| Enforcement of access control policy for mobile ad hoc networks S Maity, SK Ghosh Proceedings of the Fifth International Conference on Security of Information …, 2012 | 13 | 2012 |
| An access control framework for semi-infrastructured Ad hoc networks S Maity, P Bera, SK Ghosh 2010 2nd International Conference on Computer Technology and Development …, 2010 | 11 | 2010 |
| Optimal negotiation of SLA in federated cloud using multiobjective genetic algorithms AC Soumya Maity 3rd IEEE International Conference on Cloud Networking, CloudNet 2014 …, 2014 | 9* | 2014 |
| Policy based ACL configuration synthesis in enterprise networks: A formal approach S Maity, P Bera, SK Ghosh 2012 International Symposium on Electronic System Design (ISED), 314-318, 2012 | 8 | 2012 |
| A mobile IP based WLAN security management framework with reconfigurable hardware acceleration S Maity, P Bera, SK Ghosh Proceedings of the 3rd International Conference on Security of Information …, 2010 | 6 | 2010 |
| Formal integrated network security analysis tool: formal query‐based network security configuration analysis S Maity, P Bera, SK Ghosh, E Al‐Shaer IET Networks 4 (2), 137-147, 2015 | 5 | 2015 |
| QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression A Chaudhuri, S Maity, SK Ghosh Proceedings of the 30th Annual ACM Symposium on Applied Computing, 659-661, 2015 | 4 | 2015 |
| A cognitive trust model for access control framework in manet S Maity, SK Ghosh International Conference on Information Systems Security, 75-88, 2012 | 4 | 2012 |
| A query based formal security analysis framework for enterprise LAN P Bera, S Maity, SK Ghosh, P Dasgupta 2010 10th IEEE International Conference on Computer and Information …, 2010 | 4 | 2010 |
| System for query-based interactive risk model analysis for secure software development S Maity, LB Sudakar US Patent 12,393,693, 2025 | 3 | 2025 |
| AFormal VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP BASED WLAN S Maity, P Bera, SK Ghosh, P Dasgupta International Journal of Network Security & Its Applications (IJNSA) 2 (4 …, 2010 | 3 | 2010 |
| PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks S Maity, SK Ghosh, E Al‐Shaer Security and Communication Networks 8 (3), 418-430, 2015 | 2 | 2015 |
| Generating policy based security implementation in enterprise network: a formal framework P Bera, S Maity, SK Ghosh Proceedings of the 3rd ACM workshop on Assurable and usable security …, 2010 | 2 | 2010 |
| Conflict resolution in heterogeneous co-allied MANET: A formal approach S Maity, SK Ghosh International Conference on Distributed Computing and Networking, 332-346, 2014 | 1 | 2014 |
| Method and system for establishing trust between nodes in a network based on recommendations S Maity, SK Bikumala US Patent 11,652,877, 2023 | | 2023 |
| QoS Prediction for Network Data Traffic using Hierarchical Modified Regularized Least Squares Rough Support Vector Regression SKG Arindam Chaudhuri, Soumya Maity The 30th ACM Symposium On Applied Computing (SAC 2015), Salamanca, Spain …, 2015 | | 2015 |
| Access Control Models for Mobile Ad Hoc Networks S Maity IIT Kharagpur, 2014 | | 2014 |
| Security and Access Control in Mobile ad hoc Networks S Maity, SK Ghosh Building Next-Generation Converged Networks, 241-262, 2013 | | 2013 |
| A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model P Bera, S Maity, SK Ghosh, P Dasgupta International Conference on Network Security and Applications, 232-241, 2010 | | 2010 |
| Access Control in Mobile Ad Hoc Networks S Maity | | |