Sleep Deprivation Attack Detection in Wireless Sensor Network T Bhattasali, R Chaki, S Sanyal International Journal of Computer Application, 2012 | 153 | 2012 |
A survey of recent intrusion detection systems for wireless sensor network T Bhattasali, R Chaki Advances in Network Security and Applications, CCIS, Springer, 268-280, 2011 | 82 | 2011 |
Secure and Trusted Cloud of Things T Bhattasali, R Chaki, N Chaki IEEE INDICON, 2013, 1-6, 2013 | 64 | 2013 |
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud T Bhattasali, K Saeed, N Chaki, R Chaki Computer Information Systems and Industrial Management, LNCS, Springer, 112-121, 2014 | 41 | 2014 |
New Directions in Behavioral Biometrics SHS K. Saeed, M. Adamski, T. Bhattasali, M.K. Nammous, P. Panasiuk, M. Rybnik Book by CRC Press, 2016 | 33* | 2016 |
LICRYPT: Lightweight Cryptography Technique for Securing Smart Objects in Internet of Things Environment T Bhattasali CSI Communications, 2013 | 30 | 2013 |
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things T Bhattasali, R Chaki, N Chaki Computer Information Systems and Industrial Management, LNCS, Springer, 206-217, 2013 | 28 | 2013 |
An adaptation of context and trust aware workflow oriented access control for remote healthcare T Bhattasali, R Chaki, N Chaki, K Saeed International Journal of Software Engineering and Knowledge Engineering 28 …, 2018 | 26 | 2018 |
AMC Model for Denial of Sleep Attack Detection T Bhattasali, R Chaki JRRT Journal, 2012 | 25 | 2012 |
Two factor remote authentication in healthcare T Bhattasali, K Saeed Proceedings of IEEE International conference on Advances in Computing …, 2014 | 22 | 2014 |
Lightweight hierarchical model for HWSNET T Bhattasali, R Chaki IJASSN Journal, 2011 | 20 | 2011 |
Bio-authentication for layered remote health monitor framework T Bhattasali, K Saeed, N Chaki, R Chaki Journal of medical informatics & technologies 23, 131--139, 2014 | 17 | 2014 |
Modular logic of authentication using dynamic keystroke pattern analysis T Bhattasali, P Panasiuk, K Saeed, N Chaki, R Chaki ICNAAM, AIP Publishing, American Institute of Physics, 2015 | 10 | 2015 |
Anomaly detection using machine learning approaches MD Nath, T Bhattasali Azerbaijan Journal of High Performance Computing 3 (2), 196-206, 2020 | 7 | 2020 |
Impact of Blockchain to Secure E-Banking Transaction MD Nath, T Bhattasali Int. J. Comput. Sci. Eng 7 (18), 1-6, 2019 | 4 | 2019 |
Poster: exploring security as a service for IoT enabled remote application framework T Bhattasali, N Chaki Proceedings of 14th Annual International Conference on Mobile Systems …, 2016 | 4 | 2016 |
Typing Pattern Analysis for Fake Profile Detection in Social Media KS Tapalina Bhattasali Springer LNCS, 2021 | 3* | 2021 |
Heterogeneous services in layered framework of iot enabled assisted living T Bhattasali, N Chaki Proceedings of Workshop on IoT-enabled Healthcare and Wellness Technologies …, 2016 | 3 | 2016 |
Context and Trust Aware Workflow Oriented Access Framework T Bhattasali, N Chaki, R Chaki, K Saeed Proceedings of 28th International Conference on Software Engineering and …, 2016 | 3 | 2016 |
Technological Innovations for Environmental Sustainability T Bhattasali, X Savarimuthu Go Green for Environmental Sustainability, 101-114, 2021 | 2 | 2021 |