Folgen
SANTOSH BISWAS
SANTOSH BISWAS
Professor of CSE, Indian Institute of Technology Bhilai
Bestätigte E-Mail-Adresse bei iitbhilai.ac.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A neural network based system for intrusion detection and attack classification
B Subba, S Biswas, S Karmakar
2016 twenty second National Conference on Communication (NCC), 1-6, 2016
1492016
Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation
B Subba, S Biswas, S Karmakar
Engineering Science and Technology, an International Journal 19 (2), 782-799, 2016
982016
A game theory based multi layered intrusion detection framework for VANET
B Subba, S Biswas, S Karmakar
Future Generation Computer Systems 82, 12-28, 2018
842018
Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization
M Agarwal, D Pasumarthi, S Biswas, S Nandi
International Journal of Machine Learning and Cybernetics 7, 1035-1051, 2016
632016
Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis
B Subba, S Biswas, S Karmakar
2016 IEEE International Conference on Advanced Networks and …, 2016
562016
Intrusion detection systems using linear discriminant analysis and logistic regression
B Subba, S Biswas, S Karmakar
2015 Annual IEEE India Conference (INDICON), 1-6, 2015
542015
Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol
FA Barbhuiya, S Biswas, S Nandi
Proceedings of the 4th International Conference on Security of Information …, 2011
522011
LAN attack detection using discrete event systems
N Hubballi, S Biswas, S Roopa, R Ratti, S Nandi
ISA transactions 50 (1), 119-130, 2011
482011
Detection of de-authentication dos attacks in wi-fi networks: A machine learning approach
M Agarwal, S Biswas, S Nandi
2015 IEEE International Conference on Systems, Man, and Cybernetics, 246-251, 2015
472015
An efficient scheme to detect evil twin rogue access point attack in 802.11 Wi-Fi networks
M Agarwal, S Biswas, S Nandi
International Journal of Wireless Information Networks 25, 130-145, 2018
452018
A game theory based multi layered intrusion detection framework for wireless sensor networks
B Subba, S Biswas, S Karmakar
International Journal of Wireless Information Networks 25 (4), 399-421, 2018
442018
Sequencegram: n-gram modeling of system calls for program based anomaly detection
N Hubballi, S Biswas, S Nandi
2011 Third International Conference on Communication Systems and Networks …, 2011
422011
Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system
M Agarwal, S Purwar, S Biswas, S Nandi
IEEE/CAA Journal of Automatica Sinica 4 (4), 792-808, 2016
412016
Detection of neighbor discovery protocol based attacks in IPv6 network
FA Barbhuiya, G Bansal, N Kumar, S Biswas, S Nandi
Networking Science 2, 91-113, 2013
412013
Host based intrusion detection system using frequency analysis of n-gram terms
B Subba, S Biswas, S Karmakar
TENCON 2017-2017 IEEE Region 10 Conference, 2006-2011, 2017
402017
Discrete event system framework for fault diagnosis with measurement inconsistency: Case study of rogue DHCP attack
M Agarwal, S Biswas, S Nandi
IEEE/CAA Journal of Automatica Sinica 6 (3), 789-806, 2017
372017
Advanced stealth man-in-the-middle attack in WPA2 encrypted Wi-Fi networks
M Agarwal, S Biswas, S Nandi
IEEE communications letters 19 (4), 581-584, 2015
362015
Detection of De-authentication Denial of Service attack in 802.11 networks
M Agarwal, S Biswas, S Nandi
2013 Annual IEEE India Conference (INDICON), 1-6, 2013
342013
Layered higher order n-grams for hardening payload based anomaly intrusion detection
N Hubballi, S Biswas, S Nandi
2010 International Conference on Availability, Reliability and Security, 321-326, 2010
332010
Detection of NDP based attacks using MLD
G Bansal, N Kumar, S Nandi, S Biswas
Proceedings of the Fifth International Conference on Security of Information …, 2012
322012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20