Aditya Bagchi

According to our database1, Aditya Bagchi authored at least 18 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Ingesting High-Velocity Streaming Graphs from Social Media Sources.
CoRR, 2019

2017
PROFORMA: Proactive Forensics with Message Analytics.
IEEE Security & Privacy, 2017

2015
Resolving authorization conflicts by ontology views for controlled access to a digital library.
J. Knowledge Management, 2015

2014
Controlling Access to a Digital Library Ontology - A Graph Transformation Approach.
IJNGC, 2014

2012
Specification and validation of enterprise information security policies.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

A Graph-Based Formalism for Controlling Access to a Digital Library Ontology.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2011
A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System.
J. Network Syst. Manage., 2011

Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

2010
Modeling Temporal Variation in Social Network: An Evolutionary Web Graph Approach.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

2009
Data Mining by Navigation - An Experience with Systems Biology.
Proceedings of the Pattern Recognition and Machine Intelligence, 2009

A formal methodology for detection of vulnerabilities in an enterprise information system.
Proceedings of the CRiSIS 2009, 2009

Design of a Data Model for Social Network Applications.
Proceedings of the Database Technologies: Concepts, 2009

2008
Complex Query Processing on Web Graph: a Social Network Perspective.
JDIM, 2008

2007
Design of a Data Model for Social Network Applications.
J. Database Manag., 2007

Pre-processing and Path Normalization of a Web Graph used as a Social Network.
JDIM, 2007

2006
Complex Queries on Web Graph representing a Social Network.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

2005
Association against dissociation: some pragmatic considerations for frequent itemset generation under fixed and variable thresholds.
SIGKDD Explorations, 2005

SPEAR: Design of a Secured Peer-to-Peer Architecture .
Proceedings of the Information Systems Security, First International Conference, 2005


  Loading...