![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Chandan Mazumdar
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j19]Asmita Manna
, Anirban Sengupta
, Chandan Mazumdar:
A risk-based methodology for privacy requirements elicitation and control selection. Secur. Priv. 5(1) (2022) - [j18]Preetam Mukherjee
, Anirban Sengupta, Chandan Mazumdar:
"Security Gap" as a metric for enterprise business processes. Secur. Priv. 5(6) (2022) - [c29]Sagnik Lahiri, Sumit Misra, Sanjoy Kumar Saha, Chandan Mazumdar:
Clustering-Based Semi-supervised Technique for Credit Card Fraud Detection. CICBA 2022: 260-268 - 2021
- [c28]Debashis Mandal, Chandan Mazumdar:
Towards an Ontology for Enterprise Level Information Security Policy Analysis. ICISSP 2021: 492-499 - 2020
- [c27]Puloma Roy, Anirban Sengupta
, Chandan Mazumdar:
A Structured Control Selection Methodology for Insider Threat Mitigation. CENTERIS/ProjMAN/HCist 2020: 1187-1195
2010 – 2019
- 2019
- [j17]Preetam Mukherjee
, Chandan Mazumdar
:
"Security Concern" as a Metric for Enterprise Business Processes. IEEE Syst. J. 13(4): 4015-4026 (2019) - [j16]Preetam Mukherjee
, Chandan Mazumdar
:
Corrections to "'Security Concern' as a Metric for Enterprise Business Processes". IEEE Syst. J. 13(4): 4484 (2019) - [c26]Asmita Manna
, Anirban Sengupta
, Chandan Mazumdar:
A Quantitative Methodology for Business Process-Based Data Privacy Risk Computation. ACSS (2) 2019: 17-33 - 2018
- [c25]Preetam Mukherjee, Chandan Mazumdar:
Attack Difficulty Metric for Assessment of Network Security. ARES 2018: 44:1-44:10 - 2017
- [j15]Sumit Misra, Sanjoy Kumar Saha, Chandan Mazumdar:
A dynamic model for short-term prediction of stream attributes. Innov. Syst. Softw. Eng. 13(4): 261-269 (2017) - [c24]Biswajit Halder, Mridul Sankar Barik, Chandan Mazumdar:
A graph based formalism for detecting flow conflicts in software defined network. ANTS 2017: 1-6 - [c23]Srijita Basu, Anirban Sengupta, Chandan Mazumdar:
A Quantitative Methodology for Cloud Security Risk Assessment. CLOSER 2017: 92-103 - 2016
- [j14]Srijita Basu, Anirban Sengupta
, Chandan Mazumdar:
Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy. Enterp. Inf. Syst. 10(9): 1024-1046 (2016) - [c22]Arunavha Chanda, Dipankar Das, Chandan Mazumdar:
Unraveling the English-Bengali Code-Mixing Phenomenon. CodeSwitch@EMNLP 2016: 80-89 - [c21]Arunavha Chanda, Dipankar Das, Chandan Mazumdar:
Columbia-Jadavpur submission for EMNLP 2016 Code-Switching Workshop Shared Task: System description. CodeSwitch@EMNLP 2016: 112-115 - [c20]Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta:
Network Vulnerability Analysis Using a Constrained Graph Data Model. ICISS 2016: 263-282 - [c19]Jaya Bhattacharjee, Anirban Sengupta
, Chandan Mazumdar:
A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes. ICISSP 2016: 388-399 - [c18]Srijita Basu, Anirban Sengupta
, Chandan Mazumdar:
An Automated Methodology for Secured User Allocation in Cloud. SSCC 2016: 137-151 - 2015
- [j13]Susmita Bhaduri
, Orchisama Das, Sanjoy Kumar Saha, Chandan Mazumdar:
Rhythm analysis of tablā signal by detecting the cyclic pattern. Innov. Syst. Softw. Eng. 11(3): 187-195 (2015) - [j12]Subhasis Dasgupta
, Pinakpani Pal, Chandan Mazumdar, Aditya Bagchi:
Resolving authorization conflicts by ontology views for controlled access to a digital library. J. Knowl. Manag. 19(1): 45-59 (2015) - [c17]Preetam Mukherjee, Chandan Mazumdar:
A Novel Model of Security Policies and Requirements. ICISSP 2015: 73-82 - [c16]Puloma Roy, Chandan Mazumdar:
Modelling of Enterprise Insider Threats. ICISSP 2015: 132-136 - [e3]Sushil Jajodia
, Chandan Mazumdar:
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings. Lecture Notes in Computer Science 9478, Springer 2015, ISBN 978-3-319-26960-3 [contents] - 2014
- [j11]Subhra Kanti Das, Chandan Mazumdar, Kumardeb Banerjee:
GPU accelerated novel particle filtering method. Computing 96(8): 749-773 (2014) - [j10]Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar, Mridul Sankar Barik:
A two-phase quantitative methodology for enterprise information security risk analysis. Comput. Syst. Sci. Eng. 29(1) (2014) - [c15]Jaya Bhattacharjee, Anirban Sengupta
, Chandan Mazumdar:
