Prof. Subhranil Som

@bhairabgangulycollege.ac.in

Principal
Bhairab Ganguly College



                 

https://researchid.co/subhranil.som

Prof. (Dr.) Subhranil Som received his PhD in Computer Science and Engineering. He is currently Principal of Bhairab Ganguly College, Kolkata, West Bengal, India and with additional charge as the Officer on Special Duty (OSD) in IT and Technology Innovation Cell, Higher Education Department, Government of West Bengal. His fields of interest include Cryptography, Network Security, Information Security, e-Health, Robotics, IoT, Core Java, other programming languages etc.

Five PhD awarded under his supervision. He has filed sixteen Patents out of which One South African paten, Two German patents and One UK Design Patent granted and 12 Published in Official Journal of the Patent Office, India. He has published more than 110 research papers in reputed International, National journals and conferences and author of 4 books. He was attached with a WHO’s International Research Project on “e-Health for Health Care Delivery”, University of New South Wales, Sydney, Australia. He has visited to

EDUCATION

PhD in Computer Science & Engineering

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Software, Computer Networks and Communications, Information Systems

70

Scopus Publications

1097

Scholar Citations

15

Scholar h-index

26

Scholar i10-index

Scopus Publications

  • Deployment methodology of deception technology for effective defense
    Jalaj Pateria, Laxmi Ahuja, and Subhranil Som

    AIP Publishing

  • Critical Path to Place Decoys in Deception Biota
    Jalaj Pateria, Laxmi Ahuja and S. Som

    Totem Publisher, Inc.
    With the rapid growth of cloud or on-premises storage, widespread networking and other physical devices, complex IT infrastructure and processes for creating, processing, and storing all forms of electronic data, securing data that too in the initial compromise phase is critical, so it doesn't translate back into a cyber-attack. During the covid pandemic where the whole world was working from open networks, data breaches and cyber security issues have gone to their peak. Intruders are moving laterally compromising data intelligently following various techniques like delaying the attack cycle where the intruder enters the network, gathers information, and stays away for a couple of days so that their previous interaction goes faded. This article describes the collaborative pattern analysis and event chaining of the compromised data during the reconnaissance phase of the attack chain and enables deception technology by enhancing predictability and planning to place decoys in the network dynamically. Deception technology can understand instantaneous data and provide verdicts based on real-time interactions. If any suspicious behaviour encountered by the decoys for that instance is co-related well with the attack matrix an alarm is being raised where decoys generate lures which create a false information stream that leads attackers exposed while protecting real enterprise network and assets. However, the current setup is not enabled to a level where it can track attackers who are working from multiple endpoints at the same time or using the gained data from the scans to access in the future. We are proposing a new and efficient Event chaining-based solution (named as DT-Chains) that overcomes the limitations in earlier proposed solutions. As part of this framework, we propose to design and develop a solution that will do an analysis on reconnaissance Attack Data. This newly proposed solution is expected to enable existing deception Technology to reduce false positives and helps to track attackers which are working from multiple endpoints at the same time or using the gained data from the scans to access in the future. This will also help in predicting the attack critical path which enables automated deception triggers for decoys.

  • Study on Online Education System and Comparative Analysis with Traditional Learning
    Chesta Malkani, Nitin Pandey, and Subhranil Som

    IEEE
    Rapid changes in technological development in the last few decades and the latest pandemic situation brought a new era of academic structure, that engaged the aspect of learning and individual’s need through communication device is called online education. This structure has influenced a lot of educational, psychological, and social behavior in children. However, today the education requires alternate approaches of learning to which anyone gets access from anywhere which is called e-learning. In this paper, we underlined the adverse factor and analyze recent data regarding e-learning and digital screen and a long-term tendency of increasing mental health among children. It is now very necessary to notify that the existence of psychological and physical problems in children growing up due to online education, which they are not even aware of, must be emphasized earlier to prevent its consequences.

