Somak Bhattacharya

Learn More
Long electropherotype with Subgroup I specificity is a common feature of animal rotaviruses. In an epidemic of infantile gastroenteritis in Manipur, India, long but SG I strains predominated in the outbreak in the year 1987–88. One such strain isolated from that region, following the outbreak had G9P [19] specificity. As this is a rare combination, the gene(More)
A porcine Group A rotavirus strain (RU172) was detected and molecularly characterized during a surveillance study conducted for rotavirus infection in a pig farm located in a suburban area of Kolkata City, India. The G12 genotype specificity of RU172 was revealed by PCR-based genotyping assays following addition of a G12 type-specific primer (designed in(More)
Molecular characterization of two porcine group A rotavirus strains (HP113 and HP140), detected from eastern India, revealed a VP7 closely related to those of human G6P[14] strains, VP4 with a borderline P[13] genotype, and VP6 related to bovine and human SGI strains rather than porcine SGI and/or SGII group A rotaviruses. Both strains had NSP4 and NSP5 of(More)
Network Security has gained an ever increasing importance today because of the increased dependence on the networks. One way to assess the threats to the networks is through the use of the attack graphs. However, because of their sheer enormity and complexity the analysis becomes difficult. Given an attack graph the identification of a probable attack path(More)
HIV-1 subtype C is the major subtype in India as evidenced from the analysis of specific regions within envelope and gag gene. The matrix protein (p17) of HIV-1 which is involved in several functions like the viral RNA transport, nuclear localization, assembly of pre-integration complex into host nucleus has been used to study the strain diversity among(More)
In todaypsilas large complex organizational network, security administration is a challenging task. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploit is called(More)
In today's large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulnerabilities that exists across a typical organizational network. Identifying vulnerabilities before they can be exploited by malicious user often helps to test, maintain, and assess(More)
In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of(More)