A survey on security issues in cloud computing R Bhadauria, R Chaki, N Chaki, S Sanyal arXiv preprint arXiv:1109.5388, 1-15, 2011 | 223 | 2011 |
Sleep deprivation attack detection in wireless sensor network T Bhattasali, R Chaki, S Sanyal arXiv preprint arXiv:1203.0231, 2012 | 159 | 2012 |
A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks DB Roy, R Chaki, N Chaki arXiv preprint arXiv:1004.0587, 2010 | 112 | 2010 |
Exploring neural networks with C R Tadeusiewicz, R Chaki, N Chaki CRC Press, 2014 | 90 | 2014 |
A survey of recent intrusion detection systems for wireless sensor network T Bhattasali, R Chaki Advances in Network Security and Applications: 4th International Conference …, 2011 | 85 | 2011 |
Secure and trusted cloud of things T Bhattasali, R Chaki, N Chaki 2013 Annual IEEE India Conference (INDICON), 1-6, 2013 | 65 | 2013 |
IDSX: a cluster based collaborative intrusion detection algorithm for mobile ad-hoc network R Chaki, N Chaki 6th International Conference on Computer Information Systems and Industrial …, 2007 | 54 | 2007 |
Applications of wireless sensor network in Intelligent Traffic System: A review A Sharma, R Chaki, U Bhattacharya 2011 3rd International Conference on Electronics Computer Technology 5, 53-57, 2011 | 48 | 2011 |
A survey of security and privacy issues for biometrics based remote authentication in cloud T Bhattasali, K Saeed, N Chaki, R Chaki Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014 | 42 | 2014 |
HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks P Sen, N Chaki, R Chaki 2008 7th Computer Information Systems and Industrial Management Applications …, 2008 | 39 | 2008 |
IoT based smart waste management system in aspect of COVID-19 S Saha, R Chaki Journal of Open Innovation: Technology, Market, and Complexity 9 (2), 100048, 2023 | 33 | 2023 |
A brief review of data mining application involving protein sequence classification S Saha, R Chaki Advances in Computing and Information Technology: Proceedings of the Second …, 2013 | 32 | 2013 |
MADSN: mobile agent based detection of selfish node in MANET DB Roy, R Chaki International Journal of Wireless & Mobile Networks (IJWMN) 3 (4), 225-235, 2011 | 31 | 2011 |
Study of security issues in pervasive environment of next generation internet of things T Bhattasali, R Chaki, N Chaki Computer Information Systems and Industrial Management: 12th IFIP TC8 …, 2013 | 30 | 2013 |
An adaptation of context and trust aware workflow oriented access control for remote healthcare T Bhattasali, R Chaki, N Chaki, K Saeed International Journal of Software Engineering and Knowledge Engineering 28 …, 2018 | 28 | 2018 |
SECURITY ISSUES IN CLOUD COMPUTING. R Bhadauria, R Chaki, N Chaki, S Sanyal Acta technica corviniensis-bulletin of engineering 7 (4), 2014 | 28 | 2014 |
Load balancing in cellular network: A review A Sharma, A Roy, S Ghosal, R Chaki, U Bhattacharya 2012 Third International Conference on Computing, Communication and …, 2012 | 28 | 2012 |
AMC model for denial of sleep attack detection T Bhattasali, R Chaki arXiv preprint arXiv:1203.1777, 2012 | 25 | 2012 |
An efficient method for PET image denoising by combining multi-scale transform and non-local means A Bal, M Banerjee, R Chaki, P Sharma Multimedia Tools and Applications 79, 29087-29120, 2020 | 23 | 2020 |
Bhapsc: A new black hole attack prevention system in clustered manet I Nath, R Chaki International Journal of Advanced Research in Computer Science and Software …, 2012 | 22 | 2012 |