default search action
Amrita Ghosal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Subir Halder, Amrita Ghosal, Mauro Conti:
Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks. IEEE Trans. Wirel. Commun. 22(2): 1014-1028 (2023) - [c19]Subir Halder, Amrita Ghosal, Thomas Newe, Sajal K. Das:
SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT. CNS 2023: 1-9 - 2022
- [j22]Fran Casino, Thomas K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, István Böröcz, Agusti Solanas, Mauro Conti, Constantinos Patsakis:
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 10: 25464-25493 (2022) - [j21]Amrita Ghosal, Subir Halder, Mauro Conti:
Secure over-the-air software update for connected vehicles. Comput. Networks 218: 109394 (2022) - [j20]Vasilios Koutsokostas, Nikolaos Lykousas, Theodoros Apostolopoulos, Gabriele Orazi, Amrita Ghosal, Fran Casino, Mauro Conti, Constantinos Patsakis:
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents. Comput. Secur. 114: 102582 (2022) - [c18]Trupil Limbasiya, Amrita Ghosal, Mauro Conti:
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks. ICDCN 2022: 208-216 - [c17]Hafiz Ahmad Awais Chaudhary, Ivan Guevara, Jobish John, Amandeep Singh, Amrita Ghosal, Dirk Pesch, Tiziana Margaria:
Model-Driven Engineering in Digital Thread Platforms: A Practical Use Case and Future Challenges. ISoLA (4) 2022: 195-207 - 2021
- [j19]Amrita Ghosal, Sang Uk Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti, Radha Poovendran, Linda Bushnell:
Truck platoon security: State-of-the-art and road ahead. Comput. Networks 185: 107658 (2021) - [c16]Jobish John, Amrita Ghosal, Tiziana Margaria, Dirk Pesch:
DSLs for Model Driven Development of Secure Interoperable Automation Systems with EdgeX Foundry. FDL 2021: 1-8 - [c15]Jobish John, Amrita Ghosal, Tiziana Margaria, Dirk Pesch:
DSLs and Middleware Platforms in a Model-Driven Development Approach for Secure Predictive Maintenance Systems in Smart Factories. ISoLA 2021: 146-161 - [i3]Fran Casino, Tom K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, István Böröcz, Agusti Solanas, Mauro Conti, Constantinos Patsakis:
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics. CoRR abs/2108.04634 (2021) - 2020
- [j18]Amrita Ghosal, Mauro Conti:
Security issues and challenges in V2X: A Survey. Comput. Networks 169: 107093 (2020) - [j17]Subir Halder, Amrita Ghosal, Mauro Conti:
Secure over-the-air software updates in connected vehicles: A survey. Comput. Networks 178: 107343 (2020) - [j16]Amrita Ghosal, Subir Halder, Sajal K. Das:
Distributed on-demand clustering algorithm for lifetime optimization in wireless sensor networks. J. Parallel Distributed Comput. 141: 129-142 (2020) - [c14]Amrita Ghosal, Subir Halder, Mauro Conti:
STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles. ICC 2020: 1-6
2010 – 2019
- 2019
- [j15]Subir Halder, Amrita Ghosal, Mauro Conti:
Efficient physical intrusion detection in Internet of Things: A Node deployment approach. Comput. Networks 154: 28-46 (2019) - [j14]Amrita Ghosal, Mauro Conti:
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey. IEEE Commun. Surv. Tutorials 21(3): 2831-2848 (2019) - [j13]Subir Halder, Amrita Ghosal, Mauro Conti:
LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things. Wirel. Networks 25(8): 4459-4477 (2019) - [c13]Amrita Ghosal, Subir Halder, Mauro Conti:
DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things. ICCCN 2019: 1-9 - [i2]Subir Halder, Amrita Ghosal, Mauro Conti:
Secure OTA Software Updates in Connected Vehicles: A survey. CoRR abs/1904.00685 (2019) - 2018
- [i1]Amrita Ghosal, Mauro Conti:
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey. CoRR abs/1806.00121 (2018) - 2017
- [j12]Amrita Ghosal, Subir Halder:
A survey on energy efficient intrusion detection in wireless sensor networks. J. Ambient Intell. Smart Environ. 9(2): 239-261 (2017) - [j11]Amrita Ghosal, Subir Halder, Stefano Chessa:
