Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
All
Since 2019
Citations
48
48
h-index
2
2
i10-index
1
1
0
42
21
2022
2023
2024
42
5
1
Co-authors
Pratyusa Mukherjee
Assistant Professor, KIIT University
Verified email at kiit.ac.in
Subrata Chowdhury
Associate Professor Department of CSE
Verified email at svcet.in
Dr. Chittaranjan Pradhan
Associate Professor, School of Computer Engineering, Kalinga Institute of Industrial Technology
Verified email at kiit.ac.in
Biswajit Mandal
IT Consultant
Verified email at essprom.com
Sohom Roy
IBM, India
Verified email at in.ibm.com
Chandan Giri
Associate Professor, Indian Institute of Engineering Science and Technology, Shibpur
Verified email at it.iiests.ac.in
Dhrubasish Sarkar
Supreme Knowledge Foundation
Verified email at skf.edu.in
Dr. Dipak Kumar Kole
Professor of Dept. of Computer Science & Engg., Jalpaiguri Government Engineering College
Verified email at cse.jgec.ac.in
Indrajit Banerjee
Indian Institute of Engineering Science and Technology, Shibpur
Verified email at it.iiests.ac.in
Follow
Soumik Ghosh
Software Architect, Siemens Technology
Verified email at siemens.com
Internet of Things
Wireless Sensor Network
Machine learning
Data Engineering
Cryptography
Articles
Cited by
Co-authors
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
P Mukherjee, H Garg, C Pradhan, S Ghosh, S Chowdhury, G Srivastava
Sensors 22 (19), 7332
, 2022
46
2022
Priority based GTS allocation in Zigbee wireless sensor network
S Ghosh, E Ghosh, I Banerje, D Kundu, B Mandal
Trends in Computational Intelligence, Security and Internet of Things: Third …
, 2020
2
2020
Mining the Human Networks and Identification of Group Activities Using the Crime Scraping Engine
S Roy, S Ghosh, C Giri, DK Kole, D Sarkar
SN Computer Science 4 (5), 533
, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–3
Show more
Privacy
Terms
Help
About Scholar
Search help