  • Anti-social behaviour analysis using random forest and word to vector approach
    Nidhi Chandra, Sunil Kumar Khatri, and Subhranil Som

    Inderscience Publishers

  • Improvised Secure Transmission Technique accessory on Artificial Intelligence
    Kishore Kumar, Sarvesh Tanwar, Subhranil Som, and Shishir Kumar

    IEEE
    Today, the growth in the number of people using online services using various communication tools has caused most governments, personal and business organizations to adjust the way they conduct business and handle their knowledge about their identity. Internet users, however, are vulnerable to identity theft, which is growing and costing enormous amounts to the global industry. Therefore for applications, they need to use the highly protected credential concept. And from now on, most application developers are using the simple user id and password framework to protect the same, and they have skipped considering the enhanced artificial framework and implementing the cryptographic strategies to protect further. In this paper, Artificial intelligence approaches and cryptographic concepts are widely used to mitigate these threats and as a means of managing digital identity information on existing unsecured networks to protect users and service providers' in a simple, reliable, and effective manner. Cryptographic principles will be applied to both user-id and password for optimum user identification. Additionally, the user id is available to all users, but the password is inaccessible. The effect of this technique is a new authentication method for committing legitimate and secure online access to the applications with the complexity of time and space, along with a highly protective design, being easily feasible whereas, older systems comparatively implement user authentication using passwords or Keys. For example, one has to provide a password to check that they can use that password to impersonate it.

  • A Review: IoT Based Smart Grid
    Divya Singhal, Subhranil Som, and Laxmi Ahuja

    IEEE
    Smart Grid components based on IoT increase ICT significantly. With the increased digitalization and usage of the internet, the ability to generate massive amounts of data has become possible. However, the aforementioned improvement also poses a significant privacy and security risk to smart grid clients. Their billing information, as well as their daily power use, may be readily hacked and released. This study examines the challenges that smart grid components, notably smart meters face, as well as how India continues to struggle to integrate technology into smart grid infrastructure. The study also focuses on the technologies and methods that may be utilised to protect the system against cyber-attacks.

  • Blockchain as an Instrument for Land Ownership and Authorization of Services
    Prabhat Manocha, Subhranil Som, and Kanjam Manocha

    IEEE
    Land disputes in India take on an average about 20 years to be resolved. To make matters worse, land-related disputes account for nearly two-thirds of all pending court cases in India. Disputes related to land ownership affect agriculture as land is used as collateral for obtaining loans by farmers. Such issues also affect development of new infrastructure due to nonavailability of encumbrance free land, demands for higher compensation by landowners, and filing of large number of arbitration cases by landowners. Land related disputes impact urbanisation too given the acute shortage for housing in the country. Last, but not the least generation of black money through benami transactions could be pre-empted and eliminated by digitisation of land records and their regular upgradation. While the problem is humongous, digitization is, perhaps, only the first step in the right direction. The solution needs to ensure that all existing land records are accurate and free of any encumbrances. It also needs to be more all-encompassing to address issues around land ownership, so far has not addressed. Blockchain due to its characteristics of trust and immutable ledger could be the potential solution to address this problem. The paper explains how Blockchain can help improve transparency, trust and efficiency of land ownership data.

  • Model for Analyzing Psychological Parameters Recommending Student Learning Behaviour using Machine Learning
    Iti Burman, Subhranil Som, and Syed Akhter Hossain

    Deanship of Scientific Research

  • Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices
    Seema Nath, Subhranil Som, and Mukesh Chandra Negi

    IOS Press
    The internet of things (IoT) is a multiple devices, which connects with the internet for communication, in order to obtain the updated from the cloud. The fog can act as a controller and it is located between the IoT devices and cloud. The major attacks like de-synchronization, and disclosure has arises in the devices, this has been prevented. The major contribution in this work is key generation and authentication, for key generation the “advanced encryption standard algorithm” is developed, in which the new and old keys are generated. The encryption is done under the source side, and decryption is done under the device side. The fog security is maintained through “device tag, and bit wise XOR rotational algorithm”. The security, and the computational complexity is defined in this work and it is given in table format. The implementations are carried out in the MATLAB R2016 a. The proposed algorithm is compared with the existing protocols like LMAP, M2AP, EMAP, SASI, and RAPP, from the comparison the proposed methodology makes the better knowledge about the security and prevents from various attacks.

  • Reliability-based dynamic multicast group formation provisioning local adjustment ensuring quality of service globally in MANETs
    Shobha Tyagi, Subhranil Som, and S. K. Khatri

    Informa UK Limited
    Mobile Ad hoc Networks (MANETs) is an infrastructure less and random mobility-based class of wireless networks with seamless possibilities of ‘on the fly’ communication through self-coordination among autonomous mobile nodes while being in the transmission range of each other. This low cost, easy to deploy, simplicity, and self-organisation of MANET altogether revolutionised wired networks and could connect otherwise unreachable terrains/sites. To handle the severity of colossal issues like dynamic topology, scarce resources and frequent rupturing of established routes in MANETs, conservation of energy becomes inevitable to administer contemporary applications. After an extensive literature survey for provisioning reliability and multicast routing in MANETs, researchers concluded the conservation of mobile nodes energy embrace a very consequential role in extending network life. The PLA (Proposed Local Adjustment) model is based on eliminating flooding, preserving nodes battery life by selectively choosing forwarder node at each hop level, and handling route failures locally, eventually makes the network more robust and resilient. The PLA model when simulated on NS2.35 against AODV on various parameters like control overhead generated, packet delivery ratio, energy conserved index, produced quite convincing and promising results, to be offered to remote and rescue-based applications in the vicinity of infrastructure less regions.

  • Student performance measurement on psychometric parameters
    Iti Burman, Subhranil Som, Syed Akhter Hossain, and Mayank Sharma

    IGI Global
    Educational data mining provides various advantages to the education systems in many ways. It enhances the teaching process, the learning process, the scholastic performance of students, career selection, employability, and more. The differences in attitude of students' behavior lead to difference in their academic performance. The article covers the non-intellectual parameters of students to enhance their academic performance. The study tests the relationship between psychometric constructs of students and their academic correlate. The models for enhancing intellectual performance which involves various non-intellectual parameters are analyzed using structural equation modeling. It is observed that the values of the models were retrieved near to fit values. The results entail that the models will be beneficial for students in improving their academic performance by revising their psychological parameters.

  • IoT Based Theft Detection Using Raspberry Pi
    Saurabh Singh Rajawat, Subhranil Som, and Ajay Rana

    IEEE
    In the present day, Security and Safety are the major concern for the personage. We use C-Mount monitors in order to monitor and identify, but the C-mount has too much ability to record and needs staff to monitor the unlawful movement. Mobile device like Smart phones and I pad are used to perform daily tasks that are handle by commercial computers and laptop. Be overcome, we have found RP-3 model using IOT RP-3 model is much lowered compared to existing system with more appropriate settlement and less power use characteristics an “Internet Of Thing based Theft Detection using Raspberry Pi” Project where we had to use live video photo processing to espy stealer using motion as well as focus the area where motion reoccurred. In this model, we use a RP-camera together RP-3 model together with a route with Virtual show infrared for night and Thumb drive for Data Storage. The model uses imaging to espy and emphasize the exact filed of movement in the camera when camera movement is espying. The model now transmits photo of the event via Internet of Thing, which the End user can view online. It also stores the footage for additional reference in a Thumb drive. The End user can now convert online memory transmitted via Internet of Thing, the Internet of Thing model to view photo of the movements via the internet live. The model thus offers an extra powerful approach to Internet of Thing larceny espy.

  • Message
    IEEE

  • IoT Based Educational Model for Better Teaching-Learning Environment
    Shaurya, Subhranil Som, and Ajay Rana

    IEEE
    Internet of Things is a technology that has been growing every second and has an impact on various sectors. Internet of Things helps to connect physical objects with each other with the use of internet. In the education sector, internet of things can be used to bridge the gap between the teacher and the student. From lectures and memorization to internet-enabled learning to knowledge-producing education to innovative education, educational sector has been developing continuously. Educational sector has reached its fourth revolution, also known as education 4.0. In relation to education sector, some of the latest technologies advancements are interactive whiteboard,3d printers, eBooks, tablets, augmented reality, attendance tracking system, virtual reality, cloud computing, hologram, biometrics, paper-thin smartphones, multi-touch LCD screen etc. Many students face problems with the traditional way of teaching, such as slow speed of learning and not able to attend school due to family problems. This paper addresses the previous works done in the field of education using Internet of Things to help overcome these problems and proposes an IoT Based Educational Model for Better Teaching-Learning Environment. This model suggests that there should neither be complete digitalization nor complete verbal assistance.

  • Attainment of Better Security in IoT Based Live Monitoring Using Hybrid Atom Search optimization Employed ECC
    Seema Nath, Subhranil Som, and Mukesh Negi

    IEEE
    In today’s world due to advancement in computer related technology lot of innovation were emerging in the field of communication and data transmission. This pays the way for the development of the concept IoT. In the proposed work a live monitoring system is developed based on IoT. Security risk is the major issues in the IoT related systems. So, for achieving improved security in IoT enabled system the proposed work is designed. ECC is widely used technique in IoT for secure transmission of data. In spite of it there is possibility of occurring some security error as well as this technique is tricky and complex to implement effectively. For solving this issue, an ASO based ECC is developed for security enhancement. This ASO helps in improving the efficiency of ECC and assist in selecting the best key to perform the process of encryption and decryption. Because the key generation is optimal for achieving better security. Based on the simulation results obtained through implementation the performance of the proposed system is analysed. The statistical measurements like encryption time, entropy and PSNR were evaluated and a contrast is made with the existing method. The encryption time for the proposed method is 2.7384 sec, it is very less when compared to the other existing method.

  • Cryptography Encryption Technique Using Circular Bit Rotation in Binary Field
    Deepraj Pradhan, Subhranil Som, and Ajay Rana

    IEEE
    In the digital age when technology has advanced so much that communication between people is just a text away no matter where they are geographical. But with every advancement, the technology must be secure enough so that no eavesdropping can take place. That’s where cryptography comes into play, Cryptography is necessary when communicating over any untrusted medium. Cryptography is an important field in information security, and, in this modern age, cryptography is used everywhere from surfing the internet to phone calls. The requirement for a better cryptosystem keeps increasing as the advancement of modern computers outpaces the old cryptosystems. In cryptography, the plain text is the original text and ciphertext is the encrypted text. So, the proposed technique in this paper encrypts plain text into ciphertext that is unrecognizable that makes the ciphertext unidentifiable when compared to plain text. First, we generate a very large random number that is at least 1024 bits which will be the key. Encrypting the plaintext is based on the key, first the plain text is divided into blocks of 9 bytes then the key divided into array of ‘n/2’ number of pairs, the first digit of pair being position in the block and second digit being the number of bits to shift right, the shift is circular from the position of the selected character. In the decryption the left shift is performed to the blocks, the start of decryption begins from the end of the array of key pairs.

  • Predictive Analysis of Machine Learning Algorithms for Breast Cancer Diagnosis
    Mudit Arora, Subhranil Som, and Ajay Rana

    IEEE
    Cancer is one of the fastest growing disease around the world and subpart of it Breast Cancer that is growing rapidly and mostly affecting women. Early treatment of this disease is helpful and can act as an early prevention to the upcoming major cure. However this can only be possible only if women are able to know that they are suffering with such disease and this can be only diagnosed if they come up with it and openly sharing with family and Doctors about the disease. This can lead to be a bit challenging task as to detect this disease among women using mammography as patient communication can affect mammography performance. This disease has had many ideas and myths as to how we can diagnosed it but Machine Learning the subset of Artificial Intelligence that can help Doctors and Surgeons to learn from past experiments. To treat upcoming patients with similar anomalies has had the major help of saving many patients with its set of algorithms and set of applications it provides. This paper will be focusing on five of the popular supervised Machine Learning algorithms for Diagnosing Breast Cancer this will be K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB) and Decision Tree (DT) and the algorithm Random Forest gave the best results and the K Nearest Neighbor was the second best performing algorithm that produce desired results and the algorithm Naïve Bayes was the least performing algorithm

  • Technological Trends, Impact, and Analysis of Quality Service Parameters on e-Governance Applications
    Prabhat Manocha, Subhranil Som, and Lovneesh Chanana

    IEEE
    Computerized India can bring significant change the way we connect with and convey administrations. It focuses around broadcast communications, cyber security, producing web based businesses, and the sharing economy in monetary, vitality, and social insurance portions. It empowers advancement, speculation, monetary development, assembling, and employment creation. This by implication enhances effectiveness, profitability, and prosperity of India’s citizenry – a potential lift to total national output (GDP) and financial advantages.The recognizable proof of administration variables of quality would assist in correctly organizes the citizen’s beneficiary system. This paper exhibits the discoveries of an analytic investigation utilizing an online overview on Indian e-government quality variables and its implementations via social media in India.The investigation means to recognize and organize the administration quality variables in view of comparative parameters distinguished by specialists for e-government quality and can be used further to construct a structure through social media delivery platform.

  • Relational delivery model and impact for leveraging blockchain to deliver e-governance services via social media



  • Sponge function based authentication encryption technique (SAFE) using robust initialization vector and ChaCha stream cipher


  • LCA approach for Image Encryption Based on Chaos to Secure Multimedia Data in IoT
    Seema Nath, Subhranil Som, and Mukesh Negi

    IEEE
    Recently, improvement of the internet usages, huge amount of multimedia data is transmitted through the network. The encryption method is introduced to secure the multimedia data for improve individual privacy, copyrights and other security reasons. In this paper proposed the LCA algorithm for chaotic logistic map based image encryption. Trendy this map of logistic parameter tuning is attained with the help of the LCA algorithm. The LCA algorithm is working based on the competition of sports teams in a league match. Various people as game groups contend in a league match for a few weeks; founded on the LCA process, logistic maps are tuned. The proposed algorithm for encryption is process constructed scheduled the two tasks such as confusion in addition diffusion. In confusion, produce the cipher image from the plain image by conversion. Second, the diffusion procedure is developed to diffuse the sequences equally. Here, the logistic maps parameters are taken as the encryption key. To prove the secure and reliable of the technique of proposed which is executed in the MATLAB and simulation results and performance analysis are described popular in paper. The presentation of proposed technique be there analysis through the way, statistical test and security test which is competitive with other freshly developed image encryption algorithm. To prove the efficiency of the proposed method which paralleled with the existing methods such as Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) respectively.

  • Mining to Discover Association of Psychological Factors with Student Academic Performance
    Iti Burman, Subhranil Som, Syed Akhter Hossain, and Mayank Sharma

    IEEE
    Predicting the student behavior is important as it leads to the scope of improvement in their academic achievement. Association refers to a process of identifying the frequent item sets or patterns from the given dataset in order to provide recommendations about the instances of specific item based on the identified patterns. This paper focuses on association rule mining technique to elicit pragmatic information from the primary data collected. The work carried here explores the relationship between student's intellectual performance and their psychological factors with the use of Apriori algorithm. It aims at predicting and improving academic performance of students by reshaping their psychological parameters.

  • IOT Aided Techniques for Agriculture
    Abhinav Malhotra, Subhranil Som, and Sunil Kumar Khatri

    IEEE
    The generation of IoT has brought a major and a positive impact on almost all areas including that of agriculture. With the help of IoT, we can now automate the irrigation process, shift to wireless form of communication from wired, and overcome the constraints which were previously considered expensive and difficult to maintain. The advent of IoT along with Wireless Sensor Networks (WSNs) has had a major impact on agriculture sector. Low-cost sensors are now starting to be used which helps in collection of large amounts of data. Data, which, in every way is beneficial for the agriculture business. It can help in measuring and maintaining the quality and the quantity of the crops and soil. For a long time, the effects of air pollution on crops have been ignored while others like pests and diseases are being treated. Pollution leads to reduction in crop growth and yield while also damaging and reducing their nutritional values. In this paper, we will be focusing on improving the practices for agriculture in India by increasing the crop yield and quality while keeping the cost to a minimum.

  • Future of Wearable Devices Using IoT Synergy in AI
    Vasu Sharma, Vineeta, Subhranil Som, and Sunil Kumar Khatri

    IEEE
    AI and IoT are the two terms which are predicted to be the future of technology; however they are being emerged in their new forms day by day. Various sensors are placed in the devices, which are then made light and wearable for humans, these devices keep a track of various aspects of human life.Wearables have given a new face to the healthcare of humans.The proposed research has been done over the wearable devices concerning health since they track steps, provide GPS facilities, find out calories burnt etc. but the breach which should be worked upon to make them much more useful is to set a system which not only calculates the amount of burnt calories burnt but also gives the ways to set yourself at your best health by providing you the guidance of your food intake to regulate the amount of the needful components of your health.

RECENT SCHOLAR PUBLICATIONS

  • Deployment methodology of deception technology for effective defense
    J Pateria, L Ahuja, S Som
    AIP Conference Proceedings 2782 (1) 2023

  • Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs
    J Pateria, L Ahuja, S Som, A Seth
    Int. J. Inf. Technol. Comput. Sci 15, 35-44 2023

  • Critical path to place decoys in Deception biota
    J Pateria, L Ahuja, S Som
    International Journal of Performability Engineering 18 (12), 854 2022

  • Seeded Transfer Learning for Enhanced Attack Trace and Effective Deception.
    J Pateria, L Ahuja, S Som
    Journal of Cybersecurity (2579-0072) 4 (4) 2022

  • Study on Online Education System and Comparative Analysis with Traditional Learning
    C Malkani, N Pandey, S Som
    2022 Fifth International Conference on Computational Intelligence and 2022

  • Anti-social behaviour analysis using random forest and word to vector approach
    N Chandra, SK Khatri, S Som
    International Journal of Applied Management Science 14 (1), 38-56 2022

  • Improvised Secure Transmission Technique accessory on Artificial Intelligence
    K Kumar, S Tanwar, S Som, S Kumar
    2021 5th International Conference on Information Systems and Computer 2021

  • A review: IoT based smart grid
    D Singhal, S Som, L Ahuja
    2021 9th International Conference on Reliability, Infocom Technologies and 2021

  • Blockchain as an instrument for land ownership and authorization of services
    P Manocha, S Som, K Manocha
    2021 9th International Conference on Reliability, Infocom Technologies and 2021

  • Reliability-based dynamic multicast group formation provisioning local adjustment ensuring quality of service globally in MANETs
    S Tyagi, S Som, SK Khatri
    International Journal of Parallel, Emergent and Distributed Systems 36 (2 2021

  • An IoT-Based Cryptographic Algorithm: Mapping the Credentials for Micro-application in Single Column
    K Kumar, S Som, S Tanwar, S Kumar
    Emerging Technologies in Data Mining and Information Security: Proceedings 2021

  • Cryptanalysis of A Novel Bitwise XOR Rotational Algorithm and Security for IOT Devices
    MCN Seema Nath, Subhranil Som
    International Journal of Knowledge-Based and Intelligent Engineering Systems 2021

  • Student Performance Measurement on Psychometric Parameters
    I Burman, S Som, SA Hossain, M Sharma
    International Journal of Information and Communication Technology Education 2020

  • Trichoblastic Carcinoma of the Scalp: a Case Report on a Rare Condition
    J Malakar, D Choudhury, S Som, M Sharma
    Indian Journal of Surgery 82 (4), 714-716 2020

  • Large scale image tamper detection and restoration
    D Sarkar, S Palit, S Som, KN Dey
    Multimedia Tools and Applications 79 (25), 17761-17791 2020

  • Model for Analyzing Psychological Parameters Recommending Student Learning Behavior
    I Burman, S Som, SA Hossain
    International Journal of Computing and Digital Systems 10, 2-17 2020

  • Attainment of better security in IoT based live monitoring using hybrid atom search optimization employed ECC
    S Nath, S Som, M Negi
    2020 8th International Conference on Reliability, Infocom Technologies and 2020

  • Iot based theft detection using raspberry pi
    SS Rajawat, S Som, A Rana
    2020 8th International Conference on Reliability, Infocom Technologies and 2020

  • Technological Trends, Impact, and Analysis of Quality Service Parameters on e-Governance Applications
    P Manocha, S Som, L Chanana
    2020 8th International Conference on Reliability, Infocom Technologies and 2020

  • Cryptography encryption technique using circular bit rotation in binary field
    D Pradhan, S Som, A Rana
    2020 8th International Conference on Reliability, Infocom Technologies and 2020

MOST CITED SCHOLAR PUBLICATIONS

  • Smart farming–IoT in agriculture
    R Dagar, S Som, SK Khatri
    2018 International Conference on Inventive Research in Computing 2018
    Citations: 282

  • Study on sql injection attacks: Mode detection and prevention
    S Som, S Sinha, R Kataria
    International journal of engineering applied sciences and technology 1 (8 2016
    Citations: 54

  • A reliability based variant of AODV in MANETs: proposal, analysis and comparison
    S Tyagi, S Som, QP Rana
    Procedia Computer Science 79, 903-911 2016
    Citations: 40

  • Trust based Dynamic Multicast Group Routing ensuring Reliability for Ubiquitous Environment in MANETs
    S Tyagi, S Som, QP Rana
    International Journal of Ambient Computing and Intelligence (IJACI) 8 (1), 70-97 2017
    Citations: 33

  • Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator
    S Som, S Dutta, R Singha, A Kotal, S Palit
    Nonlinear Dynamics 80, 615-627 2015
    Citations: 32

  • Confusion and diffusion of grayscale images using multiple chaotic maps
    S Som, A Kotal
    2012 National Conference on Computing and Communication Systems, 1-5 2012
    Citations: 31

  • Applications and usage of visual cryptography: A review
    A Pandey, S Som
    2016 5th International Conference on Reliability, Infocom Technologies and 2016
    Citations: 30

  • Lysozyme in egg whites of tortoises and turtle: Purification and properties of egg white lysozyme of Trionyx gangeticus cuvier
    SK Gayen, S Som, NK Sinha, A Sen
    Archives of Biochemistry and Biophysics 183 (2), 432-442 1977
    Citations: 28

  • A colour image encryption based on DNA coding and chaotic sequences
    S Som, A Kotal, A Chatterjee, S Dey, S Palit
    2013 1st International Conference on Emerging Trends and Applications in 2013
    Citations: 25

  • Key based bit level genetic cryptographic technique (KBGCT)
    S Som, NS Chatterjee, JK Mandal
    2011 7th International Conference on Information Assurance and Security (IAS 2011
    Citations: 22

  • A chaos based partial image encryption scheme
    S Som, A Kotal, A Mitra, S Palit, BB Chaudhuri
    2014 2Nd international conference on business and information management 2014
    Citations: 21

  • Large scale image tamper detection and restoration
    D Sarkar, S Palit, S Som, KN Dey
    Multimedia Tools and Applications 79 (25), 17761-17791 2020
    Citations: 19

  • Study of different cryptographic technique and challenges in future
    A Bhardwaj, S Som
    2016 International Conference on Innovation and Challenges in Cyber Security 2016
    Citations: 18

  • Anti social comment classification based on kNN algorithm
    N Chandra, SK Khatri, S Som
    2017 6th International Conference on Reliability, Infocom Technologies and 2017
    Citations: 16

  • Cryptographic technique using substitution through circular path followed by genetic function
    S Som, M Banerjee
    International Journal of Computer Applications (IJCA) 2013
    Citations: 16

  • Security and Privacy Challenges: Internet of Things
    S Nath, S Som
    Indian Journal of Science and Technology 10 (3), 1-5 2017
    Citations: 14

  • Statistical analysis of student feedback system using Cronbach's alpha and Utility Measurement Process
    S Som, R Majumdar, M Ghosh, C Malkani
    2017 International Conference on Infocom Technologies and Unmanned Systems 2017
    Citations: 13

  • Cryptography encryption technique using circular bit rotation in binary field
    D Pradhan, S Som, A Rana
    2020 8th International Conference on Reliability, Infocom Technologies and 2020
    Citations: 12

  • Predictive analysis of machine learning algorithms for breast cancer diagnosis
    M Arora, S Som, A Rana
    2020 8th International Conference on Reliability, Infocom Technologies and 2020
    Citations: 12

  • Security solutions for physical layer of IoT
    S Chowdhary, S Som, V Tuli, SK Khatri
    2017 International Conference on Infocom Technologies and Unmanned Systems 2017
    Citations: 12