default search action
Biswajit Nandy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c51]Jeffrey Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
Identifying IoT Devices: A Machine Learning Analysis Using Traffic Flow Metadata. NOMS 2024: 1-7 - [d2]Jeffrey Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
DALHOUSIE NIMS LAB IOT 2024 DATASET. IEEE DataPort, 2024 - 2023
- [c50]Marwa A. Elsayed, Patrick Russell, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:
Anomaly Detection for IoT Networks: Empirical Study. CCECE 2023: 432-437 - [c49]Zolboo Erdenebaatar, Riyad Alshammari, Biswajit Nandy, Nabil Seddigh, Marwa Elsayed, Nur Zincir-Heywood:
Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study. ICCCN 2023: 1-10 - [c48]Zolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh:
Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones. NOMS 2023: 1-5 - [c47]Zolboo Erdenebaatar, Biswajit Nandy, Nabil Seddigh, Riyad Alshammari, Marwa Elsayed, Nur Zincir-Heywood:
Instant Messaging Application Encrypted Traffic Generation System. NOMS 2023: 1-3 - [c46]Patrick Russell, Marwa A. Elsayed, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:
On the Fence: Anomaly Detection in IoT Networks. NOMS 2023: 1-4 - [d1]Zolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh:
Encrypted Mobile Instant Messaging Traffic Dataset. IEEE DataPort, 2023 - 2021
- [j6]Ali Safari Khatouni, Nabil Seddigh, Biswajit Nandy, Ayse Nur Zincir-Heywood:
Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors. J. Netw. Syst. Manag. 29(1): 8 (2021) - 2020
- [c45]Anshuman Biswas, Biswajit Nandy, Shikharesh Majumdar, Ali El-Haraki:
Auto-scaling Compute and Network Resources in a Data-center. DASC/PiCom/CBDCom/CyberSciTech 2020: 696-703
2010 – 2019
- 2019
- [c44]Nabil Seddigh, Biswajit Nandy, Don Bennett, Yonglin Ren, Serge Dolgikh, Colin Zeidler, Juhandre Knoetze, Naveen Sai Muthyala:
A Framework & System for Classification of Encrypted Network Traffic using Machine Learning. CNSM 2019: 1-5 - [c43]Alexander Craig, Biswajit Nandy, Ioannis Lambadaris:
Forwarding State Reduction for Multi-Tree Multicast in Software Defined Networks using Bloom Filters. ICC 2019: 1-7 - 2017
- [j5]Alexander Craig, Biswajit Nandy, Ioannis Lambadaris, Polychronis Koutsakis:
Bloomflow: Openflow extensions for memory efficient, scalable multicast with multi-stage bloom filters. Comput. Commun. 110: 83-102 (2017) - [j4]Anshuman Biswas, Shikharesh Majumdar, Biswajit Nandy, Ali El-Haraki:
A hybrid auto-scaling technique for clouds processing applications with service level agreements. J. Cloud Comput. 6: 29 (2017) - [c42]Kevin Wong, Craig Dillabaugh, Nabil Seddigh, Biswajit Nandy:
Enhancing Suricata intrusion detection system for cyber security in SCADA networks. CCECE 2017: 1-5 - 2016
- [c41]Alexander Craig, Biswajit Nandy, Ioannis Lambadaris:
Header length reduction for bloom filter multicast using stochastic overlay networks. ICC 2016: 1-7 - 2015
- [j3]Navdeep Kaur Kapoor, Shikharesh Majumdar, Biswajit Nandy:
Techniques for Allocation of Sensors in Shared Wireless Sensor Networks. J. Networks 10(01): 15-28 (2015) - [c40]Andrew McGregor, Don Bennett, Shikharesh Majumdar, Biswajit Nandy, Jose Orlando Melendez, Marc St-Hilaire, David T. Lau, Jie Liu:
A Cloud-Based Platform for Supporting Research Collaboration. CLOUD 2015: 1107-1110 - [c39]Anshuman Biswas, Shikharesh Majumdar, Biswajit Nandy, Ali El-Haraki:
An Auto-Scaling Framework for Controlling Enterprise Resources on Clouds. CCGRID 2015: 971-980 - [c38]Alexander Craig, Biswajit Nandy, Ioannis Lambadaris, Peter Ashwood-Smith:
Load balancing for multicast traffic in SDN using real-time link cost modification. ICC 2015: 5789-5795 - [c37]Yang Hong, Changcheng Huang, Biswajit Nandy, Nabil Seddigh:
Iterative-tuning support vector machine for network traffic classification. IM 2015: 458-466 - [c36]Athanasios Delimargas, Emmanouil Skevakis, Hassan Halabian, Ioannis Lambadaris, Nabil Seddigh, Biswajit Nandy, Rupinder Makkar:
IPCA for network anomaly detection. MILCOM 2015: 617-622 - [c35]Anshuman Biswas, Shikharesh Majumdar, Biswajit Nandy, Ali El-Haraki:
Predictive Auto-scaling Techniques for Clouds Subjected to Requests with Service Level Agreements. SERVICES 2015: 311-318 - 2014
- [c34]Anshuman Biswas, Shikharesh Majumdar, Biswajit Nandy, Ali El-Haraki:
Automatic Resource Provisioning: A Machine Learning Based Proactive Approach. CloudCom 2014: 168-173 - [c33]M. F. Rabbi Ur Rashid, Chung-Horng Lung, Marc St-Hilaire, Biswajit Nandy, Nabil Seddigh:
Combining SPF and source routing for an efficient probing solution in IPv6 topology discovery. GIIS 2014: 1-6 - [c32]Mourad Soliman, Biswajit Nandy, Ioannis Lambadaris, Peter Ashwood-Smith:
Exploring source routed forwarding in SDN-based WANs. ICC 2014: 3070-3075 - [c31]Duo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy:
Entropy-based robust PCA for communication network anomaly detection. ICCC 2014: 171-175 - [c30]Duo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy:
Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering. TrustCom 2014: 823-830 - 2013
- [c29]Jose Orlando Melendez, Anshuman Biswas, Shikharesh Majumdar, Biswajit Nandy, Marzia Zaman, Pradeep Srivastava, Nishith Goel:
A Framework for Automatic Resource Provisioning for Private Clouds. CCGRID 2013: 610-617 - [c28]Gajen Piraisoody, Changcheng Huang, Biswajit Nandy, Nabil Seddigh:
Classification of applications in HTTP tunnels. CloudNet 2013: 67-74 - [c27]Ahmed Bashir, Changcheng Huang, Biswajit Nandy, Nabil Seddigh:
Classifying P2P activity in Netflow records: A case study on BitTorrent. ICC 2013: 3018-3023 - 2012
- [c26]Mourad Soliman, Biswajit Nandy, Ioannis Lambadaris, Peter Ashwood-Smith:
Source routed forwarding with software defined control, considerations and implications. StudentWorkshop@CoNEXT 2012: 43-44 - [c25]Navdeep Kaur Kapoor, Shikharesh Majumdar, Biswajit Nandy:
System and application knowledge based scheduling of multiple applications in a WSN. ICC 2012: 350-355 - [c24]Navdeep Kaur Kapoor, Shikharesh Majumdar, Biswajit Nandy:
Sensor allocation to multiple applications in shared wireless sensor networks. IPCCC 2012: 197-198 - [c23]Shikharesh Majumdar, Muhammad Asif, Jose Orlando Melendez, Ravishankar Kanagasundaram, David T. Lau, Biswajit Nandy, Marzia Zaman, Pradeep Srivastava, Nishith Goel:
Middleware architecture for sensor-based bridge infrastructure management. SpringSim (CNS) 2012: 8 - 2011
- [c22]Petar Djukic, Biswajit Nandy:
On Threshold Selection for Principal Component Based Network Anomaly Detection. CNSR 2011: 117-122 - [c21]Navdeep Kaur Kapoor, Shikharesh Majumdar, Biswajit Nandy:
Scheduling on Wireless Sensor Networks Hosting Multiple Applications. ICC 2011: 1-6 - 2010
- [j2]Navdeep Kaur Kapoor, Shikharesh Majumdar, Biswajit Nandy:
Class-Based Grid Resource Management Strategies for On-Demand Jobs. Simul. 86(11): 675-697 (2010) - [c20]Norman Lim, Shikharesh Majumdar, Biswajit Nandy:
Providing Interoperability for Resource Access Using Web Services. CNSR 2010: 236-243 - [c19]Nabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont:
