default search action
Mohuya Chakraborty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Mohuya Chakraborty, Atul Khekade:
XDC Network Assessment: Decentralization, Scalability and Security. CoRR abs/2408.02318 (2024) - [i1]Mohuya Chakraborty, Atul Khekade:
XDC Gasless Subnet: Gasless Subnet Staking dApp for XDC Network. CoRR abs/2409.17176 (2024) - 2023
- [j10]Sudip Kumar Palit, Mohuya Chakraborty, Subhalaxmi Chakraborty:
Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network. J. Supercomput. 79(4): 3902-3935 (2023) - 2022
- [j9]Sudip Kumar Palit, Mohuya Chakraborty, Subhalaxmi Chakraborty:
AUGChain: blockchain-based mobile user authentication scheme in global mobility network. J. Supercomput. 78(5): 6788-6816 (2022) - 2021
- [j8]Swagata Roy Chatterjee, Sreya Ghosh, Mohuya Chakraborty:
Nash Bargaining in Resource Allocation for Cognitive Radio: A Review. Wirel. Pers. Commun. 118(1): 125-139 (2021) - 2020
- [j7]Swagata Roy Chatterjee, Jayanta Chowdhury, Supriya Dhabal, Mohuya Chakraborty:
Hardware design methodology of multilayer feedforward neural network for spectrum sensing in cognitive radio. Int. J. Wirel. Mob. Comput. 19(4): 340-351 (2020)
2010 – 2019
- 2018
- [j6]Swagata Roy Chatterjee, Mohuya Chakraborty, Debashis Saha:
A novel channel state prediction technique for overlay cognitive radio-based emergency sensor networks. Int. J. Knowl. Eng. Data Min. 5(1/2): 90-113 (2018) - 2014
- [c7]Swagata Roy Chatterjee, Soham Majumder, Bodhisatta Pramanik, Mohuya Chakraborty:
FPGA Implementation of Pipelined Blowfish Algorithm. ISED 2014: 208-209 - 2011
- [j5]Swagata Roy Chatterjee, Mohuya Chakraborty, Jayanta Chakraborty:
Cognitive Radio Sensor Node Empowered Mobile Phone for Explosive Trace Detection. Int. J. Commun. Netw. Syst. Sci. 4(1): 33-41 (2011) - [j4]Indraneel Mukhopadhyay, Mohuya Chakraborty, Satyajit Chakrabarti:
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems. J. Information Security 2(1): 28-38 (2011) - [c6]Indraneel Mukhopadhyay, Mohuya Chakraborty, S. Chakrabarti:
HawkEye solutions: a network intrusion detection system. ICWET 2011: 252-257 - [c5]Indraneel Mukhopadhyay, Mohuya Chakraborty, S. Chakrabarti, Tanusree Chatterjee:
Back propagation neural network approach to Intrusion Detection System. ReTIS 2011: 303-308 - 2010
- [c4]S. Chakrabarti, Mohuya Chakraborty, Indraneel Mukhopadhyay:
Study of snort-based IDS. ICWET 2010: 43-47
2000 – 2009
- 2007
- [j3]Mohuya Chakraborty, Iti Saha Misra, Debashis Saha, Amitava Mukherjee:
TLMM: MIP-based Three Level Mobility Model. Comput. Commun. 30(6): 1244-1257 (2007) - 2006
- [j2]Mohuya Chakraborty, Ananya Ray:
Optimal Selection of Collieries for Reconstruction: an Application of Fuzzy 0-1 Linear Programming. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 14(6): 733-745 (2006) - [c3]Iti Saha Misra, Mohuya Chakraborty, Debashis Saha, Amitava Mukherjee:
An Approach for Optimal Hierarchical Mobility, Management Network Architecture. VTC Spring 2006: 481-485 - 2004
- [j1]Debashis Saha, Amitava Mukherjee, Iti Saha Misra, Mohuya Chakraborty:
Mobility support in IP: a survey of related protocols. IEEE Netw. 18(6): 34-40 (2004) - [c2]Mohuya Chakraborty, Iti Saha Misra, Debashis Saha, Amitava Mukherjee:
QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks. IWDC 2004: 192-197 - 2003
- [c1]Iti Saha Misra, Mohuya Chakraborty, Debashis Saha, Amitava Mukherjee, Billawdeep Deb, Bitihotra Chatterjee:
Global Mobility Management: A Three Level Architecture for Next Generation Wireless Networks. IWDC 2003: 184-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint