A survey on security issues in cloud computing R Bhadauria, R Chaki, N Chaki, S Sanyal arXiv preprint arXiv:1109.5388, 1-15, 2011 | 174 | 2011 |
Sleep deprivation attack detection in wireless sensor network T Bhattasali, R Chaki, S Sanyal arXiv preprint arXiv:1203.0231, 2012 | 117 | 2012 |
A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks DB Roy, R Chaki, N Chaki arXiv preprint arXiv:1004.0587, 2010 | 111 | 2010 |
Exploring neural networks with C R Tadeusiewicz, R Chaki, N Chaki CRC Press, 2014 | 73 | 2014 |
A survey of recent intrusion detection systems for wireless sensor network T Bhattasali, R Chaki International conference on network security and applications, 268-280, 2011 | 51 | 2011 |
Secure and trusted cloud of things T Bhattasali, R Chaki, N Chaki 2013 Annual IEEE India Conference (INDICON), 1-6, 2013 | 45 | 2013 |
Applications of wireless sensor network in Intelligent Traffic System: A review A Sharma, R Chaki, U Bhattacharya 2011 3rd International Conference on Electronics Computer Technology 5, 53-57, 2011 | 42 | 2011 |
IDSX: a cluster based collaborative intrusion detection algorithm for mobile ad-hoc network R Chaki, N Chaki 6th International Conference on Computer Information Systems and Industrial …, 2007 | 42 | 2007 |
HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks P Sen, N Chaki, R Chaki 2008 7th Computer Information Systems and Industrial Management Applications …, 2008 | 33 | 2008 |
A survey of security and privacy issues for biometrics based remote authentication in cloud T Bhattasali, K Saeed, N Chaki, R Chaki IFIP International Conference on Computer Information Systems and Industrial …, 2015 | 26 | 2015 |
A brief review of data mining application involving protein sequence classification S Saha, R Chaki Advances in computing and information technology, 469-477, 2013 | 26 | 2013 |
Study of security issues in pervasive environment of next generation internet of things T Bhattasali, R Chaki, N Chaki IFIP International Conference on Computer Information Systems and Industrial …, 2013 | 24 | 2013 |
MADSN: mobile agent based detection of selfish node in MANET DB Roy, R Chaki International Journal of Wireless & Mobile Networks (IJWMN) Vol 3, 225-235, 2011 | 23 | 2011 |
SECURITY ISSUES IN CLOUD COMPUTING. R Bhadauria, R Chaki, N Chaki, S Sanyal Acta Technica Corvininesis-Bulletin of Engineering 7 (4), 2014 | 22 | 2014 |
BHAPSC: A new black hole attack prevention system in clustered MANET I Nath, R Chaki International Journal of Advanced Research in Computer Science and Software …, 2012 | 20 | 2012 |
Load balancing in cellular network: A review A Sharma, A Roy, S Ghosal, R Chaki, U Bhattacharya 2012 Third International Conference on Computing, Communication and …, 2012 | 20 | 2012 |
Gps assisted fast-handoff mechanism for real-time communication A Dutta, S Madhani, W Chen, O Altintas, H Schulzrinne 2006 IEEE Sarnoff Symposium, 1-4, 2006 | 20* | 2006 |
Application of data mining in protein sequence classification S Saha, R Chaki arXiv preprint arXiv:1211.4654, 2012 | 18 | 2012 |
AMC model for denial of sleep attack detection T Bhattasali, R Chaki arXiv preprint arXiv:1203.1777, 2012 | 18 | 2012 |
Secure energy efficient routing protocol for wireless sensor network AK Das, R Chaki, KN Dey Foundations of Computing and Decision Sciences 41 (1), 3-27, 2016 | 14 | 2016 |