BibTeX records: Padmalochan Bera

download as .bib file

@inproceedings{DBLP:conf/icdcn/TripathyB24,
  author       = {Rojalini Tripathy and
                  Padmalochan Bera},
  title        = {A Cost-effective Framework for Privacy Preserving Federated Learning},
  booktitle    = {Proceedings of the 25th International Conference on Distributed Computing
                  and Networking, {ICDCN} 2024, Chennai, India, January 4-7, 2024},
  pages        = {298--303},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3631461.3631955},
  doi          = {10.1145/3631461.3631955},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/TripathyB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/RoutrayB24,
  author       = {Kasturi Routray and
                  Padmalochan Bera},
  title        = {Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based
                  Encryption},
  booktitle    = {Proceedings of the 25th International Conference on Distributed Computing
                  and Networking, {ICDCN} 2024, Chennai, India, January 4-7, 2024},
  pages        = {346--352},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3631461.3631466},
  doi          = {10.1145/3631461.3631466},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/RoutrayB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/RoutrayB24,
  author       = {Kasturi Routray and
                  Padmalochan Bera},
  title        = {Poster: Fine-Grained Access Control with Efficient Range Comparison
                  for Outsourced Data},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2024 Conference: Posters and Demos,
                  Sydney, NSW, Australia, August 4-8, 2024},
  pages        = {72--74},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3672202.3673748},
  doi          = {10.1145/3672202.3673748},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/RoutrayB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VadigiSMDB23,
  author       = {Sreekanth Vadigi and
                  Kamalakanta Sethi and
                  Dinesh Mohanty and
                  Shom Prasad Das and
                  Padmalochan Bera},
  title        = {Federated reinforcement learning based intrusion detection system
                  using dynamic attention mechanism},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103608},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103608},
  doi          = {10.1016/J.JISA.2023.103608},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VadigiSMDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PriyadarsiniBDR23,
  author       = {Madhukrishna Priyadarsini and
                  Padmalochan Bera and
                  Sajal K. Das and
                  Mohammad Ashiqur Rahman},
  title        = {A Security Enforcement Framework for {SDN} Controller Using Game Theoretic
                  Approach},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1500--1515},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3158690},
  doi          = {10.1109/TDSC.2022.3158690},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PriyadarsiniBDR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/PriyadarsiniMMB23,
  author       = {Madhukrishna Priyadarsini and
                  Pooja Mittal and
                  Joy Chandra Mukherjee and
                  Padmalochan Bera},
  title        = {Budget-constrained Controller Placement in Software-defined Network},
  booktitle    = {24th International Conference on Distributed Computing and Networking,
                  {ICDCN} 2023, Kharagpur, India, January 4-7, 2023},
  pages        = {217--226},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3571306.3571406},
  doi          = {10.1145/3571306.3571406},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/PriyadarsiniMMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SethiAB23,
  author       = {Kamalakanta Sethi and
                  Aniket Agrawal and
                  Padmalochan Bera},
  editor       = {Vallipuram Muthukkumarasamy and
                  Sithu D. Sudarsan and
                  Rudrapatna K. Shyamasundar},
  title        = {Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain
                  Technology},
  booktitle    = {Information Systems Security - 19th International Conference, {ICISS}
                  2023, Raipur, India, December 16-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {431--448},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49099-6\_26},
  doi          = {10.1007/978-3-031-49099-6\_26},
  timestamp    = {Thu, 04 Jan 2024 08:13:46 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SethiAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiot-nets/RoutrayB23,
  author       = {Kasturi Routray and
                  Padmalochan Bera},
  title        = {Context-Aware Attribute Based Access Control for Cloud-based {SCADA}
                  Systems},
  booktitle    = {Proceedings of the 1st Workshop on Enhanced Network Techniques and
                  Technologies for the Industrial IoT to Cloud Continuum, IIoT-NETs
                  2023, New York, NY, USA, 10 September 2023},
