Soumya K. Ghosh
Cited by
Cited by
iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments
H Gupta, A Vahid Dastjerdi, SK Ghosh, R Buyya
Software: Practice and Experience 47 (9), 1275-1296, 2017
Fog computing: Principles, architectures, and applications
AV Dastjerdi, H Gupta, RN Calheiros, SK Ghosh, R Buyya
Internet of things, 61-75, 2016
Enhancement of lifetime using duty cycle and network coding in wireless sensor networks
RR Rout, SK Ghosh
IEEE Transactions on Wireless Communications 12 (2), 656-667, 2012
A review on telemedicine-based WBAN framework for patient monitoring
C Chakraborty, B Gupta, SK Ghosh
Telemedicine and e-Health 19 (8), 619-626, 2013
SelCSP: A framework to facilitate selection of cloud service providers
N Ghosh, SK Ghosh, SK Das
IEEE transactions on cloud computing 3 (1), 66-79, 2014
Optical character recognition systems
A Chaudhuri, K Mandaviya, P Badelia, SK Ghosh
Optical Character Recognition Systems for Different Languages with Soft …, 2017
Spatial interpolation to predict missing attributes in GIS using semantic kriging
S Bhattacharjee, P Mitra, SK Ghosh
IEEE Transactions on Geoscience and Remote Sensing 52 (8), 4771-4780, 2013
Deep-STEP: A deep learning approach for spatiotemporal prediction of remote sensing data
M Das, SK Ghosh
IEEE Geoscience and Remote Sensing Letters 13 (12), 1984-1988, 2016
Conditional random field based named entity recognition in geological text
N Sobhana, P Mitra, SK Ghosh
International Journal of Computer Applications 1 (3), 143-147, 2010
An approach for service oriented discovery and retrieval of spatial data
M Paul, SK Ghosh
Proceedings of the 2006 international workshop on Service-oriented software …, 2006
Adaptive data aggregation and energy efficiency using network coding in a clustered wireless sensor network: An analytical approach
RR Rout, SK Ghosh
Computer Communications 40, 65-75, 2014
A planner-based approach to generate and analyze minimal attack graph
N Ghosh, SK Ghosh
Applied Intelligence 36 (2), 369-390, 2012
An intelligent technique for generating minimal attack graph
N Ghosh, SK Ghosh
First Workshop on Intelligent Security (Security and Artificial Intelligence …, 2009
Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks
RP Barnwal, SK Ghosh
2012 International Conference on Connected Vehicles and Expo (ICCVE), 29-34, 2012
An approach for security assessment of network configurations using attack graph
N Ghosh, SK Ghosh
2009 First International Conference on Networks & Communications, 283-288, 2009
A probabilistic nonlinear model for forecasting daily water level in reservoir
M Das, SK Ghosh, VM Chowdary, A Saikrishnaveni, RK Sharma
Water Resources Management 30 (9), 3107-3122, 2016
Telemedicine supported chronic wound tissue prediction using classification approaches
C Chakraborty, B Gupta, SK Ghosh, DK Das, C Chakraborty
Journal of medical systems 40 (3), 68, 2016
STACRP: a secure trusted auction oriented clustering based routing protocol for MANET
P Chatterjee, I Sengupta, SK Ghosh
Cluster Computing 15 (3), 303-320, 2012
SDFog: A software defined computing architecture for QoS aware service orchestration over edge devices
H Gupta, SB Nath, S Chakraborty, SK Ghosh
arXiv preprint arXiv:1609.01190, 2016
Policy based security analysis in enterprise networks: A formal approach
P Bera, SK Ghosh, P Dasgupta
IEEE Transactions on Network and Service Management 7 (4), 231-243, 2010
The system can't perform the operation now. Try again later.
Articles 1–20