Secure key design approaches using entropy harvesting in wireless sensor network: A survey. J. Netw. Comput. Appl. 78: 216-230 (2017) - [j10]Amrita Ghosal, Subir Halder:
Lifetime Optimizing Clustering Structure Using Archimedes' Spiral-Based Deployment in WSNs. IEEE Syst. J. 11(2): 1039-1048 (2017) - [j9]Subir Halder, Amrita Ghosal:
Lifetime enhancement of wireless sensor networks by avoiding energy-holes with Gaussian distribution. Telecommun. Syst. 64(1): 113-133 (2017) - 2016
- [j8]Subir Halder, Amrita Ghosal:
A survey on mobility-assisted localization techniques in wireless sensor networks. J. Netw. Comput. Appl. 60: 82-94 (2016) - [j7]Amrita Ghosal, Subir Halder:
Lifespan prolonging location-wise predetermined deployment strategy for visual sensor networks. J. Netw. Comput. Appl. 63: 86-97 (2016) - [j6]Subir Halder, Amrita Ghosal:
A Location-Wise Predetermined Deployment for Optimizing Lifetime in Visual Sensor Networks. IEEE Trans. Circuits Syst. Video Technol. 26(6): 1131-1145 (2016) - [j5]Subir Halder, Amrita Ghosal:
A survey on mobile anchor assisted localization techniques in wireless sensor networks. Wirel. Networks 22(7): 2317-2336 (2016) - 2015
- [j4]Amrita Ghosal, Sipra Das Bit:
A lightweight security scheme for query processing in clustered wireless sensor networks. Comput. Electr. Eng. 41: 240-255 (2015) - [c12]Subir Halder, Amrita Ghosal:
A Predetermined Deployment Technique for Lifetime Optimization in Clustered WSNs. ICA3PP (4) 2015: 682-696 - [c11]Amrita Ghosal, Subir Halder:
Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor Networks. ICDCIT 2015: 325-330 - [c10]Subir Halder, Amrita Ghosal:
Lifetime maximizing clustering structure using archimedes' spiral based deployment in WSNs. IM 2015: 592-598 - [p2]Amrita Ghosal, Subir Halder:
Security in Mobile Wireless Sensor Networks: Attacks and Defenses. Advances in Social Media Analysis 2015: 185-205 - 2014
- [c9]Subir Halder, Amrita Ghosal:
Enhancing the lifespan of visual sensor networks using a predetermined node deployment strategy. ISCC 2014: 1-6 - [c8]Amrita Ghosal, Subir Halder:
Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks. UIC/ATC/ScalCom 2014: 406-411 - 2013
- [j3]Amrita Ghosal, Sipra Das Bit:
A jamming-attack-defending data forwarding scheme based on channel surfing in wireless sensor networks. Secur. Commun. Networks 6(11): 1367-1388 (2013) - [c7]Subir Halder, Amrita Ghosal:
Is Sensor Deployment Using Gaussian Distribution Energy Balanced? ICA3PP (1) 2013: 58-71 - [c6]Amrita Ghosal, Aadirupa Saha, Sipra Das Bit:
Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks. PAISI 2013: 82-96 - [p1]Amrita Ghosal, Subir Halder:
Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches. Wireless Networks and Security 2013: 329-367 - 2012
- [j2]Amrita Ghosal, Subir Halder, DasBit Sipra:
A dynamic TDMA based scheme for securing query processing in WSN. Wirel. Networks 18(2): 165-184 (2012) - [c5]Amrita Ghosal, Sanjib Sur, DasBit Sipra:
μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks. DPM/SETOP 2012: 258-273 - 2011
- [j1]Halder Subir, Amrita Ghosal, DasBit Sipra:
A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network. Comput. Commun. 34(11): 1294-1306 (2011) - [c4]Halder Subir, Amrita Ghosal, Amartya Chaudhuri, DasBit Sipra:
A Probability Density Function for Energy-Balanced Lifetime-Enhancing Node Deployment in WSN. ICCSA (4) 2011: 472-487 - [c3]Subir Halder, Amrita Ghosal, Aadirupa Saha, DasBit Sipra:
Energy-Balancing and Lifetime Enhancement of Wireless Sensor Network with Archimedes Spiral. UIC 2011: 420-434 - 2010
- [c2]Amrita Ghosal, Halder Subir, Sanjib Sur, Dan Avishek, DasBit Sipra:
Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN. ICCSA (3) 2010: 321-335
2000 – 2009
- 2009
- [c1]Halder Subir, Amrita Ghosal, Sanjib Sur, Dan Avishek, DasBit Sipra:
A Lifetime Enhancing Node Deployment Strategy in WSN. FGIT 2009: 295-307
Coauthor Index
aka: Halder Subir
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint