Manas Ranjan Patra

According to our database1, Manas Ranjan Patra authored at least 56 papers between 2001 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Rank Consensus Between Importance Measures in Hypergraph Model of Social Network.
Proceedings of the Evolution in Computational Intelligence, 2020

2019
LBS based framework to obstruct linking attack in data releases.
Multim. Tools Appl., 2019

Anonymization of attributed social graph using anatomy based clustering.
Multim. Tools Appl., 2019

A graph based approach for privacy preservation of citizen data in e-governance applications.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019

2018
A multi-agent-based framework for cloud service discovery and selection using ontology.
Serv. Oriented Comput. Appl., 2018

An ontology-based cloud infrastructure service discovery and selection system.
Int. J. Grid Util. Comput., 2018

Privacy Preservation of e-Governance Data Using Local Beam Search.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018

Accessibility of Indian Government Web Portals with respect to WCAG 2.0 and GIGW Guidelines.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018

2017
A level-cut heuristic-based clustering approach for social graph anonymization.
Soc. Netw. Anal. Min., 2017

Accessibility analysis of web browsers.
Int. J. Serv. Technol. Manag., 2017

A Quantitative Analysis of WCAG 2.0 Compliance For Some Indian Web Portals.
CoRR, 2017

Accessibility analysis of some Indian educational web portals.
CoRR, 2017

Analysis of Android Cell Phone Web-Browsers to Facilitate Accessible m-Governance.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017

2015
Hybrid intelligent systems for detecting network intrusions.
Secur. Commun. Networks, 2015

General Characterization of Classifications in Rough Set on Two Universal Sets.
Inf. Resour. Manag. J., 2015

An Evolutionary Computation Based Classification Model for Network Intrusion Detection.
Proceedings of the Distributed Computing and Internet Technology, 2015

k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization.
Proceedings of the Distributed Computing and Internet Technology, 2015

Quality Assurance Model for "Bhulekh": An e-Governance Application.
Proceedings of the 2015 International Conference on Information Technology, 2015

2014
An Automated Semantically Enabled Fuzzy Based SLA in Cloud Computing Environment Using Multi-agent System.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2014

Dynamic Web Service Composition with QoS Clustering.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Dynamic QoS Requirement Aware Service Composition and Adaptation.
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014

Accessibility of e-governance in rural India: a critical view point.
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, 2014

Accessibility analysis of government web portals of Asian countries.
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, 2014

2013
Hybrid intelligent systems for predicting software reliability.
Appl. Soft Comput., 2013

CeMSE: a cloud enabled model for smart education.
Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance, 2013

e-governance and digital inclusion: creating smart rural women in India.
Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance, 2013

2012
CRHIS: cloud based rural healthcare information system.
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012

Quality assurance model for e-governance projects: a case study on e-counseling.
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012

Performance Evaluation of Social Network Using Data Mining Techniques.
Proceedings of the Computational Social Networks, 2012

2011
Network intrusion detection system: A machine learning approach.
Intell. Decis. Technol., 2011

A Survey on Swarm and Evolutionary Algorithms for Web Mining Applications.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2011

Modeling and monitoring SLA for service based systems.
Proceedings of the 2nd International Conference on Intelligent Semantic Web-Services and Applications, 2011

Monitoring of service based e-governance systems.
Proceedings of the ICEGOV 2011, 2011

Citizen participation in rural e-governance: a case study in the Indian context.
Proceedings of the ICEGOV 2011, 2011

2010
The application of intelligent and soft-computing techniques to software engineering problems: a review.
Int. J. Inf. Decis. Sci., 2010

Application of Machine Learning Techniques to Predict Software Reliability.
Int. J. Appl. Evol. Comput., 2010

Web-services classification using intelligent techniques.
Expert Syst. Appl., 2010

Integrating WebGIS with service oriented rural information grid: experience sharing.
Proceedings of the ICEGOV 2010, Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance, Beijing, China, October 25, 2010

An e-governance project monitoring initiative in India: a case study of e-procurement.
Proceedings of the ICEGOV 2010, Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance, Beijing, China, October 25, 2010

An event based, non-intrusive monitoring framework for Web Service Based Systems.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

Application of fuzzy multi attribute decision making analysis to rank web services.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

Discriminative multinomial Naïve Bayes for network intrusion detection.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Software Reliability Prediction Using Group Method of Data Handling.
Proceedings of the Rough Sets, 2009

Unsupervised Sequential Information Bottleneck Clustering For Building Anomaly Based Network Intrusion Detection Model.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Unsupervised Anomaly Based Network Intrusion Detection Using Farthest First and Hierarchical Conceptual Clustering.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Semi-Naïve Bayesian Method for Network Intrusion Detection System.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

SOA for e-governance in India: potentials and pitfalls.
Proceedings of the ICEGOV 2009, 2009

Ensembling Rule Based Classifiers for Detecting Network Intrusions.
Proceedings of the ARTCom 2009, 2009

2008
A Comparative Study of Data Mining Algorithms for Network Intrusion Detection.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

e-grama: a tool for bridging the digital divide in rural India.
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008

2007
Extending Contract Net Protocol for Arguing Agents.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

SORIG: a service-oriented framework for rural information grid -- an implementation viewpoint.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

Distributed Multi-agent System Architecture for Mobile Traders.
Proceedings of the 10th International Conference on Information Technology, 2007

Rule Based Evidence Mining for Network Attack.
Proceedings of the 10th International Conference on Information Technology, 2007

2004
A Software Agent Based Approach for Fraud Detection in Network Crimes.
Proceedings of the Applied Computing, Second Asian Applied Computing Conference, 2004

2001
A Formal Framework to Build Software Agents.
Proceedings of the 8th Asia-Pacific Software Engineering Conference (APSEC 2001), 2001


  Loading...