default search action
Nirnay Ghosh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Shayantan Halder, Satyaki Roy, Preetam Ghosh, Nirnay Ghosh:
ADRIN2.0: Enabling Post-Disaster Communication Through Adaptive Mobility-Informed Routing. IEEE Access 12: 102368-102380 (2024) - [j17]Debasmita Dey, Nirnay Ghosh:
iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning. Ad Hoc Networks 163: 103586 (2024) - [j16]Satyaki Roy, Nirnay Ghosh, Nitish M. Uplavikar, Preetam Ghosh:
Towards a Unified Pandemic Management Architecture: Survey, Challenges, and Future Directions. ACM Comput. Surv. 56(2): 38:1-38:32 (2024) - [j15]Utsa Roy, Nirnay Ghosh:
BloAC: A blockchain-based secure access control management for the Internet of Things. J. Inf. Secur. Appl. 87: 103897 (2024) - [j14]Utsa Roy, Nirnay Ghosh:
FabMAN: A Framework for Ledger Storage and Size Management for Hyperledger Fabric-Based IoT Applications. IEEE Trans. Netw. Serv. Manag. 21(3): 3140-3151 (2024) - [c20]Shayantan Halder, Satyaki Roy, Preetam Ghosh, Nirnay Ghosh:
ADRIN: An Adaptive and Distributed Routing Mechanism for Challenged IoT Networks. COMSNETS 2024: 769-772 - [i5]Jayasree Sengupta, Debasmita Dey, Simone Ferlin, Nirnay Ghosh, Vaibhav Bajpai:
Accelerating Tactile Internet with QUIC: A Security and Privacy Perspective. CoRR abs/2401.06657 (2024) - [i4]Debasmita Dey, Nirnay Ghosh:
iTRPL: An Intelligent and Trusted RPL Protocol based on Multi-Agent Reinforcement Learning. CoRR abs/2403.04416 (2024) - 2023
- [c19]Debasmita Dey, Saket Chandra, Nirnay Ghosh:
HessianAuth: An ECC-based Distributed and Efficient Authentication Mechanism for 6LoWPAN Networked IoT Devices. ICDCN 2023: 227-236 - 2022
- [j13]Satyaki Roy, Preetam Ghosh, Nirnay Ghosh, Sajal K. Das:
Transcriptional Regulatory Network Topology with Applications to Bio-inspired Networking: A Survey. ACM Comput. Surv. 54(8): 166:1-166:36 (2022) - [j12]Utsa Roy, Satyaki Roy, Rajshekhar Khan, Preetam Ghosh, Nirnay Ghosh:
MCR: A Motif Centrality-Based Distributed Message Routing for Disaster Area Networks. IEEE Internet Things J. 9(24): 25337-25349 (2022) - [i3]Satyaki Roy, Nirnay Ghosh, Nitish M. Uplavikar, Preetam Ghosh:
Towards a Unified Pandemic Management Architecture: Survey, Challenges and Future Directions. CoRR abs/2202.07448 (2022) - 2021
- [j11]Satyaki Roy, Andrii Cherevko, Sayak Chakraborty, Nirnay Ghosh, Preetam Ghosh:
Leveraging Network Science for Social Distancing to Curb Pandemic Spread. IEEE Access 9: 26196-26207 (2021) - [j10]Satyaki Roy, Nirnay Ghosh, Preetam Ghosh, Sajal K. Das:
bioMCS 2.0: A distributed, energy-aware fog-based framework for data forwarding in mobile crowdsensing. Pervasive Mob. Comput. 73: 101381 (2021) - [c18]Satyaki Roy, Ronojoy Dutta, Nirnay Ghosh, Preetam Ghosh:
Adaptive Motif-based Topology Control in Mobile Software Defined Wireless Sensor Networks. CCNC 2021: 1-6 - [c17]Satyaki Roy, Ronojoy Dutta, Nirnay Ghosh, Preetam Ghosh:
Leveraging Periodicity to Improve Quality of Service in Mobile Software Defined Wireless Sensor Networks. CCNC 2021: 1-2 - 2020
- [j9]Satyaki Roy, Nirnay Ghosh, Sajal K. Das:
bioSmartSense+: A bio-inspired probabilistic data collection framework for priority-based event reporting in IoT environments. Pervasive Mob. Comput. 67: 101179 (2020) - [j8]Rajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh, Sajal K. Das:
Publish or Drop Traffic Event Alerts? Quality-aware Decision Making in Participatory Sensing-based Vehicular CPS. ACM Trans. Cyber Phys. Syst. 4(1): 9:1-9:28 (2020) - [j7]Shameek Bhattacharjee, Nirnay Ghosh, Vijay K. Shah, Sajal K. Das:
QnQ: Quality and Quantity Based Unified Approach for Secure and Trustworthy Mobile Crowdsensing. IEEE Trans. Mob. Comput. 19(1): 200-216 (2020) - [c16]Satyaki Roy, Nirnay Ghosh, Preetam Ghosh, Sajal K. Das:
bioMCS: A Bio-inspired Collaborative Data Transfer Framework over Fog Computing Platforms in Mobile Crowdsensing. ICDCN 2020: 23:1-23:10
2010 – 2019
- 2019
- [j6]Nirnay Ghosh, Saket Chandra, Vinay Sachidananda, Yuval Elovici:
SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT. IEEE Internet Things J. 6(6): 10773-10785 (2019) - [j5]Rajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh, Sajal K. Das:
