Follow
Sayonnha Mandal
Title
Cited by
Cited by
Year
Implementation of secure quantum protocol using multiple photons for communication
S Mandal, G Macdonald, ME Rifai, N Punekar, F Zamani, Y Chen, S Kak, ...
arXiv preprint arXiv:1208.6198, 2012
232012
Multi-photon implementation of three-stage quantum cryptography protocol
S Mandal, G Macdonald, M El Rifai, N Punekar, F Zamani, Y Chen, S Kak, ...
The International Conference on Information Networking 2013 (ICOIN), 6-11, 2013
202013
A Framework for Modular Norm Extraction, Modeling and Reasoning
S Mandal
University of Nebraska at Omaha, 2017
192017
Implementing Diffie-Hellman key exchange using quantum EPR pairs
S Mandal, A Parakh
Quantum Information and Computation XIII 9500, 23-29, 2015
82015
Modular norm models: A lightweight approach for modeling and reasoning about legal compliance
S Mandal, R Gandhi, H Siy
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017
72017
Gauging the impact of FISMA on software security
RA Gandhi, K Crosby, H Siy, S Mandal
Computer 47 (09), 103-107, 2014
62014
Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security
S Mandal, R Gandhi, H Siy
2015 IEEE Eighth International Workshop on Requirements Engineering and Law …, 2015
52015
Implementation of the three-stage protocol over free space optics
S Mandal
University of Oklahoma, 2012
52012
Hybrid Learning Framework for Cybersecurity Courses
S Mandal, B George
Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021
22021
Modular norm models: practical representation and analysis of contractual rights and obligations
S Mandal, R Gandhi, H Siy
Requirements Engineering 25, 383-412, 2020
22020
Driving secure software initiatives using FISMA: Issues and Opportunities
R Gandhi, K Crosby, TGR Solutions, LH Siy, S Mandal
CrossTalk 29 (1), 37-41, 2016
22016
Improvements on Hiding x86-64 Instructions by Interleaving
W Mahoney, JT McDonald, G Grispos, S Mandal
International Conference on Cyber Warfare and Security 18 (1), 246-255, 2023
12023
Cybersafe: Gamifying Cybersecurity Training with a Training App
C Roque, G Moodley, S Mandal
International Conference on Cyber Warfare and Security 19 (1), 299-307, 2024
2024
Cybercrime Classification: A Victimology-based approach
S Mandal
International Conference on Cyber Warfare and Security 19 (1), 156-167, 2024
2024
Search and CompAre Reverse (SCAR): A Bioinformatics–Inspired Methodology for Detecting File Remnants in Digital Forensics
G Grispos, W Mahoney, S Mandal
International Conference on Cyber Warfare and Security 18 (1), 119-127, 2023
2023
Modular norm models: practical representation and analysis of contractual rights and obligations (vol 25, pg 383, 2020)
S Mandal, R Gandhi, H Siy
REQUIREMENTS ENGINEERING 25 (3), 413-413, 2020
2020
A Framework for Analyzing Federal Regulations for Information Security
S Mandal
2015
Measures to Abate Evil Twin Attacks in 802.11
S Mandal, N Veldanda
Proceedings of the 7th International Conference on Information Warfare and …, 2012
2012
A Three-stage Phase Encoding Technique for Quantum Key Distribution
F Zamani, S Mandal, PK Verma
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–19