A survey on security issues in cloud computing R Bhadauria, R Chaki, N Chaki, S Sanyal arXiv preprint arXiv:1109.5388, 1-15, 2011 | 217 | 2011 |
Sleep deprivation attack detection in wireless sensor network T Bhattasali, R Chaki, S Sanyal arXiv preprint arXiv:1203.0231, 2012 | 144 | 2012 |
A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks DB Roy, R Chaki, N Chaki arXiv preprint arXiv:1004.0587, 2010 | 107 | 2010 |
Exploring neural networks with C R Tadeusiewicz, R Chaki, N Chaki CRC Press, 2014 | 86 | 2014 |
A survey of recent intrusion detection systems for wireless sensor network T Bhattasali, R Chaki Advances in Network Security and Applications: 4th International Conference …, 2011 | 76 | 2011 |
Secure and trusted cloud of things T Bhattasali, R Chaki, N Chaki 2013 Annual IEEE India Conference (INDICON), 1-6, 2013 | 61 | 2013 |
IDSX: a cluster based collaborative intrusion detection algorithm for mobile ad-hoc network R Chaki, N Chaki 6th International Conference on Computer Information Systems and Industrial …, 2007 | 52 | 2007 |
Applications of wireless sensor network in Intelligent Traffic System: A review A Sharma, R Chaki, U Bhattacharya 2011 3rd International Conference on Electronics Computer Technology 5, 53-57, 2011 | 48 | 2011 |
HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks P Sen, N Chaki, R Chaki 2008 7th Computer Information Systems and Industrial Management Applications …, 2008 | 37 | 2008 |
A survey of security and privacy issues for biometrics based remote authentication in cloud T Bhattasali, K Saeed, N Chaki, R Chaki Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014 | 36 | 2014 |
SECURITY ISSUES IN CLOUD COMPUTING. R Bhadauria, R Chaki, N Chaki, S Sanyal Acta technica corviniensis-bulletin of engineering 7 (4), 2014 | 30 | 2014 |
MADSN: mobile agent based detection of selfish node in MANET DB Roy, R Chaki International Journal of Wireless & Mobile Networks (IJWMN) 3 (4), 225-235, 2011 | 30 | 2011 |
Study of security issues in pervasive environment of next generation internet of things T Bhattasali, R Chaki, N Chaki Computer Information Systems and Industrial Management: 12th IFIP TC8 …, 2013 | 29 | 2013 |
A brief review of data mining application involving protein sequence classification S Saha, R Chaki Advances in Computing and Information Technology: Proceedings of the Second …, 2013 | 27 | 2013 |
Load balancing in cellular network: A review A Sharma, A Roy, S Ghosal, R Chaki, U Bhattacharya 2012 Third International Conference on Computing, Communication and …, 2012 | 26 | 2012 |
An adaptation of context and trust aware workflow oriented access control for remote healthcare T Bhattasali, R Chaki, N Chaki, K Saeed International Journal of Software Engineering and Knowledge Engineering 28 …, 2018 | 24 | 2018 |
AMC model for denial of sleep attack detection T Bhattasali, R Chaki arXiv preprint arXiv:1203.1777, 2012 | 23 | 2012 |
Application of data mining in protein sequence classification S Saha, R Chaki arXiv preprint arXiv:1211.4654, 2012 | 20 | 2012 |
Bhapsc: A new black hole attack prevention system in clustered manet I Nath, R Chaki International Journal of Advanced Research in Computer Science and Software …, 2012 | 19 | 2012 |
Bio-authentication for layered remote health monitor framework T Bhattasali, K Saeed, N Chaki, R Chaki Journal of medical informatics & technologies 23, 131--139, 2014 | 18 | 2014 |