DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks D Boro, DK Bhattacharyya Microsystem Technologies 23, 593-611, 2017 | 29 | 2017 |
Anomaly based intrusion detection using meta ensemble classifier D Boro, B Nongpoh, DK Bhattacharyya Proceedings of the Fifth International Conference on Security of Information …, 2012 | 16 | 2012 |
UDP flooding attack detection using information metric measure D Boro, H Basumatary, T Goswami, DK Bhattacharyya Proceedings of International Conference on ICT for Sustainable Development …, 2016 | 15 | 2016 |
Particle swarm optimisation-based KNN for improving KNN and ensemble classification performance D Boro, DK Bhattacharyya International Journal of Innovative Computing and Applications 6 (3-4), 145-162, 2015 | 5 | 2015 |
A fast self-similarity matrix-based method for shrew DDoS attack detection D Boro, M Haloi, DK Bhattacharyya Information Security Journal: A Global Perspective 29 (2), 73-90, 2020 | 4 | 2020 |
SSE_CIB: Secure storage and exchange of copyrighted images using blockchain KP Kalita, D Boro, DK Bhattacharyya Transactions on Emerging Telecommunications Technologies 35 (2), e4936, 2024 | 2 | 2024 |
A Smart Feature Reduction Approach to Detect Botnet Attack in IoT RK Deka, KP Kalita, DK Bhattacharyya, D Boro Emerging Technologies for Smart Cities: Select Proceedings of EGTET 2020, 17-23, 2021 | 2 | 2021 |
Slowloris Attack Detection Using Adaptive Timeout-Based Approach. K Talukdar, D Boro ISeCure 16 (1), 2024 | 1 | 2024 |
An Efficient Consensus Algorithm for Blockchain-Based Federated Learning KP Kalita, D Boro, DK Bhattacharyya 2023 International Conference on Intelligent Systems, Advanced Computing and …, 2023 | 1 | 2023 |
Driving Behavior Analysis Using Deep Learning on GPS Data SK Singh, U Anand, A Patel, D Boro International Conference on Emerging Global Trends in Engineering and …, 2022 | 1 | 2022 |
Implementation of Minimally Shared Blockchains using Big Data Applications KP Kalita, D Boro, DK Bhattacharyya 2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP), 48-54, 2020 | 1 | 2020 |
Optimal feature subset selection using a multi-level hybrid model BJ Chutia, D Boro, DK Bhattacharyya CNC: Proceedings of International Conference on Advances in Communication …, 2014 | 1 | 2014 |
Meta ensemble classifier based stacked generalization for anomaly based intrusion detection D Boro, DK Bhattacharyya Network and Information Security: Issues, Challenges and Research Trends, 25-35, 2013 | 1 | 2013 |
Shrew DDoS Attack Detection Based on Statistical Analysis N Gogoi, DK Bhattacharyya, D Boro The ISC International Journal of Information Security 16 (2), 205-220, 2024 | | 2024 |
Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities KP Kalita, D Boro, D Kumar Bhattacharyya Security and Privacy, 2024 | | 2024 |
Electromagnetic Signal Analysis: A Vulnerability to Edge Computing Driven IoT Devices D Das, D Boro 2023 4th International Conference on Computing and Communication Systems …, 2023 | | 2023 |
An Enhanced Blockchain Consensus Mechanism Using Proof-of-Work and Proof-of-Stake KP Kalita, JC Kharbhih, D Boro, DK Bhattacharyya International Conference on Emerging Global Trends in Engineering and …, 2022 | | 2022 |
Blockchain with Adjustable Proof-of-Work Consensus Mechanism for Mobile Devices KP Kalita, E Rani, D Boro, DK Bhattacharyya International Conference on Emerging Global Trends in Engineering and …, 2022 | | 2022 |
An empirical performance evaluation of f-divergence measures for detection of popular HRDDoS attacks D Boro, H Basumatary, T Goswami, B Baruah, DK Bhattacharyya International Journal of Computer Networks and Wireless Communications …, 2018 | | 2018 |
Improving KNN performance for ensemble classification using Particle Swarm Optimization D Boro, DK Bhattacharyya Proceedings of CCSN'14 5 (1), 77-82, 2014 | | 2014 |