Chandan Mazumdar

According to our database1, Chandan Mazumdar authored at least 46 papers between 1984 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




A risk-based methodology for privacy requirements elicitation and control selection.
Secur. Priv., 2022

Clustering-Based Semi-supervised Technique for Credit Card Fraud Detection.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2022

Towards an Ontology for Enterprise Level Information Security Policy Analysis.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A Structured Control Selection Methodology for Insider Threat Mitigation.
Proceedings of the CENTERIS 2020 - International Conference on ENTERprise Information Systems / ProjMAN 2020 - International Conference on Project MANagement / HCist 2020, 2020

Corrections to "'Security Concern' as a Metric for Enterprise Business Processes".
IEEE Syst. J., 2019

"Security Concern" as a Metric for Enterprise Business Processes.
IEEE Syst. J., 2019

A Quantitative Methodology for Business Process-Based Data Privacy Risk Computation.
Proceedings of the Advanced Computing and Systems for Security, 2019

Attack Difficulty Metric for Assessment of Network Security.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

A dynamic model for short-term prediction of stream attributes.
Innov. Syst. Softw. Eng., 2017

A Quantitative Methodology for Cloud Security Risk Assessment.
Proceedings of the CLOSER 2017, 2017

A graph based formalism for detecting flow conflicts in software defined network.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy.
Enterp. Inf. Syst., 2016

An Automated Methodology for Secured User Allocation in Cloud.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Network Vulnerability Analysis Using a Constrained Graph Data Model.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Columbia-Jadavpur submission for EMNLP 2016 Code-Switching Workshop Shared Task: System description.
Proceedings of the Second Workshop on Computational Approaches to Code Switching@EMNLP 2016, 2016

Unraveling the English-Bengali Code-Mixing Phenomenon.
Proceedings of the Second Workshop on Computational Approaches to Code Switching@EMNLP 2016, 2016

Resolving authorization conflicts by ontology views for controlled access to a digital library.
J. Knowl. Manag., 2015

Rhythm analysis of tablā signal by detecting the cyclic pattern.
Innov. Syst. Softw. Eng., 2015

Modelling of Enterprise Insider Threats.
Proceedings of the ICISSP 2015, 2015

A Novel Model of Security Policies and Requirements.
Proceedings of the ICISSP 2015, 2015

A two-phase quantitative methodology for enterprise information security risk analysis.
Comput. Syst. Sci. Eng., 2014

GPU accelerated novel particle filtering method.
Computing, 2014

A Graph Data Model for Attack Graph Generation and Analysis.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

A Formal Methodology for Modeling Threats to Enterprise Assets.
Proceedings of the Information Systems Security - 10th International Conference, 2014

A formal methodology for Enterprise Information Security risk assessment.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Performance Comparison of Hadoop Based Tools with Commercial ETL Tools - A Case Study.
Proceedings of the Big Data Analytics - Second International Conference, 2013

A Practical Approach of Fairness in E-Procurement.
Int. J. Inf. Secur. Priv., 2012

Specification and validation of enterprise information security policies.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System.
J. Netw. Syst. Manag., 2011

A Mark-Up Language for the Specification of Information Security Governance Requirements.
Int. J. Inf. Secur. Priv., 2011

A quantitative methodology for information security control gap analysis.
Proceedings of the 2011 International Conference on Communication, 2011

A generalised model of e-trading for gradual secret release fair exchange protocol.
Int. J. Electron. Secur. Digit. Forensics, 2009

Generalized GSR model of Fair Exchange in E-contracting.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

A formal methodology for detection of vulnerabilities in an enterprise information system.
Proceedings of the CRiSIS 2009, 2009

An efficient technique for enhancing forensic capabilities of Ext2 file system.
Digit. Investig., 2007

Document Frauds: Identification and Linking Fake Document to Scanners and Printers.
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007

Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents.
Digit. Investig., 2006

An Improved E-Commerce Protocol for Fair Exchange.
Proceedings of the Distributed Computing and Internet Technology, 2006

A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security .
Proceedings of the Information Systems Security, First International Conference, 2005

Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol.
Int. J. Digit. EVid., 2004

Intensity-based image matching for regular firearms.
Int. J. Imaging Syst. Technol., 2002

Design and Implementation of a Soft Real Time Fault Tolerant System.
Proceedings of the Distributed Computing, 2002

Authoring Software for Higher Educational Environment.
Proceedings of the 12st IASTED International Conference on Applied Informatics, 1994

Study of a Simulated Stream Machine for Dataflow Computation.
Perform. Evaluation, 1986

Handling of recursion in dataflow model.
Proceedings of the 1984 ACM Annual Conference on Computer Science: The fifth generation challenge, 1984