TIDS: trust-based intrusion detection system for wireless ad-hoc networks N Deb, N Chaki Computer Information Systems and Industrial Management: 11th IFIP TC 8 …, 2012 | 21 | 2012 |
Sentence embedding models for similarity detection of software requirements S Das, N Deb, A Cortesi, N Chaki SN Computer Science 2, 1-11, 2021 | 19 | 2021 |
A state-of-the-art survey on IDS for mobile ad-hoc networks and wireless mesh networks N Deb, M Chakraborty, N Chaki Advances in Parallel Distributed Computing: First International Conference …, 2011 | 14 | 2011 |
Requirement-oriented risk management for incremental software development M Roy, N Deb, A Cortesi, R Chaki, N Chaki Innovations in Systems and Software Engineering 17 (3), 187-204, 2021 | 10 | 2021 |
Extracting finite state models from i* models N Deb, N Chaki, A Ghose Journal of Systems and Software 121, 265-280, 2016 | 9 | 2016 |
NFR‐aware prioritization of software requirements M Roy, N Deb, A Cortesi, R Chaki, N Chaki Systems Engineering 24 (3), 158-176, 2021 | 8 | 2021 |
Node localization for indoor tracking using artificial neural network R Samanta, C Kumari, N Deb, S Bose, A Cortesi, N Chaki 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC …, 2018 | 8 | 2018 |
Using i∗model towards ontology integration and completeness checking in enterprise systems requirement hierarchy N Deb, N Chaki, A Ghose 2015 IEEE International Model-Driven Requirements Engineering Workshop …, 2015 | 8 | 2015 |
CORIDS: a cluster‐oriented reward‐based intrusion detection system for wireless mesh networks N Deb, M Chakraborty, N Chaki Security and Communication Networks 7 (3), 532-543, 2014 | 8 | 2014 |
i* tonusmv: A prototype for enabling model checking of i* models N Deb, N Chaki, A Ghose 2016 IEEE 24th International Requirements Engineering Conference (RE), 397-398, 2016 | 6 | 2016 |
POMSec: Pseudo-opportunistic, multipath secured routing protocol for communications in smart grid M Chakraborty, N Deb, N Chaki Computer Information Systems and Industrial Management: 16th IFIP TC8 …, 2017 | 5 | 2017 |
Correlating contexts and NFR conflicts from event logs M Roy, S Das, N Deb, A Cortesi, R Chaki, N Chaki Software and Systems Modeling 22 (6), 1987-2010, 2023 | 4 | 2023 |
Chlorpyrifos toxicity in fish: a review. Curr. World Environ. 8, 77–84 N Deb, S Das | 4 | 2013 |
Extracting goal models from natural language requirement specifications S Das, N Deb, A Cortesi, N Chaki Journal of Systems and Software 211, 111981, 2024 | 3 | 2024 |
CARO: a conflict-aware requirement ordering tool for DevOps M Roy, N Deb, A Cortesi, R Chaki, N Chaki 2021 IEEE 29th International Requirements Engineering Conference (RE), 442-443, 2021 | 3 | 2021 |
Mining goal refinement patterns: distilling know-how from data M Santiputri, N Deb, MA Khan, A Ghose, H Dam, N Chaki International Conference on Conceptual Modeling, 69-76, 2017 | 3 | 2017 |
THE EVOLUTION OF IDS SOLUTIONS IN WIRELESS AD-HOC NETWORKS TO WIRELESS MESH NETWORKS N Deb, M Chakraborty, N Chaki International Journal of Network Security & Its Applications 3 (6), 39, 2011 | 3 | 2011 |
Extracting Business Compliant Finite State Models from I Models N Deb, N Chaki, M Roy, S Pal, A Bhaumick Advanced Computing and Systems for Security: Volume Nine, 39-52, 2019 | 2 | 2019 |
SCARS: Suturing Wounds due to Conflicts between Non-Functional Requirements in Robotic Systems M Roy, R Bag, N Deb, A Cortesi, R Chaki, N Chaki Authorea Preprints, 2023 | 1 | 2023 |
Driving the Technology Value Stream by Analyzing App Reviews S Das, N Deb, N Chaki, A Cortesi IEEE Transactions on Software Engineering, 2023 | 1 | 2023 |