja
2009 WRI World Congress on Computer Science and Information Engineering 3 …, 2009
152009
Training of intelligent intrusion detection system using neuro fuzzy
B Panja, O Ogunyanwo, P Meharia
15th IEEE/ACIS International Conference on Software Engineering, Artificial …, 2014
142014
Energy-efficient group key management protocols for hierarchical sensor networks
B Panja, S Madria, B Bhargava
International Journal of Distributed Sensor Networks 3 (2), 201-223, 2007
142007
Crime analysis mapping, intrusion detection-using data mining
B Panja, P Meharia, K Mannem
2020 IEEE Technology & Engineering Management Conference (TEMSCON), 1-5, 2020
82020
Security in wireless sensor networks for health monitoring helmet with anomaly detection using power analysis and probabilistic model
B Panja, Z Scott, P Meharia
2014 IEEE Conference on Wireless Sensors (ICWiSE), 73-78, 2014
82014
Monitoring and managing cloud computing security using denial of service bandwidth allowance
B Panja, B Bhargava, S Pati, D Paul, LT Lilien, P Meharia
Recent Patents on Computer Science 6 (1), 73-81, 2013
82013
An energy and communication efficient group key in sensor networks using elliptic curve polynomial
B Panja, SK Madria
International Conference on Ad-Hoc Networks and Wireless, 153-171, 2007
72007
Intelligent gateway for SCADA system security: A multi-layer attack prevention approach
B Panja, J Oros, J Britton, P Meharia, S Pati
2015 IEEE International Conference on Computational Intelligence and Virtual …, 2015
32015
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services.
B Panja, D Morrison, P Meharia, B Bhargava, A Prakash
International Journal of Next-Generation Computing 5 (3), 2014
32014
A survey of dynamic key management schemes in sensor networks
B Panja, SK Madria
Intelligent techniques for warehousing and mining sensor network data, 326-351, 2010
32010
Integration of v2v with cloud computing to provide group security through the use of 4G LTE
B Panja, D Morrison, S Turner, P Meharia
ICCWS2014-9 th International Conference on Cyber Warfare and Security: ICCWS …, 2014
22014
Vehicle health monitoring system using secure wireless sensor network
B Panja, L Wolleschensky
Commercial Aviation Cyber Security: Current State and Essential Reading, 27, 2016
12016
Detection and classification of vehicles using wireless sensor network technology
P Garrity, S Bhattacharyya, C Shen, D Dawadi, B Panja
Journal of Information Systems Technology & Planning 4 (7), 2011
12011
Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection
B Panja
International Journal of Computer Science & Network Security 24 (5), 111-118, 2024
2024
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20