Soumya K. Ghosh
Titolo
Citata da
Citata da
Anno
iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments
H Gupta, A Vahid Dastjerdi, SK Ghosh, R Buyya
Software: Practice and Experience 47 (9), 1275-1296, 2017
6952017
Fog computing: Principles, architectures, and applications
AV Dastjerdi, H Gupta, RN Calheiros, SK Ghosh, R Buyya
Internet of things, 61-75, 2016
3472016
Enhancement of lifetime using duty cycle and network coding in wireless sensor networks
RR Rout, SK Ghosh
IEEE Transactions on Wireless Communications 12 (2), 656-667, 2012
1942012
SelCSP: A framework to facilitate selection of cloud service providers
N Ghosh, SK Ghosh, SK Das
IEEE transactions on cloud computing 3 (1), 66-79, 2014
1062014
A review on telemedicine-based WBAN framework for patient monitoring
C Chakraborty, B Gupta, SK Ghosh
Telemedicine and e-Health 19 (8), 619-626, 2013
952013
Optical character recognition systems
A Chaudhuri, K Mandaviya, P Badelia, SK Ghosh
Optical Character Recognition Systems for Different Languages with Soft …, 2017
652017
An approach for service oriented discovery and retrieval of spatial data
M Paul, SK Ghosh
Proceedings of the 2006 international workshop on Service-oriented software …, 2006
582006
Spatial interpolation to predict missing attributes in GIS using semantic kriging
S Bhattacharjee, P Mitra, SK Ghosh
IEEE Transactions on Geoscience and Remote Sensing 52 (8), 4771-4780, 2013
542013
Conditional random field based named entity recognition in geological text
N Sobhana, P Mitra, SK Ghosh
International Journal of Computer Applications 1 (3), 143-147, 2010
522010
Adaptive data aggregation and energy efficiency using network coding in a clustered wireless sensor network: An analytical approach
RR Rout, SK Ghosh
Computer Communications 40, 65-75, 2014
502014
Deep-STEP: A deep learning approach for spatiotemporal prediction of remote sensing data
M Das, SK Ghosh
IEEE Geoscience and Remote Sensing Letters 13 (12), 1984-1988, 2016
462016
A planner-based approach to generate and analyze minimal attack graph
N Ghosh, SK Ghosh
Applied Intelligence 36 (2), 369-390, 2012
462012
An approach for security assessment of network configurations using attack graph
N Ghosh, SK Ghosh
2009 First International Conference on Networks & Communications, 283-288, 2009
352009
Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks
RP Barnwal, SK Ghosh
2012 International Conference on Connected Vehicles and Expo (ICCVE), 29-34, 2012
332012
An intelligent technique for generating minimal attack graph
N Ghosh, SK Ghosh
First Workshop on Intelligent Security (Security and Artificial Intelligence …, 2009
332009
STACRP: a secure trusted auction oriented clustering based routing protocol for MANET
P Chatterjee, I Sengupta, SK Ghosh
Cluster Computing 15 (3), 303-320, 2012
322012
A probabilistic nonlinear model for forecasting daily water level in reservoir
M Das, SK Ghosh, VM Chowdary, A Saikrishnaveni, RK Sharma
Water Resources Management 30 (9), 3107-3122, 2016
302016
On network lifetime expectancy with realistic sensing and traffic generation model in wireless sensor networks
A Chakraborty, RR Rout, A Chakrabarti, SK Ghosh
IEEE Sensors Journal 13 (7), 2771-2779, 2013
292013
An approach to identify and monitor sla parameters for storage-as-a-service cloud delivery model
N Ghosh, SK Ghosh
2012 IEEE Globecom Workshops, 724-729, 2012
282012
Policy based security analysis in enterprise networks: A formal approach
P Bera, SK Ghosh, P Dasgupta
IEEE Transactions on Network and Service Management 7 (4), 231-243, 2010
282010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20