Security advances and challenges in 4G wireless networks. PST 2010: 62-71
2000 – 2009
- 2008
- [c18]Ahmed Zainaldin, Ioannis Lambadaris, Biswajit Nandy:
Adaptive Rate Control Low Bit-Rate Video Transmission over Wireless Zigbee Networks. ICC 2008: 52-58 - 2006
- [j1]Vikas Paliwal, Parsa Larijani, Ioannis Lambadaris, Biswajit Nandy:
Congestion due to Rate Variations in cdma2000 Data Networks. Wirel. Pers. Commun. 38(4): 391-412 (2006) - [c17]Nabil Seddigh, Andrew Ross, Peter Pieda, Rupinder Makkar, Biswajit Nandy, Lathif Masood:
Improving Network Infrastructure Security using Geospatial Technology. CCECE 2006: 1601-1604 - [c16]F. El-Hassan, Ashraf Matrawy, Nabil Seddigh, Biswajit Nandy:
Experimental evaluation of network security through a hierarchical quantitative metrics model. Communication, Network, and Information Security 2006: 156-164 - 2005
- [c15]Vikas Paliwal, Biswajit Nandy, Ioannis Lambadaris:
AQuA: aggregated queueing algorithm for CDMA2000 base station controll. GLOBECOM 2005: 2885-2890 - [c14]Vikas Paliwal, Parsa Larijani, Ioannis Lambadaris, Biswajit Nandy:
Effect of channel variation in IP/cdma2000 interconnection performance. ICC 2005: 3242-3248 - [c13]Amir Siddiqi, Biswajit Nandy:
Improving Network Convergence Time and Network Stability of an OSPF-Routed IP Network. NETWORKING 2005: 469-485 - 2004
- [c12]Nabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, Adam Hatfield:
Current Trends and Advances in Information Assurance Metrics. PST 2004: 197-205 - 2002
- [c11]Frank Akujobi, Ioannis Lambadaris, Rupinder Makkar, Nabil Seddigh, Biswajit Nandy:
BECN for congestion control in TCP/IP networks: study and comparative evaluation. GLOBECOM 2002: 2588-2593 - 2001
- [c10]M. Baines, Nabil Seddigh, Biswajit Nandy, Peter Pieda, Michael Devetsikiotis:
Using TCP models to understand bandwidth assurance in a Differentiated Services network. GLOBECOM 2001: 1800-1805 - [c9]Biswajit Nandy, Jeremy Ethridge, Abderrahmane Lakas, Alan Chapman:
Aggregate Flow Control: Improving Assurances for Differentiated Services Network. INFOCOM 2001: 1340-1349 - 2000
- [c8]Rupinder Makkar, Ioannis Lambadaris, Jamal Hadi Salim, Nabil Seddigh, Biswajit Nandy, Jozef Babiarz:
Empirical study of buffer management scheme for Diffserv assured forwarding PHB. ICCCN 2000: 632-637 - [c7]Fulu Li, Nabil Seddigh, Biswajit Nandy, Diego Matute:
An Empirical Study of Today's Internet Traffic for Differentiated Services IP QoS. ISCC 2000: 207-213 - [c6]Biswajit Nandy, Nabil Seddigh, Peter Pieda, Jeremy Ethridge:
Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks. NETWORKING 2000: 540-554 - [i1]Wenjia Fang, Nabil Seddigh, Biswajit Nandy:
A Time Sliding Window Three Colour Marker (TSWTCM). RFC 2859: 1-9 (2000)
1990 – 1999
- 1999
- [c5]Uvais Ahmed, Ioannis Lambadaris, Thomas Kunz, Jamal Hadi Salim, Biswajit Nandy, Nabil Seddigh:
Performance Evaluation of Explicit Congestion Notification (ECN) in IP networks. Multimedia Information Systems 1999: 96-98 - 1998
- [c4]Biswajit Nandy, Nabil Seddigh, A. S. J. Chapman, Jamal Hadi Salim:
A Connectionless Approach to Providing QoS in IP Networks. HPN 1998: 363-379 - 1997
- [c3]Ka Lun Eddie Law, Biswajit Nandy, A. S. J. Chapman:
A Scalable and Distributed WWW Proxy System. ICMCS 1997: 557-564 - [c2]Biswajit Nandy, Ka Lun Eddie Law, A. S. J. Chapman:
High Performance Web Server System: TCP Based Switching Approach. WebNet 1997 - 1993
- [c1]Biswajit Nandy, Wayne M. Loucks:
On a parallel partitioning technique for use with conservative parallel simulation. PADS 1993: 43-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint