Follow
R T Goswami
R T Goswami
Techno India College of Technology
Verified email at tict.edu.in
Title
Cited by
Cited by
Year
An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset
RTG Vikash Kumar, Ditipriya Sinha, Ayan Kumar Das, Subhash Chandra Pandey
Cluster Computing The Journal of Networks, Software Tools and Applications, 2019
66*2019
A feature selection technique based on rough set and improvised PSO algorithm (PSORS-FS) for permission based detection of Android malwares
A Bhattacharya, RT Goswami, K Mukherjee
International journal of machine learning and cybernetics 10 (7), 1893-1907, 2019
312019
DMDAM: data mining based detection of android malware
A Bhattacharya, RT Goswami
Proceedings of the first international conference on intelligent computing …, 2017
272017
Big data security: survey on frameworks and algorithms
S Chandra, S Ray, RT Goswami
2017 IEEE 7th International Advance Computing Conference (IACC), 48-54, 2017
212017
Comparative analysis of different feature ranking techniques in data mining-based android malware detection
A Bhattacharya, RT Goswami
Proceedings of the 5th international conference on frontiers in intelligent …, 2017
192017
Histopathological image analysis in medical decision making
N Dey, AS Ashour, H Kalia, RT Goswami, H Das
IGI Global, 2018
182018
Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security
A Mondal, RT Goswami
Microprocessors and Microsystems 81, 103719, 2021
142021
Big data security in healthcare: survey on frameworks and algorithms
S Chandra, S Ray, RT Goswami
2017 IEEE 7th International Advance Computing Conference (IACC), 89-94, 2017
132017
Cloud computing security issues & challenges: A review
A Mondal, S Paul, RT Goswami, S Nath
2020 International Conference on Computer Communication and Informatics …, 2020
102020
A hybrid community based rough set feature selection technique in android malware detection
A Bhattacharya, RT Goswami
Smart Trends in Systems, Security and Sustainability, 249-258, 2018
92018
Review Study on Different Attack Strategies of Worm in a Network.
A Mondal, AK Das, S Nath, RT Goswami
Webology 17 (2), 363-375, 2020
72020
Community based feature selection method for detection of android malware
A Bhattacharya, RT Goswami
Journal of Global Information Management (JGIM) 26 (3), 54-77, 2018
72018
Testbeds, attacks, and dataset generation for big data cluster: A system application for big data platform security analysis
S Paul, S Saha, RT Goswami
Progress in Computing, Analytics and Networking, 545-554, 2020
32020
Combined MST-graph coloring algorithm for PCI distribution of LTE-advanced self-organizing network
S Acharya, AK Das, A Mondal, RT Goswami
Ambient Communications and Computer Systems, 261-270, 2018
32018
Persistence of malathion in four soils of West Bengal
A Chowdhury, R Goswami, S Pal
31984
PCA and Substring Extraction Technique to Generate Signature for Polymorphic Worm: An Automated Approach
A Mondal, AK Das, S Satpathi, RT Goswami
Emerging Technologies in Data Mining and Information Security, 527-538, 2021
22021
Probabilistic e-epidemic model on computer worms
BK Mishra, RT Goswami
2012 International Conference on Informatics, Electronics & Vision (ICIEV …, 2012
22012
An Efficient Detection and Prevention Approach of Unknown Malicious Attack: A Novel Honeypot Approach
A Sarfaraz, A Jha, A Mondal, RT Goswami
Cyber Security and Digital Forensics, 11-19, 2022
12022
Generate Signature for Polymorphic Worm: A Real-Time Honeypot Approach
A Mondal, S Nath, P Bose, RT Goswami
Proceedings of 6th International Conference on Recent Trends in Computing …, 2021
12021
Real Time Big Data Processing: A Comparative Study of Existing Approaches
S Munshi, S Saha, RT Goswami
2019 IEEE 16th India Council International Conference (INDICON), 1-4, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20