PS-Sim: A framework for scalable data simulation and incentivization in participatory sensing-based smart city applications. Pervasive Mob. Comput. 57: 64-77 (2019) - [c15]Nirnay Ghosh, Rishabh Singhal, Sajal K. Das:
R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations. AsiaCCS 2019: 247-254 - [c14]Satyaki Roy, Nirnay Ghosh, Sajal K. Das:
bioSmartSense: A Bio-inspired Data Collection Framework for Energy-efficient, QoI-aware Smart City Applications. PerCom 2019: 1-10 - [c13]Vinay Sachidananda, Suhas Bhairav, Nirnay Ghosh, Yuval Elovici:
PIT: A Probe Into Internet of Things by Comprehensive Security Analysis. TrustCom/BigDataSE 2019: 522-529 - 2018
- [c12]Rajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh, Sajal K. Das:
PS-Sim: A Framework for Scalable Simulation of Participatory Sensing Data. SMARTCOMP 2018: 195-202 - [i2]Rajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh, Sajal K. Das:
PS-Sim: A Framework for Scalable Simulation of Participatory Sensing Data. CoRR abs/1808.09801 (2018) - 2017
- [j4]Francesco Restuccia, Nirnay Ghosh, Shameek Bhattacharjee, Sajal K. Das, Tommaso Melodia:
Quality of Information in Mobile Crowdsensing: Survey and Research Challenges. ACM Trans. Sens. Networks 13(4): 34:1-34:43 (2017) - [c11]Shameek Bhattacharjee, Nirnay Ghosh, Vijay K. Shah, Sajal K. Das:
QnQ: A reputation model to secure mobile crowdsourcing applications from incentive losses. CNS 2017: 1-9 - [c10]Shameek Bhattacharjee, Nirnay Ghosh, Vijay K. Shah, Sajal K. Das:
W2Q: A dual weighted QoI scoring mechanism in social sensing using community confidence. PerCom Workshops 2017: 375-380 - [i1]Francesco Restuccia, Nirnay Ghosh, Shameek Bhattacharjee, Sajal K. Das, Tommaso Melodia:
Quality of Information in Mobile Crowdsensing: Survey and Research Challenges. CoRR abs/1709.03583 (2017) - 2016
- [j3]Nirnay Ghosh, Debangshu Chatterjee, Soumya K. Ghosh, Sajal K. Das:
Securing Loosely-Coupled Collaboration in Cloud Environment through Dynamic Detection and Removal of Access Conflicts. IEEE Trans. Cloud Comput. 4(3): 349-362 (2016) - [c9]Nirnay Ghosh, Rajesh P. Barnwal, Soumya K. Ghosh, Sajal K. Das:
A probabilistic approach for filtering out spam reports in a vehicular participatory sensing system. COMSNETS 2016: 1-2 - [c8]Rajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh, Sajal K. Das:
Enhancing Reliability of Vehicular Participatory Sensing Network: A Bayesian Approach. SMARTCOMP 2016: 1-8 - 2015
- [j2]Nirnay Ghosh, Soumya K. Ghosh, Sajal K. Das:
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers. IEEE Trans. Cloud Comput. 3(1): 66-79 (2015) - [c7]Nirnay Ghosh, Ishan Chokshi, Mithun Sarkar, Soumya K. Ghosh, Anil Kumar Kaushik, Sajal K. Das:
NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks. ICDCN 2015: 30:1-30:10 - [c6]Anant Pushkar, Nirnay Ghosh, Soumya K. Ghosh:
A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations. ICISS 2015: 243-262 - 2014
- [c5]Nirnay Ghosh, Debangshu Chatterjee, Soumya K. Ghosh:
An Efficient Heuristic-Based Role Mapping Framework for Secure and Fair Collaboration in SaaS Cloud. ICCAC 2014: 227-236 - [c4]Nirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, Soumya K. Ghosh:
Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach. SECRYPT 2014: 329-336 - [p2]Rajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh:
Data and Application Security in Cloud. Bio-inspiring Cyber Security and Cloud Services 2014: 479-495 - 2012
- [j1]Nirnay Ghosh, Soumya K. Ghosh:
A planner-based approach to generate and analyze minimal attack graph. Appl. Intell. 36(2): 369-390 (2012) - [c3]Nirnay Ghosh, Soumya K. Ghosh:
An approach to identify and monitor SLA parameters for storage-as-a-service cloud delivery model. GLOBECOM Workshops 2012: 724-729 - 2010
- [c2]Nirnay Ghosh, Saurav Nanda, Soumya K. Ghosh:
An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment. ICDCN 2010: 509-520 - [p1]Nirnay Ghosh, Soumya K. Ghosh:
An Intelligent Approach for Security Management of an Enterprise Network Using Planner. Intelligent Autonomous Systems 2010: 187-214
2000 – 2009
- 2009
- [c1]Nirnay Ghosh, Soumya K. Ghosh:
An Approach for Security Assessment of Network Configurations Using Attack Graph. NetCoM 2009: 283-288
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint