Остановите войну!
for scientists:
default search action
Santosh Biswas
- > Home > Persons > Santosh Biswas
Publications
- 2024
- [j54]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. Int. J. Inf. Sec. 23(2): 915-934 (2024) - 2023
- [j53]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Pinaki Mitra, Sukumar Nandi:
A Novel Energy-Efficient Scheme for RPL Attacker Identification in IoT Networks Using Discrete Event Modeling. IEEE Access 11: 77267-77291 (2023) - [j49]Pradeepkumar Bhale, Debanjan Roy Chowdhury, Santosh Biswas, Sukumar Nandi:
OPTIMIST: Lightweight and Transparent IDS With Optimum Placement Strategy to Mitigate Mixed-Rate DDoS Attacks in IoT Networks. IEEE Internet Things J. 10(10): 8357-8370 (2023) - [j48]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
Effective injection of adversarial botnet attacks in IoT ecosystem using evolutionary computing. Internet Technol. Lett. 6(4) (2023) - 2021
- [c81]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
LIENE: Lifetime Enhancement for 6LoWPAN Network Using Clustering Approach Use Case: Smart Agriculture. I4CS 2021: 59-75 - [c80]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
ML for IEEE 802.15. 4e/TSCH: Energy Efficient Approach to Detect DDoS Attack Using Machine Learning. IWCMC 2021: 1477-1482 - [c74]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi, Pinaki Mitra:
DAISS: Design of an Attacker Identification Scheme in CoAP Request/Response Spoofing. TENCON 2021: 941-946 - 2020
- [c72]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi, Pinaki Mitra:
ArsPAN: Attacker Revelation Scheme using Discrete Event System in 6LoWPAN based Buffer Reservation Attack. IEEE ANTS 2020: 1-6 - [c70]Pradeepkumar Bhale, Sukanta Dey, Santosh Biswas, Sukumar Nandi:
Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network. I4CS 2020: 187-207 - [c69]Pradeepkumar Bhale, Satya Prakash, Santosh Biswas, Sukumar Nandi:
BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network. I4CS 2020: 208-223 - [c68]Amrita Bose Paul, Susmita Mondal, Santosh Biswas, Sukumar Nandi:
TA-ACS: A Trust Aware Adaptive Carrier Selection Scheme for Reliable Routing in Delay Tolerant Networks. I4CS 2020: 227-244 - [c67]Amrita Bose Paul, Akhil GV, Santosh Biswas, Sukumar Nandi, Niladri Sett:
SAS: Seasonality Aware Social-Based Forwarder Selection in Delay Tolerant Networks. I4CS 2020: 245-265 - 2019
- [j32]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
Discrete event system framework for fault diagnosis with measurement inconsistency: case study of rogue DHCP attack. IEEE CAA J. Autom. Sinica 6(3): 789-806 (2019) - [c58]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
LORD: LOw Rate DDoS Attack Detection and Mitigation Using Lightweight Distributed Packet Inspection Agent in IoT Ecosystem. ANTS 2019: 1-6 - 2018
- [j25]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks. Int. J. Wirel. Inf. Networks 25(2): 130-145 (2018) - [j22]Amrita Bose Paul, Santosh Biswas, Sukumar Nandi, Sandip Chakraborty:
MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing. J. Netw. Comput. Appl. 104: 1-20 (2018) - 2017
- [j18]Mayank Agarwal, Sanketh Purwar, Santosh Biswas, Sukumar Nandi:
Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system. IEEE CAA J. Autom. Sinica 4(4): 792-808 (2017) - 2016
- [j14]Mayank Agarwal, Dileep Pasumarthi, Santosh Biswas, Sukumar Nandi:
Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization. Int. J. Mach. Learn. Cybern. 7(6): 1035-1051 (2016) - 2015
- [j12]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks. IEEE Commun. Lett. 19(4): 581-584 (2015) - [c37]Amrita Bose Paul, Sandip Chakraborty, Suddhasil De, Sukumar Nandi, Santosh Biswas:
Adaptive path selection for high throughput Heterogeneous Wireless Mesh Networks. IEEE ANTS 2015: 1-6 - [c33]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
I2-diagnosability framework for detection of Advanced Stealth Man in the Middle attack in Wi-Fi networks. MED 2015: 349-356 - [c31]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach. SMC 2015: 246-251 - 2014
- [c27]Amrita Bose Paul, Shantanu Konwar, Santosh Biswas, Sukumar Nandi:
M-HRP for Wireless Mesh Networks and its performance evaluation. COMSNETS 2014: 1-4 - 2013
- [j7]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Towards reducing false alarms in network intrusion detection systems with data summarization technique. Secur. Commun. Networks 6(3): 275-285 (2013) - [i1]Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi:
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification. CoRR abs/1306.1332 (2013) - 2012
- [c24]Gunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas:
Detection of NDP based attacks using MLD. SIN 2012: 163-167 - [c23]Ferdous A. Barbhuiya, Vaibhav Gupta, Santosh Biswas, Sukumar Nandi:
Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack. SERE 2012: 291-300 - [c22]Ferdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi:
An Active Detection Mechanism for Detecting ICMP Based Attacks. TrustCom 2012: 51-58 - 2011
- [j5]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Network specific false alarm reduction in intrusion detection system. Secur. Commun. Networks 4(11): 1339-1349 (2011) - [c21]Amrita Bose Paul, Shantanu Konwar, Upola Gogoi, Sukumar Nandi, Santosh Biswas:
E-AODV for Wireless Mesh Networks and Its Performance Evaluation. BWCCA 2011: 26-33 - [c20]Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi:
A host based DES approach for detecting ARP spoofing. CICS 2011: 114-121 - [c19]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Sequencegram: n-gram modeling of system calls for program based anomaly detection. COMSNETS 2011: 1-10 - [c18]Santosh Kumar, Sukumar Nandi, Santosh Biswas:
Research and application of One-class small hypersphere support vector machine for network anomaly detection. COMSNETS 2011: 1-4 - [c17]Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi:
Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. SIN 2011: 111-118 - [c16]Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi:
An active DES based IDS for ARP spoofing. SMC 2011: 2743-2748 - 2010
- [c15]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection. ARES 2010: 321-326 - [c12]Santosh Kumar, Sukumar Nandi, Santosh Biswas:
Peer-to-Peer Network Classification Using nu-Maximal Margin Spherical Structured Multiclass Support Vector Machine. ICDEM 2010: 80-84 - [c11]Bidyut Kr. Patra, Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Distance Based Fast Hierarchical Clustering Method for Large Datasets. RSCTC 2010: 50-59 - [c10]Neminath Hubballi, S. Roopa, Ritesh Ratti, Ferdous A. Barbhuiya, Santosh Biswas, Arijit Sur, Sukumar Nandi, Vivek Ramachandran:
An Active Intrusion Detection System for LAN Specific Attacks. AST/UCMA/ISA/ACN 2010: 129-142
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-09 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint