Sudip Saha

According to our database1, Sudip Saha authored at least 18 papers between 2008 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
FlipNet: Modeling Covert and Persistent Attacks on Networked Resources.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Near-Optimal Algorithms for Controlling Propagation at Group Scale on Networks.
IEEE Trans. Knowl. Data Eng., 2016

2015
Approximation Algorithms for Reducing the Spectral Radius to Control Epidemic Spread.
CoRR, 2015

Approximation Algorithms for Reducing the Spectral Radius to Control Epidemic Spread.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

2014
Equilibria in Epidemic Containment Games.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
DNS for Massive-Scale Command and Control.
IEEE Trans. Dependable Sec. Comput., 2013

Integrated Multi-Network Modeling Environment for Spectrum Management.
IEEE Journal on Selected Areas in Communications, 2013

Planning and response in the aftermath of a large crisis: An agent-based informatics framework.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013

Modeling the Interaction between Emergency Communications and Behavior in the Aftermath of a Disaster.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

2012
Clearing secondary spectrum market with spatio-temporal partitioning.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

Analysis of policy instruments for enhanced competition in spectrum auction.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2011
Modeling cellular network traffic with mobile call graph constraints.
Proceedings of the Winter Simulation Conference 2011, 2011

2010
Synthetic gene design with a large number of hidden stops.
IJDMB, 2010

Handwritten Arabic Numeral Recognition using a Multi Layer Perceptron
CoRR, 2010

Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey.
Proceedings of the SECRYPT 2010, 2010

Password Security through Negative Filtering.
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010

2009
A biologically inspired password authentication system.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Synthetic Gene Design with a Large Number of Hidden Stop Codons.
Proceedings of the 2008 IEEE International Conference on Bioinformatics and Biomedicine, 2008


  Loading...