Follow
Hemanta Kumar Kalita
Hemanta Kumar Kalita
Professor of Computer Science & Engineering, Central Institute of Technology Kokrajhar
Verified email at cit.ac.in
Title
Cited by
Cited by
Year
Wireless Sensor Network Security Analysis
HK Kalita, A Kar
IJNGN 1 (1), 1-10, 2009
1422009
Designing WANem: A Wide Area Network Emulator Tool
HK Kalita, MK Nambiar
COMSNETS 2011, Print ISBN: 978-1-4244-8952-7, E-ISBN : 978-1-4244-8951-0, 1-4, 2011
662011
Analysis of Machine Learning Techniques Based Intrusion Detection Systems
R Sharma, HK Kalita, P Borah
ICACNI-2015, 3rd International Conference on Advanced Computing, Networking …, 2015
312015
Different firewall techniques: A survey
RK Sharma, HK Kalita, B Issac
ICCCNT 2014, Print ISBN: 978-1-4799-2695-4, 1-6, 2014
272014
Key Management in Secure Self Organized Wireless Sensor Network: A New Approach
HK Kalita, A Kar
ICWET 2011, ISBN: 978-1-4503-0449-8, 865-870, 2011
112011
A new algorithm for Ordering of Points To Identify Clustering Structure Based On Perimeter of Triangle: OPTICS(BOPT)
HK Kalita, DK Bhattacharyya, A Kar
ADCOM 2007, Print ISBN: 0-7695-3059-1, 523-528, 2007
112007
A Survey on Post-Quantum Cryptography for Constrained Devices
KS Roy, HK Kalita
International Journal of Applied Engineering Research 14 (11), 2608-2615, 2019
92019
An Intrusion Detection Method Using Artificial Immune System Approach
J Lyngdoh, MI Hussain, S Majaw, HK Kalita
International Conference on Advanced Informatics for Computing Research, 379-387, 2018
92018
A New Algorithm of Self Organization in Wireless Sensor Network
HK Kalita, A Kar
WSN 2 (1), 43-47, 2010
92010
WANem-the wide area network emulator
M Nambiar, HK Kalita, D Mishra, S Rane
92009
Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants
RK Sharma, B Issac, HK Kalita
IEEE Access 7, 52427-52439, 2019
82019
A Survey on Authentication Schemes in IoT
KS Roy, HK Kalita
2017 International Conference on Information Technology (ICIT), 202-207, 2017
82017
Are machine learning based intrusion detection system always secure? An insight into tampered learning
RK Sharma, H Kalita, B Issac
Journal of Intelligent and Fuzzy Systems ISSN 1064-124 35 (3), 3635-3651, 2018
72018
Sentiment Analysis for Web-based Big Data: A Survey
S Das, HK Kalita
International Journal of Advanced Research in Computer Science 8 (5), 2017
72017
Semantic Model for Web-Based Big Data Using Ontology and Fuzzy Rule Mining
S Das, HK Kalita
Proceedings of First International Conference on Information and …, 2016
72016
A New Algorithm for End to End Security of Data in a Secure Self Organized Wireless Sensor Network
HK Kalita, A Kar
JGRCS, ISSN-2229-371X 1 (3), 28-34, 2010
72010
Popularity Analysis on Social Network: A Big Data Analysis
S Das, BV Syiem, HK Kalita
IJCA Proceedings on International Conference on Computing, Communication and …, 2015
62015
Design of a New Algorithm for WAN Disconnection Emulation and Implementing it in WANem
MK Nambiar, HK Kalita
ICWET 2011, ISBN: 978-1-4503-0449-8, 376-381, 2011
62011
A new Algorithm for Measuring Available Bandwidth in a Wide Area Network
HK Kalita, MK Nambiar, D Mishra
ADCOM 2007, Print ISBN: 0-7695-3059-1, 606-611, 2007
62007
Interest Flooding Attack in Named Data Networking: A Survey
N Chhetry, HK Kalita
ADBU Journal of Engineering Technology 4, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20