Dr. N. Syed Siraj Ahmed
Title
Cited by
Cited by
Year
Internet of Things: novel advances and envisioned applications
DP Acharjya, MK Geetha, S Sanyal, NSS Ahmed
Springer, 2017
262017
Detection of denial of service attack in wireless network using dominance based rough set
NSS Ahmed, DP Acharjya
International Journal of Advanced Computer Science and Applications 6 (12 …, 2015
102015
A framework for phishing attack identification using rough set and formal concept analysis
NSS Ahmed, DP Acharjya, S Sanyal
International Journal of Communication Networks and Distributed Systems 18 …, 2017
82017
Recognizing Attacks in Wireless Sensor Network in View of Internet of Things
DP Acharjya, NSS Ahmed
Internet of Things: novel advances and envisioned applications 25, 149-172, 2017
62017
Dominance Based Rough Set Approach for the Detection of Jamming Attack
NSS Ahmed, DP Acharjya
International Journal of Philosophies in Computer Science 1 (2), 45-66, 2016
62016
A framework for various attack identification in MANET using Multi Granular Rough Set
NSS Ahmed, DP Acharjya
International Journal of Information Security and Privacy 13 (4), 28-53, 2019
32019
An application of containing order rough set for analyzing data of intrusion detection
NSS Ahmed
An Interdisciplinary J. of Scientific Research & Edu 2 (5), 52-57, 2016
22016
Public Key Cryptography Algorithm Using Binary Manipulation and Chinese Remainder Theorem
NSS Ahmed, R Selvakumar, A Taywade
International Journal of Recent Technology and Engineering (IJRTE) 2 (5), 85-88, 2013
1*2013
Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis
DP Acharjya, NSS Ahmed
Peer to Peer Networking and Applications, 2020
2020
Analyzing and tracing of various packet dropping attacks using containing order rough set
VAA Basha, NSS Ahmed
IOSR Journal of Engineering 2 (Special Issue on IoT), 10-16, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–10