Soumya Maity

According to our database1, Soumya Maity authored at least 12 papers between 2010 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks.
Secur. Commun. Networks, 2015

Formal integrated network security analysis tool: formal query-based network security configuration analysis.
IET Networks, 2015

QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

2014
Conflict Resolution in Heterogeneous Co-allied MANET: A Formal Approach.
Proceedings of the Distributed Computing and Networking - 15th International Conference, 2014

Optimal negotiation of SLA in federated cloud using multiobjective genetic algorithms.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

2012
Enforcement of access control policy for mobile ad hoc networks.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Policy Based ACL Configuration Synthesis in Enterprise Networks: A Formal Approach.
Proceedings of the International Symposium on Electronic System Design, 2012

A Cognitive Trust Model for Access Control Framework in MANET.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2010
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Generating policy based security implementation in enterprise network: a formal framework.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model.
Proceedings of the Recent Trends in Network Security and Applications, 2010

A Query based Formal Security Analysis Framework for Enterprise LAN.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...