Sabyasachi Saha

According to our database1, Sabyasachi Saha authored at least 40 papers between 2003 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
MAGMA network behavior classifier for malware traffic.
Comput. Networks, 2016

2015
YouLighter: A Cognitive Approach to Unveil YouTube CDN and Changes.
IEEE Trans. Cogn. Commun. Netw., 2015

YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes.
Proceedings of the 27th International Teletraffic Congress, 2015

Systematic Mining of Associated Server Herds for Malware Campaign Discovery.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Network Connectivity Graph for Malicious Traffic Dissection.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Leveraging client-side DNS failure patterns to identify malicious behaviors.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Macroscopic view of malware in home networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
On Understanding User Interests through Heterogeneous Data Sources.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Nazca: Detecting Malware Distribution in Large-Scale Networks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Detecting malicious HTTP redirections using trees of user browsing activity.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Missing or Inapplicable: Treatment of Incomplete Continuous-valued Features in Supervised Learning.
Proceedings of the 13th SIAM International Conference on Data Mining, 2013

Combining supervised and unsupervised learning for zero-day malware detection.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Recursive NMF: Efficient label tree learning for large multi-class problems.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Weighted linear kernel with tree transformed features for malware detection.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2008
Opportunistic Scheduling and Pricing Strategies for Automated Contracting in Supply Chains.
Proceedings of the Soft Computing Applications in Business, 2008

2007
Evolutionary Tournament-Based Comparison of Learning and Non-Learning Algorithms for Iterated Games.
J. Artif. Soc. Soc. Simul., 2007

Buyer agent to enhance consumer awareness: SAATHI.
Electron. Commer. Res. Appl., 2007

An Efficient Protocol for Negotiation over Multiple Indivisible Resources.
Proceedings of the IJCAI 2007, 2007

Reciprocal Negotiation in Multi-agent Societies.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

Reciprocal negotiation over shared resources in agent societies.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Robust Agent Communities.
Proceedings of the Autonomous Intelligent Systems: Multi-Agents and Data Mining, 2007

2006
Negotiating Monitoring Task Allocation for Orbiters.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Negotiating efficient outcomes over multiple issues.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

2005
Aggressive Pricing to Exploit Market Niches in Supply Chains.
IEEE Intell. Syst., 2005

Evolutionary Tournament-Based Comparison of Learning and Non-Learning Strategies for Iterated Games.
Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, 2005

Sustainable Agent Communities.
Proceedings of the EUMAS 2005, 2005

Trust-based contracting in supply chains.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Predicting agent strategy mix of evolving populations.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Modeling opponent decision in repeated one-shot negotiations.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Reciprocal resource sharing in P2P environments.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

2004
Opportunistic Scheduling and Pricing in Supply Chains.
Künstliche Intell., 2004

Reciprocity Based Cooperation in a Limited Resource Environment.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Adapting Agent Expertise Based on Future Expectations.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

A Bayes Net Approach to Argumentation Based Negotiation.
Proceedings of the Argumentation in Multi-Agent Systems, First International Workshop, 2004

Dynamics of Strategy Distribution in Iterated Games.
Proceedings of the Artificial Multiagent Learning, 2004

A Bayes Net Approach to Argumentation.
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004

2003
Local Decision Procedures for Avoiding the Tragedy of Commons.
Proceedings of the Distributed Computing, 2003

Emergence and Stability of Collaborations Among Rational Agents.
Proceedings of the Cooperative Information Agents VII, 7th International Workshop, 2003

Helping based on future expectations.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003


  Loading...