  pages        = {35--40},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609389.3610569},
  doi          = {10.1145/3609389.3610569},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiot-nets/RoutrayB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PrasathSMBS22,
  author       = {Sai Prasath and
                  Kamalakanta Sethi and
                  Dinesh Mohanty and
                  Padmalochan Bera and
                  Subhransu Ranjan Samantaray},
  title        = {Analysis of Continual Learning Models for Intrusion Detection System},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {121444--121464},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3222715},
  doi          = {10.1109/ACCESS.2022.3222715},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/PrasathSMBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/RoutrayB22,
  author       = {Kasturi Routray and
                  Padmalochan Bera},
  title        = {{RLT-CPABE:} Revocable Location and Time Aware Ciphertext Policy Attribute-Based
                  Encryption},
  booktitle    = {{IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2022, Gandhinagar, Gujarat, India, December 18-21,
                  2022},
  pages        = {409--414},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ANTS56424.2022.10227786},
  doi          = {10.1109/ANTS56424.2022.10227786},
  timestamp    = {Tue, 05 Sep 2023 20:33:27 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/RoutrayB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/AgrawalSB22,
  author       = {Aniket Agrawal and
                  Kamalakanta Sethi and
                  Padmalochan Bera},
  editor       = {Cyril Onwubiko and
                  Pierangelo Rosati and
                  Aunshul Rege and
                  Arnau Erola and
                  Xavier J. A. Bellekens and
                  Hanan Hindy and
                  Martin Gilje Jaatun},
  title        = {Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked
                  {QR} Code and Partial Homomorphic Encryption},
  booktitle    = {Proceedings of the International Conference on Cybersecurity, Situational
                  Awareness and Social Media, Cyber Science 2022, Wales, UK, June 20-21,
                  2022},
  series       = {Springer Proceedings in Complexity},
  pages        = {411--436},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-6414-5\_23},
  doi          = {10.1007/978-981-19-6414-5\_23},
  timestamp    = {Wed, 06 Sep 2023 16:51:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/AgrawalSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/PriyadarsiniB22,
  author       = {Madhukrishna Priyadarsini and
                  Padmalochan Bera},
  editor       = {Raju S. Bapi and
                  Sandeep S. Kulkarni and
                  Swarup Mohalik and
                  Sathya Peri},
  title        = {An {SDN} Implemented Adaptive Load Balancing Scheme for Mobile Networks},
  booktitle    = {Distributed Computing and Intelligent Technology - 18th International
                  Conference, {ICDCIT} 2022, Bhubaneswar, India, January 19-23, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13145},
  pages        = {127--139},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-94876-4\_8},
  doi          = {10.1007/978-3-030-94876-4\_8},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcit/PriyadarsiniB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SethiPB21,
  author       = {Kamalakanta Sethi and
                  Ankit Pradhan and
                  Padmalochan Bera},
  title        = {{PMTER-ABE:} a practical multi-authority {CP-ABE} with traceability,
                  revocation and outsourcing decryption for secure access control in
                  cloud systems},
  journal      = {Clust. Comput.},
  volume       = {24},
  number       = {2},
  pages        = {1525--1550},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10586-020-03202-2},
  doi          = {10.1007/S10586-020-03202-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/SethiPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PriyadarsiniB21,
  author       = {Madhukrishna Priyadarsini and
                  Padmalochan Bera},
  title        = {Software defined networking architecture, traffic management, security,
                  and placement: {A} survey},
  journal      = {Comput. Networks},
  volume       = {192},
  pages        = {108047},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108047},
  doi          = {10.1016/J.COMNET.2021.108047},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PriyadarsiniB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SethiYKB21,
  author       = {Kamalakanta Sethi and
                  Venu Madhav Yatam and
                  Rahul Kumar and
                  Padmalochan Bera},
  title        = {Attention based multi-agent intrusion detection systems using reinforcement
                  learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102923},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102923},
  doi          = {10.1016/J.JISA.2021.102923},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SethiYKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/AgrawalSB21,
