default search action
Sabyasachi Saha
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j6]Enrico Bocchi, Luigi Grimaudo, Marco Mellia, Elena Baralis, Sabyasachi Saha, Stanislav Miskovic, Gaspar Modelo-Howard, Sung-Ju Lee:
MAGMA network behavior classifier for malware traffic. Comput. Networks 109: 142-156 (2016) - 2015
- [j5]Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis, Alok Tongaonkar, Sabyasachi Saha:
YouLighter: A Cognitive Approach to Unveil YouTube CDN and Changes. IEEE Trans. Cogn. Commun. Netw. 1(2): 161-174 (2015) - [c34]Alessandro Finamore, Sabyasachi Saha, Gaspar Modelo-Howard, Sung-Ju Lee, Enrico Bocchi, Luigi Grimaudo, Marco Mellia, Elena Baralis:
Macroscopic view of malware in home networks. CCNC 2015: 262-266 - [c33]Pengkui Luo, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee, Antonio Nucci, Marco Mellia:
Leveraging client-side DNS failure patterns to identify malicious behaviors. CNS 2015: 406-414 - [c32]Enrico Bocchi, Luigi Grimaudo, Marco Mellia, Elena Baralis, Sabyasachi Saha, Stanislav Miskovic, Gaspar Modelo-Howard, Sung-Ju Lee:
Network Connectivity Graph for Malicious Traffic Dissection. ICCCN 2015: 1-9 - [c31]Jialong Zhang, Sabyasachi Saha, Guofei Gu, Sung-Ju Lee, Marco Mellia:
Systematic Mining of Associated Server Herds for Malware Campaign Discovery. ICDCS 2015: 630-641 - [c30]Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis, Alok Tongaonkar, Sabyasachi Saha:
YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes. ITC 2015: 19-27 - [i1]Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis, Alok Tongaonkar, Sabyasachi Saha:
YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes. CoRR abs/1503.05426 (2015) - 2014
- [c29]Lei Liu, Sabyasachi Saha, Ruben Torres, Jianpeng Xu, Pang-Ning Tan, Antonio Nucci, Marco Mellia:
Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information. ASONAM 2014: 150-157 - [c28]Hesham Mekky, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci:
Detecting malicious HTTP redirections using trees of user browsing activity. INFOCOM 2014: 1159-1167 - [c27]Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia:
Nazca: Detecting Malware Distribution in Large-Scale Networks. NDSS 2014 - [c26]Samamon Khemmarat, Sabyasachi Saha, Han Hee Song, Mario Baldi, Lixin Gao:
On Understanding User Interests through Heterogeneous Data Sources. PAM 2014: 272-274 - 2013
- [c25]Prakash Mandayam Comar, Lei Liu, Sabyasachi Saha, Pang-Ning Tan, Antonio Nucci:
Combining supervised and unsupervised learning for zero-day malware detection. INFOCOM 2013: 2022-2030 - [c24]Lei Liu, Prakash Mandayam Comar, Antonio Nucci, Sabyasachi Saha, Pang-Ning Tan:
Missing or Inapplicable: Treatment of Incomplete Continuous-valued Features in Supervised Learning. SDM 2013: 46-54 - 2012
- [c23]Prakash Mandayam Comar, Lei Liu, Sabyasachi Saha, Antonio Nucci, Pang-Ning Tan:
Weighted linear kernel with tree transformed features for malware detection. CIKM 2012: 2287-2290 - [c22]Lei Liu, Prakash Mandayam Comar, Sabyasachi Saha, Pang-Ning Tan, Antonio Nucci:
Recursive NMF: Efficient label tree learning for large multi-class problems. ICPR 2012: 2148-2151
2000 – 2009
- 2008
- [p1]Sabyasachi Saha, Sandip Sen:
Opportunistic Scheduling and Pricing Strategies for Automated Contracting in Supply Chains. Soft Computing Applications in Business 2008: 179-199 - 2007
- [j4]Sandip Sen, Sabyasachi Saha, Karina Hernandez:
Buyer agent to enhance consumer awareness: SAATHI. Electron. Commer. Res. Appl. 6(2): 209-218 (2007) - [j3]Stéphane Airiau, Sabyasachi Saha, Sandip Sen:
Evolutionary Tournament-Based Comparison of Learning and Non-Learning Algorithms for Iterated Games. J. Artif. Soc. Soc. Simul. 10(3) (2007) - [c21]Sandip Sen, Sabyasachi Saha, Stéphane Airiau, Teddy Candale, Dipyaman Banerjee, Doran Chakraborty, Partha Mukherjee, Anil Gürsel:
Robust Agent Communities. AIS-ADM 2007: 28-45 - [c20]Sabyasachi Saha, Sandip Sen:
Reciprocal negotiation over shared resources in agent societies. AAMAS 2007: 116 - [c19]Sabyasachi Saha, Sandip Sen:
Reciprocal Negotiation in Multi-agent Societies. IICAI 2007: 1366-1382 - [c18]Sabyasachi Saha, Sandip Sen:
An Efficient Protocol for Negotiation over Multiple Indivisible Resources. IJCAI 2007: 1494-1499 - 2006
- [c17]Sabyasachi Saha, Sandip Sen:
Negotiating efficient outcomes over multiple issues. AAMAS 2006: 423-425 - [c16]Doran Chakraborty, Sabyasachi Saha, Sandip Sen, Bradley Clement:
Negotiating Monitoring Task Allocation for Orbiters. ICDCN 2006: 282-287 - 2005
- [j2]Sabyasachi Saha, Sandip Sen:
Aggressive Pricing to Exploit Market Niches in Supply Chains. IEEE Intell. Syst. 20(1): 36-41 (2005) - [c15]Sabyasachi Saha, Anish Biswas, Sandip Sen:
Modeling opponent decision in repeated one-shot negotiations. AAMAS 2005: 397-403 - [c14]Dipyaman Banerjee, Sabyasachi Saha, Sandip Sen, Prithviraj Dasgupta:
Reciprocal resource sharing in P2P environments. AAMAS 2005: 853-859 - [c13]Sabyasachi Saha, Sandip Sen:
Predicting agent strategy mix of evolving populations. AAMAS 2005: 1075-1082 - [c12]Sandip Sen, Sabyasachi Saha, Dipyaman Banerjee:
Trust-based contracting in supply chains. AAMAS 2005: 1251-1252 - [c11]Sandip Sen, Sabyasachi Saha, Stéphane Airiau:
Sustainable Agent Communities. EUMAS 2005: 3-17 - [c10]Stéphane Airiau, Sandip Sen, Sabyasachi Saha:
Evolutionary Tournament-Based Comparison of Learning and Non-Learning Strategies for Iterated Games. FLAIRS 2005: 449-454 - 2004
- [j1]Sabyasachi Saha, Sandip Sen:
Opportunistic Scheduling and Pricing in Supply Chains. Künstliche Intell. 18(2): 17-22 (2004) - [c9]Sabyasachi Saha, Sandip Sen:
A Bayes Net Approach to Argumentation. AAAI 2004: 966-967 - [c8]Stéphane Airiau, Sabyasachi Saha, Sandip Sen:
Dynamics of Strategy Distribution in Iterated Games. AAAI Technical Report (2) 2004: 35-42 - [c7]Sabyasachi Saha, Sandip Sen:
A Bayes Net Approach to Argumentation Based Negotiation. ArgMAS 2004: 208-222 - [c6]Dipyaman Banerjee, Sabyasachi Saha, Sandip Sen:
Adapting Agent Expertise Based on Future Expectations. AAMAS 2004: 1400-1401 - [c5]Sabyasachi Saha:
Reciprocity Based Cooperation in a Limited Resource Environment. AAMAS 2004: 1402-1403 - [c4]Sabyasachi Saha, Sandip Sen:
A Bayes Net Approach to Argumentation. AAMAS 2004: 1436-1437 - 2003
- [c3]Sabyasachi Saha, Sandip Sen, Partha Sarathi Dutta:
Helping based on future expectations. AAMAS 2003: 289-296 - [c2]Sandip Sen, Partha Sarathi Dutta, Sabyasachi Saha:
Emergence and Stability of Collaborations Among Rational Agents. CIA 2003: 192-205 - [c1]Sabyasachi Saha, Sandip Sen:
Local Decision Procedures for Avoiding the Tragedy of Commons. IWDC 2003: 311-321
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint