default search action
Angshuman Jana
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Avijit Gayen, Sukriti Santra, Ayush Dey, Angshuman Jana:
A Network Model to Study the Underlying Characteristics of Phishing Sites. IEEE Netw. Lett. 6(1): 46-49 (2024) - 2023
- [j3]Angshuman Jana:
Sensitive information leakage analysis of database code by abstract interpretation. Int. J. Secur. Networks 18(2): 91-105 (2023) - [c12]Suryakanta Panda, Nilotpal Chakraborty, Angshuman Jana:
Secured Peer-to-Peer Energy Trading and Demand Response in Transactive Energy Systems. OCIT 2023: 793-798 - [c11]Avijit Gayen, Tamoghna Mukherjea, Soumik Mukherjee, Angshuman Jana:
Identification of 'Early Career Stage' Researchers from large scale Bibliographic dataset. ICCCNT 2023: 1-7 - 2022
- [c10]Anwesha Kashyap, Angshuman Jana:
Integrity Constraint Verification of Structured Query Language by Abstract Interpretation. OCIT 2022: 1-6 - 2021
- [c9]Angshuman Jana, Anwesha Kashyap:
Confidentiality Leakage Analysis of Database-Driven Applications. ICACDS (2) 2021: 313-323 - 2020
- [j2]Angshuman Jana, Raju Halder, Kalahasti Venkata Abhishekh, Sanjeevini Devi Ganni, Agostino Cortesi:
Extending Abstract Interpretation to Dependency Analysis of Database Applications. IEEE Trans. Software Eng. 46(5): 463-494 (2020) - [c8]Angshuman Jana, Dipendu Maity:
Code-based Analysis Approach to Detect and Prevent SQL Injection Attacks. ICCCNT 2020: 1-6 - [c7]Angshuman Jana:
Data-centric Refinement of Database-Database Dependency Analysis of Database Program. ICSOFT 2020: 234-241 - [c6]Angshuman Jana:
A Static Analysis Approach to Detect Confidentiality Leakage of Database Query Languages. ISDA 2020: 794-804
2010 – 2019
- 2018
- [c5]Angshuman Jana, Md. Imran Alam, Raju Halder:
A Symbolic Model Checker for Database Programs. ICSOFT 2018: 381-388 - 2016
- [j1]Raju Halder, Angshuman Jana, Agostino Cortesi:
Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae Domain. Trans. Large Scale Data Knowl. Centered Syst. 23: 23-44 (2016) - [c4]Angshuman Jana, Raju Halder:
Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications. ICISS 2016: 151-171 - 2015
- [c3]Bharat Kumar Ahuja, Angshuman Jana, Ankit Swarnkar, Raju Halder:
On Preventing SQL Injection Attacks. ACSS (1) 2015: 49-64 - [c2]Angshuman Jana, Raju Halder, Nabendu Chaki, Agostino Cortesi:
Policy-Based Slicing of Hibernate Query Language. CISIM 2015: 267-281 - [c1]Angshuman Jana, Raju Halder, Agostino Cortesi:
Verification of Hibernate Query Language by Abstract Interpretation. IScIDE (2) 2015: 116-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint