Login / Signup
Soumya Maity
Publication Activity (10 Years)
Years Active: 2010-2015
Publications (10 Years): 3
Top Topics
Autoregressive Conditional Heteroscedasticity
Access Control Policies
Analysis Tool
Mobile Ad Hoc Networks
Top Venues
ISED
ICISS
SAC
Secur. Commun. Networks
</>
Publications
</>
Arindam Chaudhuri
,
Soumya Maity
,
Soumya Kanti Ghosh
QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression.
SAC
(2015)
Soumya Maity
,
Soumya Kanti Ghosh
,
Ehab Al-Shaer
PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks.
Secur. Commun. Networks
8 (3) (2015)
Soumya Maity
,
Padmalochan Bera
,
S. K. Ghosh
,
Ehab Al-Shaer
Formal integrated network security analysis tool: formal query-based network security configuration analysis.
IET Networks
4 (2) (2015)
Soumya Maity
,
Arindam Chaudhuri
Optimal negotiation of SLA in federated cloud using multiobjective genetic algorithms.
CloudNet
(2014)
Soumya Maity
,
Soumya Kanti Ghosh
Conflict Resolution in Heterogeneous Co-allied MANET: A Formal Approach.
ICDCN
(2014)
Soumya Maity
,
Soumya Kanti Ghosh
Enforcement of access control policy for mobile ad hoc networks.
SIN
(2012)
Soumya Maity
,
Padmalochan Bera
,
S. K. Ghosh
Policy Based ACL Configuration Synthesis in Enterprise Networks: A Formal Approach.
ISED
(2012)
Soumya Maity
,
Soumya Kanti Ghosh
A Cognitive Trust Model for Access Control Framework in MANET.
ICISS
(2012)
Padmalochan Bera
,
Soumya Maity
,
Soumya Kanti Ghosh
,
Pallab Dasgupta
A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model.
CNSA
(2010)
Padmalochan Bera
,
Soumya Maity
,
Soumya Kanti Ghosh
,
Pallab Dasgupta
A Query based Formal Security Analysis Framework for Enterprise LAN.
CIT
(2010)
Soumya Maity
,
Padmalochan Bera
,
Soumya Kanti Ghosh
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration.
SIN
(2010)
Padmalochan Bera
,
Soumya Maity
,
Soumya Kanti Ghosh
Generating policy based security implementation in enterprise network: a formal framework.
SafeConfig
(2010)