Amrita Ghosal

Orcid: 0000-0001-9250-9215

According to our database1, Amrita Ghosal authored at least 46 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks.
IEEE Trans. Wirel. Commun., 2023

SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents.
Comput. Secur., 2022

Secure over-the-air software update for connected vehicles.
Comput. Networks, 2022

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews.
IEEE Access, 2022

Model-Driven Engineering in Digital Thread Platforms: A Practical Use Case and Future Challenges.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Practice, 2022

AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

2021
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics.
CoRR, 2021

Truck platoon security: State-of-the-art and road ahead.
Comput. Networks, 2021

DSLs and Middleware Platforms in a Model-Driven Development Approach for Secure Predictive Maintenance Systems in Smart Factories.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, 2021

DSLs for Model Driven Development of Secure Interoperable Automation Systems with EdgeX Foundry.
Proceedings of the 24th Forum on specification & Design Languages, 2021

2020
Distributed on-demand clustering algorithm for lifetime optimization in wireless sensor networks.
J. Parallel Distributed Comput., 2020

Secure over-the-air software updates in connected vehicles: A survey.
Comput. Networks, 2020

Security issues and challenges in V2X: A Survey.
Comput. Networks, 2020

STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things.
Wirel. Networks, 2019

Secure OTA Software Updates in Connected Vehicles: A survey.
CoRR, 2019

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Efficient physical intrusion detection in Internet of Things: A Node deployment approach.
Comput. Networks, 2019

DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

2017
Lifetime enhancement of wireless sensor networks by avoiding energy-holes with Gaussian distribution.
Telecommun. Syst., 2017

Lifetime Optimizing Clustering Structure Using Archimedes' Spiral-Based Deployment in WSNs.
IEEE Syst. J., 2017

Secure key design approaches using entropy harvesting in wireless sensor network: A survey.
J. Netw. Comput. Appl., 2017

A survey on energy efficient intrusion detection in wireless sensor networks.
J. Ambient Intell. Smart Environ., 2017

2016
A survey on mobile anchor assisted localization techniques in wireless sensor networks.
Wirel. Networks, 2016

A Location-Wise Predetermined Deployment for Optimizing Lifetime in Visual Sensor Networks.
IEEE Trans. Circuits Syst. Video Technol., 2016

A survey on mobility-assisted localization techniques in wireless sensor networks.
J. Netw. Comput. Appl., 2016

Lifespan prolonging location-wise predetermined deployment strategy for visual sensor networks.
J. Netw. Comput. Appl., 2016

2015
Security in Mobile Wireless Sensor Networks: Attacks and Defenses.
Proceedings of the Cooperative Robots and Sensor Networks 2015, 2015

A lightweight security scheme for query processing in clustered wireless sensor networks.
Comput. Electr. Eng., 2015

Lifetime maximizing clustering structure using archimedes' spiral based deployment in WSNs.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2015

A Predetermined Deployment Technique for Lifetime Optimization in Clustered WSNs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Enhancing the lifespan of visual sensor networks using a predetermined node deployment strategy.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
A jamming-attack-defending data forwarding scheme based on channel surfing in wireless sensor networks.
Secur. Commun. Networks, 2013

Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2013

Is Sensor Deployment Using Gaussian Distribution Energy Balanced?
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches.
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013

2012
A dynamic TDMA based scheme for securing query processing in WSN.
Wirel. Networks, 2012

<i>μ</i>Sec: A Security Protocol for Unicast Communication in Wireless Sensor Networks.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network.
Comput. Commun., 2011

Energy-Balancing and Lifetime Enhancement of Wireless Sensor Network with Archimedes Spiral.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

A Probability Density Function for Energy-Balanced Lifetime-Enhancing Node Deployment in WSN.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

2010
Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN.
Proceedings of the Computational Science and Its Applications, 2010

2009
A Lifetime Enhancing Node Deployment Strategy in WSN.
Proceedings of the Future Generation Information Technology, 2009


  Loading...