Follow
Hemanta Kumar Kalita
Hemanta Kumar Kalita
Professor of Computer Science & Engineering, Central Institute of Technology Kokrajhar
Verified email at cit.ac.in
Title
Cited by
Cited by
Year
Wireless Sensor Network Security Analysis
HK Kalita, A Kar
IJNGN 1 (1), 1-10, 2009
1632009
Designing WANem: A Wide Area Network Emulator Tool
HK Kalita, MK Nambiar
COMSNETS 2011, Print ISBN: 978-1-4244-8952-7, E-ISBN : 978-1-4244-8951-0, 1-4, 2011
772011
Analysis of Machine Learning Techniques Based Intrusion Detection Systems
R Sharma, HK Kalita, P Borah
ICACNI-2015, 3rd International Conference on Advanced Computing, Networking …, 2015
462015
Different firewall techniques: A survey
RK Sharma, HK Kalita, B Issac
ICCCNT 2014, Print ISBN: 978-1-4799-2695-4, 1-6, 2014
382014
A Survey on Post-Quantum Cryptography for Constrained Devices
KS Roy, HK Kalita
International Journal of Applied Engineering Research 14 (11), 2608-2615, 2019
322019
Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants
RK Sharma, B Issac, HK Kalita
IEEE Access 7, 52427-52439, 2019
212019
A new algorithm for Ordering of Points To Identify Clustering Structure Based On Perimeter of Triangle: OPTICS(BOPT)
HK Kalita, DK Bhattacharyya, A Kar
ADCOM 2007, Print ISBN: 0-7695-3059-1, 523-528, 2007
182007
Social Media Forensics-A Holistic Review
B Basumatary, HK Kalita
2022 9th International Conference on Computing for Sustainable Global …, 2022
152022
A Survey on Authentication Schemes in IoT
KS Roy, HK Kalita
2017 International Conference on Information Technology (ICIT), 202-207, 2017
152017
Sentiment Analysis for Web-based Big Data: A Survey
S Das, HK Kalita
International Journal of Advanced Research in Computer Science 8 (5), 2017
152017
The threat of obfuscated zero day polymorphic malwares: An analysis
B Wanswett, HK Kalita
2015 International Conference on Computational Intelligence and …, 2015
152015
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
KS Roy, S Deb, HK Kalita
Digital Communications and Networks, 2022
142022
An intrusion detection method using artificial immune system approach
J Lyngdoh, MI Hussain, S Majaw, HK Kalita
Advanced Informatics for Computing Research: Second International Conference …, 2019
132019
Are machine learning based intrusion detection system always secure? An insight into tampered learning
RK Sharma, H Kalita, B Issac
Journal of Intelligent and Fuzzy Systems ISSN 1064-124 35 (3), 3635-3651, 2018
112018
Key Management in Secure Self Organized Wireless Sensor Network: A New Approach
HK Kalita, A Kar
ICWET 2011, ISBN: 978-1-4503-0449-8, 865-870, 2011
102011
A New Algorithm of Self Organization in Wireless Sensor Network
HK Kalita, A Kar
WSN 2 (1), 43-47, 2010
102010
A Quantum Safe User Authentication Protocol for the Internet of Things
KS Roy, HK Kalita
International Journal of Next-Generation Computing, 178-192, 2019
92019
WANem-the wide area network emulator
M Nambiar, HK Kalita, D Mishra, S Rane
92009
Semantic Model for Web-Based Big Data Using Ontology and Fuzzy Rule Mining
S Das, HK Kalita
Proceedings of First International Conference on Information and …, 2016
72016
Popularity Analysis on Social Network: A Big Data Analysis
S Das, BV Syiem, HK Kalita
IJCA Proceedings on International Conference on Computing, Communication and …, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20