Attack graph generation and analysis techniques MS Barik, A Sengupta, C Mazumdar Defence science journal 66 (6), 559, 2016 | 79 | 2016 |
e-Commerce security—A life cycle approach A Sengupta, C Mazumdar, MS Barik Sadhana 30, 119-140, 2005 | 69 | 2005 |
A two-phase quantitative methodology for enterprise information security risk analysis J Bhattacharjee, A Sengupta, C Mazumdar, MS Barik Proceedings of the CUBE International Information Technology Conference, 809-815, 2012 | 24 | 2012 |
An efficient technique for enhancing forensic capabilities of Ext2 file system MS Barik, G Gupta, S Sinha, A Mishra, C Mazumdar digital investigation 4, 55-61, 2007 | 22 | 2007 |
A graph data model for attack graph generation and analysis MS Barik, C Mazumdar Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014 | 17 | 2014 |
Goal based threat modeling for peer-to-peer cloud S De, MS Barik, I Banerjee Procedia Computer Science 89, 64-72, 2016 | 16 | 2016 |
Divya-Dristi: A smartphone based campus navigation system for the visually impaired S Dutta, MS Barik, C Chowdhury, D Gupta 2018 Fifth International Conference on Emerging Applications of Information …, 2018 | 15 | 2018 |
Network vulnerability analysis using a constrained graph data model MS Barik, C Mazumdar, A Gupta Information Systems Security: 12th International Conference, ICISS 2016 …, 2016 | 13 | 2016 |
ESRML: a markup language for enterprise security requirement specification J Roy, MS Barik, C Mazumdar Proceedings of the IEEE INDICON 2004. First India Annual Conference, 2004 …, 2004 | 12 | 2004 |
A novel approach to collaborative security using attack graph MS Barik, C Mazumdar 2011 IEEE 5th International Conference on Internet Multimedia Systems …, 2011 | 7 | 2011 |
Enterprise Information Security Risk Analysis: A Quantitative Methodology C Mazumdar, MS Barik, A Sengupta Proceedings of the National Workshop on Software Security (NWSS 2007), 1-12, 2007 | 7 | 2007 |
Detection of flow violation in distributed SDN controller B Halder, MS Barik, C Mazumdar 2018 Fifth international conference on emerging applications of information …, 2018 | 6 | 2018 |
A graph based formalism for detecting flow conflicts in software defined network B Halder, MS Barik, C Mazumdar 2017 IEEE International Conference on Advanced Networks and …, 2017 | 6 | 2017 |
An analytical study of methodologies and tools for enterprise information security risk management J Bhattacharjee, A Sengupta, MS Barik, C Mazumdar Information Technology Risk Management and Compliance in Modern …, 2018 | 5 | 2018 |
Managing the Cyber Security Life‐Cycle of Smart Cities MS Barik, A Sengupta, C Mazumdar Smart cities: Foundations, principles, and applications, 391-407, 2017 | 5 | 2017 |
A web-enabled enterprise security management framework based on a unified model of enterprise information system security A Sengupta, A Mukhopadhyay, K Ray, AG Roy, D Aich, MS Barik, ... Information Systems Security: First International Conference, ICISS 2005 …, 2005 | 5 | 2005 |
A digital forensic process model for cloud computing S De, MS Barik, I Banerjee 2020 IEEE Calcutta Conference (CALCON), 106-110, 2020 | 4 | 2020 |
AGQL: A query language for attack graph based network vulnerability analysis MS Barik 2018 Fifth International Conference on Emerging Applications of Information …, 2018 | 4 | 2018 |
Final technical report for project development of validated security processes and methodologies for web-based enterprises C Mazumdar, MS Barik, S Das, J Roy, MA Barkat | 3 | 2003 |
Design and implementation of a soft real time fault tolerant system S Dutta, S Dutta, R Burman, M Sankar Barik, C Mazumdar Distributed Computing: Mobile and Wireless Computing 4th International …, 2002 | 3 | 2002 |