A Formal Methodology for Modeling Threats to Enterprise Assets. ICISS 2014: 149-166 - [c14]Mridul Sankar Barik, Chandan Mazumdar:
A Graph Data Model for Attack Graph Generation and Analysis. SNDS 2014: 239-250 - 2013
- [c13]Sumit Misra, Sanjoy Kumar Saha, Chandan Mazumdar:
Performance Comparison of Hadoop Based Tools with Commercial ETL Tools - A Case Study. BDA 2013: 176-184 - [c12]Jaya Bhattacharjee, Anirban Sengupta
, Chandan Mazumdar:
A formal methodology for Enterprise Information Security risk assessment. CRiSIS 2013: 1-9 - 2012
- [j9]Debajyoti Konar, Chandan Mazumdar:
A Practical Approach of Fairness in E-Procurement. Int. J. Inf. Secur. Priv. 6(3): 88-110 (2012) - [c11]Anirban Sengupta
, Chandan Mazumdar, Aditya Bagchi:
Specification and validation of enterprise information security policies. CUBE 2012: 801-808 - [c10]Jaya Bhattacharjee, Anirban Sengupta
, Chandan Mazumdar, Mridul Sankar Barik:
A two-phase quantitative methodology for enterprise information security risk analysis. CUBE 2012: 809-815 - 2011
- [j8]Anirban Sengupta
, Chandan Mazumdar:
A Mark-Up Language for the Specification of Information Security Governance Requirements. Int. J. Inf. Secur. Priv. 5(2): 33-53 (2011) - [j7]Anirban Sengupta
, Chandan Mazumdar, Aditya Bagchi:
A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System. J. Netw. Syst. Manag. 19(3): 319-342 (2011) - [c9]Sulagna Bandopadhyay, Anirban Sengupta
, Chandan Mazumdar:
A quantitative methodology for information security control gap analysis. ICCCS 2011: 537-540 - [e2]Sushil Jajodia
, Chandan Mazumdar:
Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings. Lecture Notes in Computer Science 7093, Springer 2011, ISBN 978-3-642-25559-5 [contents]
2000 – 2009
- 2009
- [j6]Debajyoti Konar, Chandan Mazumdar:
A generalised model of e-trading for gradual secret release fair exchange protocol. Int. J. Electron. Secur. Digit. Forensics 2(1): 101-111 (2009) - [c8]Anirban Sengupta
, Chandan Mazumdar, Aditya Bagchi:
A formal methodology for detection of vulnerabilities in an enterprise information system. CRiSIS 2009: 74-81 - [c7]Debajyoti Konar, Chandan Mazumdar:
Generalized GSR model of Fair Exchange in E-contracting. CTS 2009: 468-475 - 2007
- [j5]Mridul Sankar Barik, Gaurav Gupta, Shubhro Sinha, Alok Mishra, Chandan Mazumdar:
An efficient technique for enhancing forensic capabilities of Ext2 file system. Digit. Investig. 4(Supplement): 55-61 (2007) - [c6]Gaurav Gupta, Sanjoy Kumar Saha, Shayok Chakraborty, Chandan Mazumdar:
Document Frauds: Identification and Linking Fake Document to Scanners and Printers. ICCTA 2007: 497-501 - 2006
- [j4]Gaurav Gupta, Chandan Mazumdar, M. S. Rao, R. B. Bhosale:
Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents. Digit. Investig. 3(1): 43-55 (2006) - [c5]Debajyoti Konar, Chandan Mazumdar:
An Improved E-Commerce Protocol for Fair Exchange. ICDCIT 2006: 305-313 - 2005
- [c4]Anirban Sengupta
, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar:
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security . ICISS 2005: 328-331 - [e1]Sushil Jajodia, Chandan Mazumdar:
Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3803, Springer 2005, ISBN 3-540-30706-0 [contents] - 2004
- [j3]Gaurav Gupta, Chandan Mazumdar, M. S. Rao:
Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol. Int. J. Digit. EVid. 2(4) (2004) - 2002
- [j2]S. S. Murthy, Chandan Mazumdar, M. S. Rao, A. K. Pal:
Intensity-based image matching for regular firearms. Int. J. Imaging Syst. Technol. 12(2): 68-72 (2002) - [c3]Surajit Dutta, Sudip Dutta, Riddhi Burman, Mridul Sankar Barik, Chandan Mazumdar:
Design and Implementation of a Soft Real Time Fault Tolerant System. IWDC 2002: 319-328
1990 – 1999
- 1994
- [c2]Shyamal Mazumdar, Chandan Mazumdar:
Authoring Software for Higher Educational Environment. Applied Informatics 1994: 171-173
1980 – 1989
- 1986
- [j1]Sukumar Ghosh, Somprakash Bandyopadhyay, Chandan Mazumdar:
Study of a Simulated Stream Machine for Dataflow Computation. Perform. Evaluation 6(4): 269-291 (1986) - 1984
- [c1]Sukumar Ghosh, Somprakash Bandyopadhyay, Chandan Mazumdar, S. Bhattacharya:
Handling of recursion in dataflow model. ACM Annual Conference 1984: 189-196
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint