default search action
Subir Halder
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j25]Subir Halder, Thomas Newe:
Radio fingerprinting for anomaly detection using federated learning in LoRa-enabled Industrial Internet of Things. Future Gener. Comput. Syst. 143: 322-336 (2023) - [j24]Subir Halder, Amrita Ghosal, Mauro Conti:
Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks. IEEE Trans. Wirel. Commun. 22(2): 1014-1028 (2023) - [c20]Subir Halder, Amrita Ghosal, Thomas Newe, Sajal K. Das:
SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT. CNS 2023: 1-9 - 2022
- [j23]Amrita Ghosal, Subir Halder, Mauro Conti:
Secure over-the-air software update for connected vehicles. Comput. Networks 218: 109394 (2022) - [j22]Subir Halder, Thomas Newe:
Enabling secure time-series data sharing via homomorphic encryption in cloud-assisted IIoT. Future Gener. Comput. Syst. 133: 351-363 (2022) - [j21]Subir Halder, Mauro Conti:
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem. IEEE Trans. Cloud Comput. 10(4): 2437-2450 (2022) - [c19]Subir Halder, Thomas Newe:
SmartCrypt: Secure Storing and Sharing of Time Series Data Streams in IIoT. CCNC 2022: 248-251 - [c18]Subir Halder, Thomas Newe:
Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT. ISPEC 2022: 161-178 - [c17]Subir Halder, Thomas Newe:
Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT. NOMS 2022: 1-9 - 2021
- [j20]Amrita Ghosal, Sang Uk Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti, Radha Poovendran, Linda Bushnell:
Truck platoon security: State-of-the-art and road ahead. Comput. Networks 185: 107658 (2021) - [j19]Aanshi Bhardwaj, Veenu Mangat, Renu Vig, Subir Halder, Mauro Conti:
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions. Comput. Sci. Rev. 39: 100332 (2021) - [j18]Subir Halder, Mauro Conti, Sajal K. Das:
A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks. Pervasive Mob. Comput. 73: 101385 (2021) - 2020
- [j17]Subir Halder, Amrita Ghosal, Mauro Conti:
Secure over-the-air software updates in connected vehicles: A survey. Comput. Networks 178: 107343 (2020) - [j16]Amrita Ghosal, Subir Halder, Sajal K. Das:
Distributed on-demand clustering algorithm for lifetime optimization in wireless sensor networks. J. Parallel Distributed Comput. 141: 129-142 (2020) - [c16]Amrita Ghosal, Subir Halder, Mauro Conti:
STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles. ICC 2020: 1-6 - [c15]Subir Halder, Mauro Conti, Sajal K. Das:
COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks. ICDCN 2020: 22:1-22:10
2010 – 2019
- 2019
- [j15]Subir Halder, Amrita Ghosal, Mauro Conti:
Efficient physical intrusion detection in Internet of Things: A Node deployment approach. Comput. Networks 154: 28-46 (2019) - [j14]Subir Halder, Amrita Ghosal, Mauro Conti:
LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things. Wirel. Networks 25(8): 4459-4477 (2019) - [c14]Amrita Ghosal, Subir Halder, Mauro Conti:
DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things. ICCCN 2019: 1-9 - [c13]Subir Halder, Mauro Conti:
Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystem. SAC 2019: 284-291 - [i1]Subir Halder, Amrita Ghosal, Mauro Conti:
Secure OTA Software Updates in Connected Vehicles: A survey. CoRR abs/1904.00685 (2019) - 2017
- [j13]Amrita Ghosal, Subir Halder:
A survey on energy efficient intrusion detection in wireless sensor networks. J. Ambient Intell. Smart Environ. 9(2): 239-261 (2017) - [j12]Amrita Ghosal, Subir Halder, Stefano Chessa:
Secure key design approaches using entropy harvesting in wireless sensor network: A survey. J. Netw. Comput. Appl. 78: 216-230 (2017) - [j11]Amrita Ghosal, Subir Halder:
Lifetime Optimizing Clustering Structure Using Archimedes' Spiral-Based Deployment in WSNs. IEEE Syst. J. 11(2): 1039-1048 (2017) - [j10]Subir Halder, Amrita Ghosal:
Lifetime enhancement of wireless sensor networks by avoiding energy-holes with Gaussian distribution. Telecommun. Syst. 64(1): 113-133 (2017) - 2016
- [j9]Subir Halder, Amrita Ghosal:
A survey on mobility-assisted localization techniques in wireless sensor networks. J. Netw. Comput. Appl. 60: 82-94 (2016) - [j8]Amrita Ghosal, Subir Halder:
Lifespan prolonging location-wise predetermined deployment strategy for visual sensor networks. J. Netw. Comput. Appl. 63: 86-97 (2016) - [j7]Subir Halder, Amrita Ghosal:
A Location-Wise Predetermined Deployment for Optimizing Lifetime in Visual Sensor Networks. IEEE Trans. Circuits Syst. Video Technol. 26(6): 1131-1145 (2016) - [j6]Subir Halder, Amrita Ghosal:
A survey on mobile anchor assisted localization techniques in wireless sensor networks. Wirel. Networks 22(7): 2317-2336 (2016) - 2015
- [j5]Subir Halder, Sipra Das Bit:
Design of an Archimedes' spiral based node deployment scheme targeting enhancement of network lifetime in wireless sensor networks. J. Netw. Comput. Appl. 47: 147-167 (2015) - [c12]Subir Halder, Amrita Ghosal:
A Predetermined Deployment Technique for Lifetime Optimization in Clustered WSNs. ICA3PP (4) 2015: 682-696 - [c11]Amrita Ghosal, Subir Halder:
Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor Networks. ICDCIT 2015: 325-330 - [c10]Subir Halder, Amrita Ghosal:
Lifetime maximizing clustering structure using archimedes' spiral based deployment in WSNs. IM 2015: 592-598 - [p2]Amrita Ghosal, Subir Halder:
Security in Mobile Wireless Sensor Networks: Attacks and Defenses. Advances in Social Media Analysis 2015: 185-205 - 2014
- [j4]Subir Halder, Sipra Das Bit:
Enhancement of wireless sensor network lifetime by deploying heterogeneous nodes. J. Netw. Comput. Appl. 38: 106-124 (2014) - [j3]Subir Halder, Sipra Das Bit:
Design of a Probability Density Function Targeting Energy-Efficient Node Deployment in Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 11(2): 204-219 (2014) - [c9]Subir Halder, Amrita Ghosal:
Enhancing the lifespan of visual sensor networks using a predetermined node deployment strategy. ISCC 2014: 1-6 - [c8]Amrita Ghosal, Subir Halder:
Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks. UIC/ATC/ScalCom 2014: 406-411 - 2013
- [c7]Subir Halder, Amrita Ghosal:
Is Sensor Deployment Using Gaussian Distribution Energy Balanced? ICA3PP (1) 2013: 58-71 - [p1]Amrita Ghosal, Subir Halder:
Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches. Wireless Networks and Security 2013: 329-367 - 2012
- [j2]Amrita Ghosal, Subir Halder, DasBit Sipra:
A dynamic TDMA based scheme for securing query processing in WSN. Wirel. Networks 18(2): 165-184 (2012) - [c6]Subir Halder, DasBit Sipra:
A lifetime enhancing node deployment strategy using heterogeneous nodes in WSNs for coal mine monitoring. MSWiM 2012: 117-124 - 2011
- [j1]Halder Subir, Amrita Ghosal, DasBit Sipra:
A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network. Comput. Commun. 34(11): 1294-1306 (2011) - [c5]Dan Avishek, Subir Halder, Sipra Das Bit:
Localization with enhanced location accuracy using RSSI in WSN. IEEE ANTS 2011: 1-6 - [c4]Halder Subir, Amrita Ghosal, Amartya Chaudhuri, DasBit Sipra:
A Probability Density Function for Energy-Balanced Lifetime-Enhancing Node Deployment in WSN. ICCSA (4) 2011: 472-487 - [c3]Subir Halder, Amrita Ghosal, Aadirupa Saha, DasBit Sipra:
Energy-Balancing and Lifetime Enhancement of Wireless Sensor Network with Archimedes Spiral. UIC 2011: 420-434 - 2010
- [c2]Amrita Ghosal, Halder Subir, Sanjib Sur, Dan Avishek, DasBit Sipra:
Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN. ICCSA (3) 2010: 321-335
2000 – 2009
- 2009
- [c1]Halder Subir, Amrita Ghosal, Sanjib Sur, Dan Avishek, DasBit Sipra:
A Lifetime Enhancing Node Deployment Strategy in WSN. FGIT 2009: 295-307
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint