Survey on host and network based intrusion detection system N Das, T Sarkar International Journal of Advanced Networking and Applications 6 (2), 2266, 2014 | 38 | 2014 |
Reversible and irreversible data hiding technique T Sarkar, S Sanyal arXiv preprint arXiv:1405.2684, 2014 | 20 | 2014 |
Digital Watermarking Techniques in Spatial and Frequency Domain T Sarkar, S Sanyal | 9 | 2014 |
Survey on host and network based intrusion detection system S Sanyal, N Das, T Sarkar Acta Technica Corviniensis-Bulletin of Engineering 8 (1), 17, 2015 | 5 | 2015 |
A Cluster Based Multi-Radio Multi-Channel Assignment Approach in Wireless Mesh Networks G Saurav, D Niva, S Tanmoy Computer Networks and Information Technologies: Second International …, 2011 | 5 | 2011 |
Steganalysis: Detecting LSB Steganographic Techniques S Sanyal International Journal of Engineering Science and Management 4 (2), 34, 2014 | 4 | 2014 |
Securing Cloud from Cloud Drain T Sarkar, N Das Int. J. Advanced Networking and Applications 6 (2), 2262-2265, 2014 | 3* | 2014 |
Secure Broadcast Using Random Keys in Wireless Sensor Networks. T Sarkar, PK Singh, PK Das, N Mukherjee ICWN, 173-176, 2010 | | 2010 |
REVERSIBLE AND IRREVERSIBLE DATA HIDING T Sarkar, S Sanyal INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES AND MANAGEMENT, 93, 0 | | |