default search action
Sumit Goswami
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j6]Sudip Misra, Sumit Goswami, Chaynika Taneja, Pushpendu Kar:
Heterogeneous polydentate mobile chelating node to detect breach in surveillance sensor network. Secur. Priv. 4(6) (2021) - 2020
- [c9]Sumit Goswami, Veeresh Shetty:
Message from the General Co-Chairs. VLSID 2020: i
2010 – 2019
- 2016
- [j5]Sudip Misra, Sumit Goswami, Chaynika Taneja, Anandarup Mukherjee:
Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks. Int. J. Commun. Syst. 29(13): 1992-2014 (2016) - [j4]Sudip Misra, Sumit Goswami, Chaynika Taneja:
Multivariate Data Fusion-Based Learning of Video Content and Service Distribution for Cyber Physical Social Systems. IEEE Trans. Comput. Soc. Syst. 3(1): 1-12 (2016) - 2015
- [j3]Sudip Misra, Sumit Goswami, Chaynika Taneja, Anandarup Mukherjee, Mohammad S. Obaidat:
A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs. IEEE Access 3: 875-889 (2015) - [c8]Sudip Misra, Sumit Goswami:
Cognitive prediction of end-to-end bandwidth utilisation in a non-QoS video conference. ICC 2015: 6152-6156 - 2014
- [c7]Sumit Goswami, Sudip Misra, Saurabh Jain:
Cognitive correlation of source-destination pair in a video conference network using call attributes. IEEE ANTS 2014: 1-5 - [c6]Sumit Goswami, Sudip Misra, Chaynika Taneja, Anandarup Mukherjee:
Securing intra-communication in 6LoWPAN: A PKI integrated scheme. IEEE ANTS 2014: 1-5 - 2013
- [i1]Sumit Goswami, Mayank Singh Shishodia:
A Fuzzy Based Approach to Text Mining and Document Clustering. CoRR abs/1306.4633 (2013) - 2012
- [c5]Sumit Goswami, Mayank Singh Shishodia:
A fuzzy based approach to stylometric analysis of blogger's age and gender. HIS 2012: 47-51 - 2011
- [j2]Sudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah:
Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 11(2): 146-162 (2011) - 2010
- [j1]Sudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah, Isaac Woungang:
Geographic server distribution model for key revocation. Telecommun. Syst. 44(3-4): 281-295 (2010) - [c4]Sumit Goswami, Susheel Verma, Nabanita R. Krishnan:
Relationship visualization between books and users based on mining library circulation data. IITM 2010: 109-113
2000 – 2009
- 2009
- [c3]Sudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah, Isaac Woungang:
Dividing PKI in strongest availability zones. AICCSA 2009: 963-969 - [c2]Sumit Goswami, Sudeshna Sarkar, Mayur Rustagi:
Stylometric Analysis of Bloggers' Age and Gender. ICWSM 2009 - [c1]Mayur Rustagi, R. Rajendra Prasath, Sumit Goswami, Sudeshna Sarkar:
Learning Age and Gender of Blogger from Stylistic Variation. PReMI 2009: 205-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint