Sudip Saha
Sudip Saha
Facebook Inc.
Verified email at - Homepage
Cited by
Cited by
Approximation algorithms for reducing the spectral radius to control epidemic spread
S Saha, A Adiga, BA Prakash, AKS Vullikanti
Proceedings of the 2015 SIAM International Conference on Data Mining, 568-576, 2015
DNS for massive-scale command and control
K Xu, P Butler, S Saha, D Yao
IEEE Transactions on Dependable and Secure Computing 10 (3), 143-153, 2013
A study on knowledge and practice of mothers regarding infant feeding and nutritional status of under-five children attending immunization clinic of a medical college
S Chatterjee, S Saha
Internet J Nutr Wellness 5 (1), 2008
Near-Optimal Algorithms for Controlling Propagation at Group Scale on Networks
Y Zhang, A Adiga, S Saha, A Vullikanti, BA Prakash
IEEE Transactions on Knowledge and Data Engineering 28 (12), 3339--3352, 2016
Planning and response in the aftermath of a large crisis: An agent-based informatics framework
C Barrett, K Bisset, S Chandan, J Chen, Y Chungbaek, S Eubank, ...
2013 Winter Simulations Conference (WSC), 1515-1526, 2013
Human initiated cascading failures in societal infrastructures
C Barrett, K Channakeshava, F Huang, J Kim, A Marathe, MV Marathe, ...
PloS one 7 (10), e45406, 2012
A biologically inspired password authentication system
D Dasgupta, S Saha
Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009
Modeling the interaction between emergency communications and behavior in the aftermath of a disaster
S Chandan, S Saha, C Barrett, S Eubank, A Marathe, M Marathe, ...
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013
Equilibria in epidemic containment games
S Saha, A Adiga, A Vullikanti
Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014
Integrated multi-network modeling environment for spectrum management
R Beckman, K Channakeshava, F Huang, J Kim, A Marathe, M Marathe, ...
IEEE Journal on Selected Areas in Communications 31 (6), 1158-1168, 2013
Modeling cellular network traffic with mobile call graph constraints
J Kim, VSA Kumar, A Marathe, G Pei, S Saha, BSP Subbiah
Proceedings of the 2011 Winter Simulation Conference (WSC), 3165-3177, 2011
Password security through negative filtering
D Dasgupta, S Saha
2010 international conference on emerging security technologies, 83-89, 2010
Quantifying mixed uncertainties in cyber attacker payoffs
R Chatterjee, Samrat, Halappanavar, Mahantesh, Tipireddy, M Oster, ...
2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
Identifying vulnerabilities and hardening attack graphs for networked systems
S Saha, AKS Vullikanti, S Halappanavar, Mahantesh, Chatterjee
2016 IEEE Symposium on Technologies for Homeland Security (HST), 2016
Discrimination of basmati and non-basmati rice types using polarimetric target decomposition of temporal SAR data
V Kumar, M Kumari, SK Saha
Current Science, 2166-2169, 2016
Biotechnology to Combat COVID-19
SK Chatterjee, S Saha
Intech Open, 2021
Analysis of policy instruments for enhanced competition in spectrum auction
J Kim, A Marathe, G Pei, S Saha, BSP Subbiah, AKS Vullikanti
2012 IEEE International Symposium on Dynamic Spectrum Access Networks, 89-96, 2012
FlipNet: Modeling Covert and Persistent Attacks on Networked Resources
S Saha, A Vullikanti, M Halappanavar
International Conference on Distributed Computing Systems (ICDCS), 2017
Synthetic gene design with a large number of hidden stops
V Phan, S Saha, A Pandey, TY Wong
International journal of data mining and bioinformatics 4 (4), 377-394, 2010
Synthetic gene design with a large number of hidden stop codons
V Phan, S Saha, A Pandey, W Tit-Yee
2008 IEEE International Conference on Bioinformatics and Biomedicine, 141-146, 2008
The system can't perform the operation now. Try again later.
Articles 1–20