Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Amit Kr Mandal"'
Autor:
Soumyajyoti Biswas, Amit Kr Mandal
Publikováno v:
Mathematical Biosciences and Engineering, Vol 18, Iss 6, Pp 7965-7978 (2021)
The impact of the ongoing COVID-19 pandemic is being felt in all spheres of our lives – cutting across the boundaries of nation, wealth, religions or race. From the time of the first detection of infection among the public, the virus spread though
Externí odkaz:
https://doaj.org/article/3a9a773ec2fc43b7b46f761c7143cc38
Publikováno v:
2023 4th International Conference on Computing and Communication Systems (I3CS).
Publikováno v:
Applied Computing for Software and Smart Systems ISBN: 9789811967900
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0f3431e8c3d7615f247e5349b9046657
https://doi.org/10.1007/978-981-19-6791-7_18
https://doi.org/10.1007/978-981-19-6791-7_18
Publikováno v:
2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT).
Autor:
Amit Kr Mandal, Soumyajyoti Biswas
Publikováno v:
Mathematical Biosciences and Engineering, Vol 18, Iss 6, Pp 7965-7978 (2021)
The impact of the ongoing COVID-19 pandemic is being felt in all spheres of our lives – cutting across the boundaries of nation, wealth, religions or race. From the time of the first detection of infection among the public, the virus spread though
Publikováno v:
Computer Standards & Interfaces. 84:103697
Publikováno v:
SSRN Electronic Journal.
Autor:
Anirban Sarkar, Amit Kr Mandal
Publikováno v:
International Journal of Cloud Applications and Computing. 9:1-21
Cloud hosts numerous services with various underlying business logic and data stores. In this multifaceted and distributed environment locating or updating SaaS services is a crucial task. Researchers proposed various mechanism for this purpose, whic
The Open Web Application Security Project (OWASP), released the “OWASP Top 10 Internet of Things 2018” list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward devel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c2931b36065630c234107f2971a98fee
http://hdl.handle.net/10278/3734701
http://hdl.handle.net/10278/3734701
Publikováno v:
SAC
Cross-program propagation of tainted data (such as sensitive information or user input) in an interactive IoT system is listed among the OWASP IoT top 10 most critical security risks. When programs run on distinct devices, as it occurs in IoT systems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::578134fc29c0151df08195909aa356f6
http://hdl.handle.net/10278/3720937
http://hdl.handle.net/10278/3720937