Остановите войну!
for scientists:
default search action
Chandan Mazumdar
- > Home > Persons > Chandan Mazumdar
Publications
- 2022
- [j19]Asmita Manna, Anirban Sengupta, Chandan Mazumdar:
A risk-based methodology for privacy requirements elicitation and control selection. Secur. Priv. 5(1) (2022) - [j18]Preetam Mukherjee, Anirban Sengupta, Chandan Mazumdar:
"Security Gap" as a metric for enterprise business processes. Secur. Priv. 5(6) (2022) - [c29]Sagnik Lahiri, Sumit Misra, Sanjoy Kumar Saha, Chandan Mazumdar:
Clustering-Based Semi-supervised Technique for Credit Card Fraud Detection. CICBA 2022: 260-268 - 2020
- [c27]Puloma Roy, Anirban Sengupta, Chandan Mazumdar:
A Structured Control Selection Methodology for Insider Threat Mitigation. CENTERIS/ProjMAN/HCist 2020: 1187-1195 - 2019
- [j17]Preetam Mukherjee, Chandan Mazumdar:
"Security Concern" as a Metric for Enterprise Business Processes. IEEE Syst. J. 13(4): 4015-4026 (2019) - [j16]Preetam Mukherjee, Chandan Mazumdar:
Corrections to "'Security Concern' as a Metric for Enterprise Business Processes". IEEE Syst. J. 13(4): 4484 (2019) - [c26]Asmita Manna, Anirban Sengupta, Chandan Mazumdar:
A Quantitative Methodology for Business Process-Based Data Privacy Risk Computation. ACSS (2) 2019: 17-33 - 2018
- [c25]Preetam Mukherjee, Chandan Mazumdar:
Attack Difficulty Metric for Assessment of Network Security. ARES 2018: 44:1-44:10 - 2017
- [j15]Sumit Misra, Sanjoy Kumar Saha, Chandan Mazumdar:
A dynamic model for short-term prediction of stream attributes. Innov. Syst. Softw. Eng. 13(4): 261-269 (2017) - [c24]Biswajit Halder, Mridul Sankar Barik, Chandan Mazumdar:
A graph based formalism for detecting flow conflicts in software defined network. ANTS 2017: 1-6 - [c23]Srijita Basu, Anirban Sengupta, Chandan Mazumdar:
A Quantitative Methodology for Cloud Security Risk Assessment. CLOSER 2017: 92-103 - 2016
- [j14]Srijita Basu, Anirban Sengupta, Chandan Mazumdar:
Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy. Enterp. Inf. Syst. 10(9): 1024-1046 (2016) - [c20]Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta:
Network Vulnerability Analysis Using a Constrained Graph Data Model. ICISS 2016: 263-282 - [c19]Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar:
A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes. ICISSP 2016: 388-399 - [c18]Srijita Basu, Anirban Sengupta, Chandan Mazumdar:
An Automated Methodology for Secured User Allocation in Cloud. SSCC 2016: 137-151 - 2015
- [j13]Susmita Bhaduri, Orchisama Das, Sanjoy Kumar Saha, Chandan Mazumdar:
Rhythm analysis of tablā signal by detecting the cyclic pattern. Innov. Syst. Softw. Eng. 11(3): 187-195 (2015) - [j12]Subhasis Dasgupta, Pinakpani Pal, Chandan Mazumdar, Aditya Bagchi:
Resolving authorization conflicts by ontology views for controlled access to a digital library. J. Knowl. Manag. 19(1): 45-59 (2015) - [c17]Preetam Mukherjee, Chandan Mazumdar:
A Novel Model of Security Policies and Requirements. ICISSP 2015: 73-82 - [c16]Puloma Roy, Chandan Mazumdar:
Modelling of Enterprise Insider Threats. ICISSP 2015: 132-136 - 2014
- [j10]Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar, Mridul Sankar Barik:
A two-phase quantitative methodology for enterprise information security risk analysis. Comput. Syst. Sci. Eng. 29(1) (2014) - [c15]Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar:
A Formal Methodology for Modeling Threats to Enterprise Assets. ICISS 2014: 149-166 - [c14]Mridul Sankar Barik, Chandan Mazumdar:
A Graph Data Model for Attack Graph Generation and Analysis. SNDS 2014: 239-250 - 2013
- [c13]Sumit Misra, Sanjoy Kumar Saha, Chandan Mazumdar:
Performance Comparison of Hadoop Based Tools with Commercial ETL Tools - A Case Study. BDA 2013: 176-184 - [c12]Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar:
A formal methodology for Enterprise Information Security risk assessment. CRiSIS 2013: 1-9 - 2012
- [c11]Anirban Sengupta, Chandan Mazumdar, Aditya Bagchi:
Specification and validation of enterprise information security policies. CUBE 2012: 801-808 - [c10]Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar, Mridul Sankar Barik:
A two-phase quantitative methodology for enterprise information security risk analysis. CUBE 2012: 809-815 - 2011
- [j8]Anirban Sengupta, Chandan Mazumdar:
A Mark-Up Language for the Specification of Information Security Governance Requirements. Int. J. Inf. Secur. Priv. 5(2): 33-53 (2011) - [j7]Anirban Sengupta, Chandan Mazumdar, Aditya Bagchi:
A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System. J. Netw. Syst. Manag. 19(3): 319-342 (2011) - [c9]Sulagna Bandopadhyay, Anirban Sengupta, Chandan Mazumdar:
A quantitative methodology for information security control gap analysis. ICCCS 2011: 537-540 - 2009
- [c8]Anirban Sengupta, Chandan Mazumdar, Aditya Bagchi:
A formal methodology for detection of vulnerabilities in an enterprise information system. CRiSIS 2009: 74-81 - 2007
- [j5]Mridul Sankar Barik, Gaurav Gupta, Shubhro Sinha, Alok Mishra, Chandan Mazumdar:
An efficient technique for enhancing forensic capabilities of Ext2 file system. Digit. Investig. 4(Supplement): 55-61 (2007) - [c6]Gaurav Gupta, Sanjoy Kumar Saha, Shayok Chakraborty, Chandan Mazumdar:
Document Frauds: Identification and Linking Fake Document to Scanners and Printers. ICCTA 2007: 497-501 - 2006
- [j4]Gaurav Gupta, Chandan Mazumdar, M. S. Rao, R. B. Bhosale:
Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents. Digit. Investig. 3(1): 43-55 (2006) - 2005
- [c4]Anirban Sengupta, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar:
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security . ICISS 2005: 328-331 - 2004
- [j3]Gaurav Gupta, Chandan Mazumdar, M. S. Rao:
Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol. Int. J. Digit. EVid. 2(4) (2004) - 2002
- [j2]S. S. Murthy, Chandan Mazumdar, M. S. Rao, A. K. Pal:
Intensity-based image matching for regular firearms. Int. J. Imaging Syst. Technol. 12(2): 68-72 (2002) - [c3]Surajit Dutta, Sudip Dutta, Riddhi Burman, Mridul Sankar Barik, Chandan Mazumdar:
Design and Implementation of a Soft Real Time Fault Tolerant System. IWDC 2002: 319-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint