Sangita Roy

Orcid: 0000-0002-7366-0232

According to our database1, Sangita Roy authored at least 19 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Novel parametric based time efficient portable real-time dehazing system.
J. Real Time Image Process., April, 2023

Design and analysis of DDoS mitigating network architecture.
Int. J. Inf. Sec., April, 2023

A Rand Index-Based Analysis of Consensus Protocols.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

An Analysis of Hybrid Consensus in Blockchain Protocols for Correctness and Progress.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

2022
Fast and lean encrypted Internet traffic classification.
Comput. Commun., 2022

2019
Adaptive Fluorescence Pixels Control in Visibility Refinement through CSA.
Proceedings of the Ninth International Conference on Image Processing Theory, 2019

2018
Distributed star coloring of network for IP traceback.
Int. J. Inf. Sec., 2018

IP Traceback in Dynamic Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Fuzzy Logic and Log-Sigmoid Function Based Vision Enhancement of Hazy Images.
Proceedings of the Intelligent Systems and Applications, 2018

Efficient Copy-Move Forgery Detection using Blur and Rotation Invariant Technique.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

2015
Coloring networks for attacker identification and response.
Secur. Commun. Networks, 2015

Network Attack Detection and Mitigation.
Proceedings of the 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015

Using CAPTCHA Selectively to Mitigate HTTP-Based Attacks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Extended deterministic edge router marking.
Int. J. Commun. Networks Distributed Syst., 2014

Haar Wavelet Transform Image Compression Using Various Run Length Encoding Schemes.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

2013
IP traceback in star colored networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
A network based vulnerability scanner for detecting SQLI attacks in web applications.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization.
Proceedings of the Second International Conference on Computational Science, 2012

2011
A novel approach to format based text steganography.
Proceedings of the 2011 International Conference on Communication, 2011


  Loading...