Sleep Deprivation Attack Detection in Wireless Sensor Network T Bhattasali, R Chaki, S Sanyal International Journal of Computer Application, 2012 | 114 | 2012 |
A survey of recent intrusion detection systems for wireless sensor network T Bhattasali, R Chaki Advances in Network Security and Applications, CCIS, Springer, 268-280, 2011 | 52 | 2011 |
Secure and Trusted Cloud of Things T Bhattasali, R Chaki, N Chaki IEEE INDICON, 2013, 1-6, 2013 | 46 | 2013 |
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud T Bhattasali, K Saeed, N Chaki, R Chaki Computer Information Systems and Industrial Management, LNCS, Springer, 112-121, 2014 | 26 | 2014 |
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things T Bhattasali, R Chaki, N Chaki Computer Information Systems and Industrial Management, LNCS, Springer, 206-217, 2013 | 24 | 2013 |
LICRYPT: Lightweight Cryptography Technique for Securing Smart Objects in Internet of Things Environment T Bhattasali CSI Communications, 2013 | 19 | 2013 |
AMC Model for Denial of Sleep Attack Detection T Bhattasali, R Chaki JRRT Journal, 2012 | 18 | 2012 |
New Directions in Behavioral Biometrics SHS K. Saeed, M. Adamski, T. Bhattasali, M.K. Nammous, P. Panasiuk, M. Rybnik Book by CRC Press, 2016 | 17* | 2016 |
Two factor remote authentication in healthcare T Bhattasali, K Saeed Proceedings of IEEE International conference on Advances in Computing …, 2014 | 15 | 2014 |
Lightweight hierarchical model for HWSNET T Bhattasali, R Chaki IJASSN Journal, 2011 | 14 | 2011 |
Bio-authentication for layered remote health monitor framework T Bhattasali, K Saeed, N Chaki, R Chaki Journal of Medical Informatics & Technologies 23, 2014 | 13 | 2014 |
An adaptation of context and trust aware workflow oriented access control for remote healthcare T Bhattasali, R Chaki, N Chaki, K Saeed International Journal of Software Engineering and Knowledge Engineering 28 …, 2018 | 10 | 2018 |
Modular logic of authentication using dynamic keystroke pattern analysis T Bhattasali, P Panasiuk, K Saeed, N Chaki, R Chaki ICNAAM, AIP Publishing, American Institute of Physics, 2015 | 7 | 2015 |
Poster: exploring security as a service for IoT enabled remote application framework T Bhattasali, N Chaki Proceedings of 14th Annual International Conference on Mobile Systems …, 2016 | 4 | 2016 |
Heterogeneous services in layered framework of iot enabled assisted living T Bhattasali, N Chaki Proceedings of Workshop on IoT-enabled Healthcare and Wellness Technologies …, 2016 | 3 | 2016 |
Context and Trust Aware Workflow Oriented Access Framework T Bhattasali, N Chaki, R Chaki, K Saeed Proceedings of 28th International Conference on Software Engineering and …, 2016 | 3 | 2016 |
SEGNET: Secure Geo-Sensor Network Model T Bhattasali arXiv preprint arXiv:1209.6262, 2012 | 1 | 2012 |
Pandemic Analytics to Assess Risk of COVID-19 Outbreak T Bhattasali Azerbaijan Journal of High Performance Computing, 2020 | | 2020 |
SCMCI: Secured Click and Mortar Commercial Interaction TB M Das Nath CCIS,Springer, 2020 | | 2020 |
Impact of Blockchain to Secure E-Banking Transaction TB M DasNath IJCSE, 2019 | | 2019 |