Nirnay Ghosh

Orcid: 0000-0003-4079-8259

According to our database1, Nirnay Ghosh authored at least 38 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards a Unified Pandemic Management Architecture: Survey, Challenges, and Future Directions.
ACM Comput. Surv., February, 2024

iTRPL: An Intelligent and Trusted RPL Protocol based on Multi-Agent Reinforcement Learning.
CoRR, 2024

Accelerating Tactile Internet with QUIC: A Security and Privacy Perspective.
CoRR, 2024

ADRIN: An Adaptive and Distributed Routing Mechanism for Challenged IoT Networks.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
HessianAuth: An ECC-based Distributed and Efficient Authentication Mechanism for 6LoWPAN Networked IoT Devices.
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023

2022
MCR: A Motif Centrality-Based Distributed Message Routing for Disaster Area Networks.
IEEE Internet Things J., 2022

Transcriptional Regulatory Network Topology with Applications to Bio-inspired Networking: A Survey.
ACM Comput. Surv., 2022

2021
bioMCS 2.0: A distributed, energy-aware fog-based framework for data forwarding in mobile crowdsensing.
Pervasive Mob. Comput., 2021

Leveraging Network Science for Social Distancing to Curb Pandemic Spread.
IEEE Access, 2021

Leveraging Periodicity to Improve Quality of Service in Mobile Software Defined Wireless Sensor Networks.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

Adaptive Motif-based Topology Control in Mobile Software Defined Wireless Sensor Networks.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
<i>QnQ</i>: Quality and Quantity Based Unified Approach for Secure and Trustworthy Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2020

Publish or Drop Traffic Event Alerts? Quality-aware Decision Making in Participatory Sensing-based Vehicular CPS.
ACM Trans. Cyber Phys. Syst., 2020

bioSmartSense+: A bio-inspired probabilistic data collection framework for priority-based event reporting in IoT environments.
Pervasive Mob. Comput., 2020

bioMCS: A Bio-inspired Collaborative Data Transfer Framework over Fog Computing Platforms in Mobile Crowdsensing.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020

2019
PS-Sim: A framework for scalable data simulation and incentivization in participatory sensing-based smart city applications.
Pervasive Mob. Comput., 2019

SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT.
IEEE Internet Things J., 2019

PIT: A Probe Into Internet of Things by Comprehensive Security Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019

bioSmartSense: A Bio-inspired Data Collection Framework for Energy-efficient, QoI-aware Smart City Applications.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
PS-Sim: A Framework for Scalable Simulation of Participatory Sensing Data.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

2017
Quality of Information in Mobile Crowdsensing: Survey and Research Challenges.
ACM Trans. Sens. Networks, 2017

W2Q: A dual weighted QoI scoring mechanism in social sensing using community confidence.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

QnQ: A reputation model to secure mobile crowdsourcing applications from incentive losses.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Securing Loosely-Coupled Collaboration in Cloud Environment through Dynamic Detection and Removal of Access Conflicts.
IEEE Trans. Cloud Comput., 2016

Enhancing Reliability of Vehicular Participatory Sensing Network: A Bayesian Approach.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

A probabilistic approach for filtering out spam reports in a vehicular participatory sensing system.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers.
IEEE Trans. Cloud Comput., 2015

A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations.
Proceedings of the Information Systems Security - 11th International Conference, 2015

NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks.
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015

2014
Data and Application Security in Cloud.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach.
Proceedings of the SECRYPT 2014, 2014

An Efficient Heuristic-Based Role Mapping Framework for Secure and Fair Collaboration in SaaS Cloud.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

2012
A planner-based approach to generate and analyze minimal attack graph.
Appl. Intell., 2012

An approach to identify and monitor SLA parameters for storage-as-a-service cloud delivery model.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2010
An Intelligent Approach for Security Management of an Enterprise Network Using Planner.
Proceedings of the Intelligent Autonomous Systems: Foundations and Applications, 2010

An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

2009
An Approach for Security Assessment of Network Configurations Using Attack Graph.
Proceedings of the First International Conference on Networks and Communications, 2009


  Loading...