BibTeX records: Nandita Sengupta

download as .bib file

@book{DBLP:series/cir/SenguptaS20,
  author    = {Nandita Sengupta and
               Jaya Sil},
  title     = {Intrusion Detection - {A} Data Mining Approach},
  series    = {Cognitive Intelligence and Robotics},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-981-15-2716-6},
  doi       = {10.1007/978-981-15-2716-6},
  isbn      = {978-981-15-2715-9},
  timestamp = {Mon, 03 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/series/cir/SenguptaS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzIEEE/LahaKDDSN20,
  author    = {Mousumi Laha and
               Amit Konar and
               Madhuparna Das and
               Chandrima Debnath and
               Nandita Sengupta and
               Atulya K. Nagar},
  title     = {{P200} and {N400} Induced Aesthetic Quality Assessment of an Actor
               Using Type-2 Fuzzy Reasoning},
  booktitle = {29th {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE}
               2020, Glasgow, UK, July 19-24, 2020},
  pages     = {1--8},
  publisher = {{IEEE}},
  year      = {2020},
  url       = {https://doi.org/10.1109/FUZZ48607.2020.9177773},
  doi       = {10.1109/FUZZ48607.2020.9177773},
  timestamp = {Thu, 10 Sep 2020 16:38:18 +0200},
  biburl    = {https://dblp.org/rec/conf/fuzzIEEE/LahaKDDSN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awict/Sengupta17,
  author    = {Nandita Sengupta},
  editor    = {Hani Hamdan},
  title     = {Machine Learning Based Intrusion Detection System for Social Network
               of Europe},
  booktitle = {Proceedings of the Second International Conference on Advanced Wireless
               Information, Data, and Communication Technologies, {AWICT} 2017, Paris,
               France, November 13-14, 2017},
  pages     = {13:1--13:6},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3231830.3231843},
  doi       = {10.1145/3231830.3231843},
  timestamp = {Wed, 14 Nov 2018 09:56:35 +0100},
  biburl    = {https://dblp.org/rec/conf/awict/Sengupta17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdcc/Sengupta17,
  author    = {Nandita Sengupta},
  editor    = {Hani Hamdan and
               Djallel Eddine Boubiche and
               Homero Toral{-}Cruz and
               Sedat Akleylek and
               Hamid Mcheick},
  title     = {Designing encryption and {IDS} for cloud security},
  booktitle = {Proceedings of the Second International Conference on Internet of
               things and Cloud Computing, {ICC} 2017, Cambridge, United Kingdom,
               March 22-23, 2017},
  pages     = {58:1--58:5},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3018896.3018954},
  doi       = {10.1145/3018896.3018954},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/conf/iotdcc/Sengupta17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/SenguptaSSS13,
  author    = {Nandita Sengupta and
               Jaydeep Sen and
               Jaya Sil and
               Moumita Saha},
  title     = {Designing of on line intrusion detection system using rough set theory
               and Q-learning algorithm},
  journal   = {Neurocomputing},
  volume    = {111},
  pages     = {161--168},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.neucom.2012.12.023},
  doi       = {10.1016/j.neucom.2012.12.023},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijon/SenguptaSSS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semcco/MitraMSSS12,
  author    = {Rahul Mitra and
               Sahisnu Mazumder and
               Tuhin Sharma and
               Nandita Sengupta and
               Jaya Sil},
  editor    = {Bijaya K. Panigrahi and
               Swagatam Das and
               Ponnuthurai Nagaratnam Suganthan and
               Pradipta Kumar Nanda},
  title     = {Dynamic Network Traffic Data Classification for Intrusion Detection
               Using Genetic Algorithm},
  booktitle = {Swarm, Evolutionary, and Memetic Computing - Third International Conference,
               {SEMCCO} 2012, Bhubaneswar, India, December 20-22, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7677},
  pages     = {509--518},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35380-2\_60},
  doi       = {10.1007/978-3-642-35380-2\_60},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/semcco/MitraMSSS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semcco/MazumderSMSS12,
  author    = {Sahisnu Mazumder and
               Tuhin Sharma and
               Rahul Mitra and
               Nandita Sengupta and
               Jaya Sil},
  editor    = {Bijaya K. Panigrahi and
               Swagatam Das and
               Ponnuthurai Nagaratnam Suganthan and
               Pradipta Kumar Nanda},
  title     = {Generation of Sufficient Cut Points to Discretize Network Traffic
               Data Sets},
  booktitle = {Swarm, Evolutionary, and Memetic Computing - Third International Conference,
               {SEMCCO} 2012, Bhubaneswar, India, December 20-22, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7677},
  pages     = {528--539},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35380-2\_62},
  doi       = {10.1007/978-3-642-35380-2\_62},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/semcco/MazumderSMSS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics