Samrat Mondal
Title
Cited by
Cited by
Year
Role based access control with spatiotemporal context for mobile applications
S Aich, S Mondal, S Sural, AK Majumdar
Transactions on computational science IV, 177-199, 2009
672009
Towards formal security analysis of gtrbac using timed automata
S Mondal, S Sural, V Atluri
Proceedings of the 14th ACM Symposium on Access control Models and …, 2009
272009
Security analysis of temporal-rbac using timed automata
S Mondal, S Sural
2008 The Fourth International Conference on Information Assurance and …, 2008
272008
Divide and conquer based non-dominated sorting for parallel environment
S Mishra, S Saha, S Mondal
2016 IEEE congress on evolutionary computation (CEC), 4297-4304, 2016
202016
Color Pass: An intelligent user interface to resist shoulder surfing attack
N Chakraborty, S Mondal
Proceedings of the 2014 IEEE Students' Technology Symposium, 13-18, 2014
192014
Efficient scheduling of nonpreemptive appliances for peak load optimization in smart grid
N Chakraborty, A Mondal, S Mondal
IEEE Transactions on Industrial Informatics 14 (8), 3447-3458, 2017
142017
Intelligent scheduling of thermostatic devices for efficient energy management in smart grid
N Chakraborty, A Mondal, S Mondal
IEEE Transactions on Industrial Informatics 13 (6), 2899-2910, 2017
142017
MobSecure: A shoulder surfing safe login approach implemented on mobile device
N Chakraborty, GS Randhawa, K Das, S Mondal
Procedia Computer Science 93, 854-861, 2016
132016
A multiobjective optimization based entity matching technique for bibliographic databases
S Mishra, S Saha, S Mondal
Expert Systems with Applications 65, 100-115, 2016
122016
Entity matching technique for bibliographic database
S Mishra, S Mondal, S Saha
International Conference on Database and Expert Systems Applications, 34-41, 2013
122013
A divide-and-conquer based efficient non-dominated sorting approach
S Mishra, S Saha, S Mondal, CAC Coello
Swarm and evolutionary computation 44, 748-773, 2019
112019
Improved solution to the non-domination level update problem
S Mishra, S Mondal, S Saha
Applied Soft Computing 60, 336-362, 2017
112017
Fast implementation of steady-state NSGA-II
S Mishra, S Mondal, S Saha
2016 IEEE Congress on Evolutionary Computation (CEC), 3777-3784, 2016
112016
A new storage optimized honeyword generation approach for enhancing security and usability
N Chakraborty, S Mondal
arXiv preprint arXiv:1509.06094, 2015
112015
Security analysis of GTRBAC and its variants using model checking
S Mondal, S Sural, V Atluri
computers & security 30 (2-3), 128-147, 2011
112011
Dispersion ratio based decision tree model for classification
S Roy, S Mondal, A Ekbal, MS Desarkar
Expert Systems with Applications 116, 1-9, 2019
102019
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations
N Chakraborty, S Mondal
Computers & Security 66, 155-168, 2017
102017
XML-based policy specification framework for spatiotemporal access control
S Mondal, S Sural
Proceedings of the 2nd international conference on Security of information …, 2009
102009
CRDT: Correlation ratio based decision tree model for healthcare data mining
S Roy, S Mondal, A Ekbal, MS Desarkar
2016 IEEE 16th International Conference on Bioinformatics and Bioengineering …, 2016
92016
Cluster validation techniques for bibliographic databases
S Mishra, S Saha, S Mondal
Proceedings of the 2014 IEEE Students' Technology Symposium, 93-98, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20