A new approach of text Steganography based on mathematical model of number system KK Mandal, A Jana, V Agarwal 2014 International Conference on Circuits, Power and Computing Technologies …, 2014 | 23 | 2014 |
Extending abstract interpretation to dependency analysis of database applications A Jana, R Halder, KV Abhishekh, SD Ganni, A Cortesi IEEE Transactions on Software Engineering 46 (5), 463-494, 2018 | 19 | 2018 |
On preventing SQL injection attacks BK Ahuja, A Jana, A Swarnkar, R Halder Advanced Computing and Systems for Security: Volume 1, 49-64, 2016 | 18 | 2016 |
Input-based analysis approach to prevent SQL injection attacks A Jana, P Bordoloi, D Maity 2020 IEEE Region 10 Symposium (TENSYMP), 1290-1293, 2020 | 11 | 2020 |
Data leakage analysis of the hibernate query language on a propositional formulae domain R Halder, A Jana, A Cortesi Transactions on Large-Scale Data-and Knowledge-Centered Systems XXIII …, 2016 | 11 | 2016 |
A Symbolic Model Checker for Database Programs A Jana, MI Alam, R Halder International Conference on Software Technologies (ICSOFT), 381-388, 2018 | 9 | 2018 |
Policy-based slicing of hibernate query language A Jana, R Halder, N Chaki, A Cortesi Computer Information Systems and Industrial Management: 14th IFIP TC 8 …, 2015 | 9 | 2015 |
Code-based analysis approach to detect and prevent SQL injection attacks A Jana, D Maity 2020 11th International Conference on Computing, Communication and …, 2020 | 7 | 2020 |
Defining abstract semantics for static dependence analysis of relational database applications A Jana, R Halder Information Systems Security: 12th International Conference, ICISS 2016 …, 2016 | 7 | 2016 |
A survey of Indian Cyber crime and law and its pre-vention approach A Jana, KK Mandal International Journal of Advanced Computer Technology (IJACT) 2 (1), 48-55, 2012 | 3 | 2012 |
A static analysis approach to detect confidentiality leakage of database query languages A Jana International Conference on Intelligent Systems Design and Applications, 794-804, 2020 | 2 | 2020 |
Data-centric Refinement of Database-Database Dependency Analysis of Database Program. A Jana ICSOFT, 234-241, 2020 | 2 | 2020 |
Verification of hibernate query language by abstract interpretation A Jana, R Halder, A Cortesi Intelligence Science and Big Data Engineering. Big Data and Machine Learning …, 2015 | 2 | 2015 |
Policy-Based Code Slicing of Database Application Using Semantic Rule-Based Approach A Kashyap, A Jana International Conference on Innovations in Bio-Inspired Computing and …, 2022 | 1 | 2022 |
Confidentiality leakage analysis of database-driven applications A Jana, A Kashyap Advances in Computing and Data Sciences: 5th International Conference …, 2021 | 1 | 2021 |
A Network Model to Study the Underlying Characteristics of Phishing Sites A Gayen, S Santra, A Dey, A Jana IEEE Networking Letters, 2023 | | 2023 |
Secured Peer-to-Peer Energy Trading and Demand Response in Transactive Energy Systems S Panda, N Chakraborty, A Jana 2023 OITS International Conference on Information Technology (OCIT), 793-798, 2023 | | 2023 |
Identification of ‘Early Career Stage’Researchers from large scale Bibliographic dataset A Gayen, T Mukherjea, S Mukherjee, A Jana 2023 14th International Conference on Computing Communication and Networking …, 2023 | | 2023 |
Characterization of ‘Early Career Stage’Researchers from their Co-authorship Network A Gayen, T Mukherjea, A Jana 2023 IEEE Guwahati Subsection Conference (GCON), 1-6, 2023 | | 2023 |
Extending Semantic based Techniques for Policy-based Slicing of Database Program. A Kashyap, A Jana International Journal of Computer Information Systems & Industrial …, 2023 | | 2023 |