Follow
Angshuman Jana
Angshuman Jana
IIIT Guwahati
Verified email at iiitg.ac.in
Title
Cited by
Cited by
Year
A new approach of text Steganography based on mathematical model of number system
KK Mandal, A Jana, V Agarwal
2014 International Conference on Circuits, Power and Computing Technologies …, 2014
232014
Extending abstract interpretation to dependency analysis of database applications
A Jana, R Halder, KV Abhishekh, SD Ganni, A Cortesi
IEEE Transactions on Software Engineering 46 (5), 463-494, 2018
192018
On preventing SQL injection attacks
BK Ahuja, A Jana, A Swarnkar, R Halder
Advanced Computing and Systems for Security: Volume 1, 49-64, 2016
182016
Input-based analysis approach to prevent SQL injection attacks
A Jana, P Bordoloi, D Maity
2020 IEEE Region 10 Symposium (TENSYMP), 1290-1293, 2020
112020
Data leakage analysis of the hibernate query language on a propositional formulae domain
R Halder, A Jana, A Cortesi
Transactions on Large-Scale Data-and Knowledge-Centered Systems XXIII …, 2016
112016
A Symbolic Model Checker for Database Programs
A Jana, MI Alam, R Halder
International Conference on Software Technologies (ICSOFT), 381-388, 2018
92018
Policy-based slicing of hibernate query language
A Jana, R Halder, N Chaki, A Cortesi
Computer Information Systems and Industrial Management: 14th IFIP TC 8 …, 2015
92015
Code-based analysis approach to detect and prevent SQL injection attacks
A Jana, D Maity
2020 11th International Conference on Computing, Communication and …, 2020
72020
Defining abstract semantics for static dependence analysis of relational database applications
A Jana, R Halder
Information Systems Security: 12th International Conference, ICISS 2016 …, 2016
72016
A survey of Indian Cyber crime and law and its pre-vention approach
A Jana, KK Mandal
International Journal of Advanced Computer Technology (IJACT) 2 (1), 48-55, 2012
32012
A static analysis approach to detect confidentiality leakage of database query languages
A Jana
International Conference on Intelligent Systems Design and Applications, 794-804, 2020
22020
Data-centric Refinement of Database-Database Dependency Analysis of Database Program.
A Jana
ICSOFT, 234-241, 2020
22020
Verification of hibernate query language by abstract interpretation
A Jana, R Halder, A Cortesi
Intelligence Science and Big Data Engineering. Big Data and Machine Learning …, 2015
22015
Policy-Based Code Slicing of Database Application Using Semantic Rule-Based Approach
A Kashyap, A Jana
International Conference on Innovations in Bio-Inspired Computing and …, 2022
12022
Confidentiality leakage analysis of database-driven applications
A Jana, A Kashyap
Advances in Computing and Data Sciences: 5th International Conference …, 2021
12021
A Network Model to Study the Underlying Characteristics of Phishing Sites
A Gayen, S Santra, A Dey, A Jana
IEEE Networking Letters, 2023
2023
Secured Peer-to-Peer Energy Trading and Demand Response in Transactive Energy Systems
S Panda, N Chakraborty, A Jana
2023 OITS International Conference on Information Technology (OCIT), 793-798, 2023
2023
Identification of ‘Early Career Stage’Researchers from large scale Bibliographic dataset
A Gayen, T Mukherjea, S Mukherjee, A Jana
2023 14th International Conference on Computing Communication and Networking …, 2023
2023
Characterization of ‘Early Career Stage’Researchers from their Co-authorship Network
A Gayen, T Mukherjea, A Jana
2023 IEEE Guwahati Subsection Conference (GCON), 1-6, 2023
2023
Extending Semantic based Techniques for Policy-based Slicing of Database Program.
A Kashyap, A Jana
International Journal of Computer Information Systems & Industrial …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20