Soumya K. Ghosh
TitleCited byYear
iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments
H Gupta, A Vahid Dastjerdi, SK Ghosh, R Buyya
Software: Practice and Experience 47 (9), 1275-1296, 2017
3332017
Fog computing: Principles, architectures, and applications
AV Dastjerdi, H Gupta, RN Calheiros, SK Ghosh, R Buyya
Internet of Things, 61-75, 2016
1942016
Enhancement of lifetime using duty cycle and network coding in wireless sensor networks
RR Rout, SK Ghosh
IEEE Transactions on Wireless Communications 12 (2), 656-667, 2012
1632012
SelCSP: A framework to facilitate selection of cloud service providers
N Ghosh, SK Ghosh, SK Das
IEEE transactions on cloud computing 3 (1), 66-79, 2014
832014
A review on telemedicine-based WBAN framework for patient monitoring
C Chakraborty, B Gupta, SK Ghosh
Telemedicine and e-Health 19 (8), 619-626, 2013
592013
An approach for service oriented discovery and retrieval of spatial data
M Paul, SK Ghosh
Proceedings of the 2006 international workshop on Service-oriented software …, 2006
572006
Adaptive data aggregation and energy efficiency using network coding in a clustered wireless sensor network: An analytical approach
RR Rout, SK Ghosh
Computer Communications 40, 65-75, 2014
422014
Spatial interpolation to predict missing attributes in GIS using semantic kriging
S Bhattacharjee, P Mitra, SK Ghosh
IEEE Transactions on Geoscience and Remote Sensing 52 (8), 4771-4780, 2013
402013
A planner-based approach to generate and analyze minimal attack graph
N Ghosh, SK Ghosh
Applied Intelligence 36 (2), 369-390, 2012
392012
Conditional random field based named entity recognition in geological text
N Sobhana, P Mitra, SK Ghosh
International Journal of Computer Applications 1 (3), 143-147, 2010
362010
An intelligent technique for generating minimal attack graph
N Ghosh, SK Ghosh
First Workshop on Intelligent Security (Security and Artificial Intelligence …, 2009
322009
An approach for security assessment of network configurations using attack graph
N Ghosh, SK Ghosh
2009 First International Conference on Networks & Communications, 283-288, 2009
312009
Optical character recognition systems
A Chaudhuri, K Mandaviya, P Badelia, SK Ghosh
Optical Character Recognition Systems for Different Languages with Soft …, 2017
282017
Fractal image compression: a randomized approach
SK Ghosh, J Mukherjee, PP Das
Pattern Recognition Letters 25 (9), 1013-1024, 2004
282004
Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks
RP Barnwal, SK Ghosh
2012 International Conference on Connected Vehicles and Expo (ICCVE), 29-34, 2012
262012
STACRP: a secure trusted auction oriented clustering based routing protocol for MANET
P Chatterjee, I Sengupta, SK Ghosh
Cluster Computing 15 (3), 303-320, 2012
262012
Policy based security analysis in enterprise networks: A formal approach
P Bera, SK Ghosh, P Dasgupta
IEEE Transactions on Network and Service Management 7 (4), 231-243, 2010
262010
Deep-STEP: A deep learning approach for spatiotemporal prediction of remote sensing data
M Das, SK Ghosh
IEEE Geoscience and Remote Sensing Letters 13 (12), 1984-1988, 2016
252016
A network coding based probabilistic routing scheme for wireless sensor network
RR Rout, SK Ghosh, S Chakrabarti
2010 Sixth International conference on Wireless Communication and Sensor …, 2010
242010
An approach to identify and monitor SLA parameters for storage-as-a-service cloud delivery model
N Ghosh, SK Ghosh
2012 IEEE Globecom Workshops, 724-729, 2012
232012
The system can't perform the operation now. Try again later.
Articles 1–20