  author       = {Aniket Agrawal and
                  Kamalakanta Sethi and
                  Padmalochan Bera},
  title        = {Inviolable e-Question paper via {QR} code Watermarking and Visual
                  Cryptography},
  booktitle    = {{IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2021, Hyderabad, India, December 13-16, 2021},
  pages        = {266--271},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ANTS52808.2021.9936948},
  doi          = {10.1109/ANTS52808.2021.9936948},
  timestamp    = {Tue, 22 Nov 2022 09:54:53 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/AgrawalSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/AgrawalSB21a,
  author       = {Aniket Agrawal and
                  Kamalakanta Sethi and
                  Padmalochan Bera},
  title        = {IoT-Based Aggregate Smart Grid Energy Data Extraction using Image
                  Recognition and Partial Homomorphic Encryption},
  booktitle    = {{IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2021, Hyderabad, India, December 13-16, 2021},
  pages        = {408--413},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ANTS52808.2021.9936902},
  doi          = {10.1109/ANTS52808.2021.9936902},
  timestamp    = {Tue, 22 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/AgrawalSB21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/MohantySPRB21,
  author       = {Dinesh Mohanty and
                  Kamalakanta Sethi and
                  Sai Prasath and
                  Rashmi Ranjan Rout and
                  Padmalochan Bera},
  title        = {Intelligent Intrusion Detection System for Smart Grid Applications},
  booktitle    = {International Conference on Cyber Situational Awareness, Data Analytics
                  and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CyberSA52016.2021.9478200},
  doi          = {10.1109/CYBERSA52016.2021.9478200},
  timestamp    = {Thu, 22 Jul 2021 18:53:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/MohantySPRB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/ShobhitB21,
  author       = {Shobhit and
                  Padmalochan Bera},
  title        = {ModCGAN: {A} Multimodal Approach to Detect New Malware},
  booktitle    = {International Conference on Cyber Situational Awareness, Data Analytics
                  and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CyberSA52016.2021.9478232},
  doi          = {10.1109/CYBERSA52016.2021.9478232},
  timestamp    = {Thu, 22 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/ShobhitB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/SinhaBS21,
  author       = {Mitali Sinha and
                  Padmalochan Bera and
                  Manoranjan Satpathy},
  title        = {An Anomaly Free Distributed Firewall System for {SDN}},
  booktitle    = {International Conference on Cyber Situational Awareness, Data Analytics
                  and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CyberSA52016.2021.9478256},
  doi          = {10.1109/CYBERSA52016.2021.9478256},
  timestamp    = {Thu, 22 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/SinhaBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/PriyadarsiniKBR20,
  author       = {Madhukrishna Priyadarsini and
                  Shailesh Kumar and
                  Padmalochan Bera and
                  Mohammad Ashiqur Rahman},
  title        = {An energy-efficient load distribution framework for {SDN} controllers},
  journal      = {Computing},
  volume       = {102},
  number       = {9},
  pages        = {2073--2098},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00607-019-00751-2},
  doi          = {10.1007/S00607-019-00751-2},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/PriyadarsiniKBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SethiRKBY20,
  author       = {Kamalakanta Sethi and
                  E. Sai Rupesh and
                  Rahul Kumar and
                  Padmalochan Bera and
                  Venu Madhav Yatam},
  title        = {A context-aware robust intrusion detection system: a reinforcement
                  learning-based approach},
  journal      = {Int. J. Inf. Sec.},
  volume       = {19},
  number       = {6},
  pages        = {657--678},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10207-019-00482-7},
  doi          = {10.1007/S10207-019-00482-7},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/SethiRKBY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SethiPB20,
  author       = {Kamalakanta Sethi and
                  Ankit Pradhan and
                  Padmalochan Bera},
  title        = {Practical traceable multi-authority {CP-ABE} with outsourcing decryption
                  and access policy updation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102435},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102435},
  doi          = {10.1016/J.JISA.2019.102435},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SethiPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/TripathyJBD20,
  author       = {Bata Krishna Tripathy and
                  Swagat Kumar Jena and
                  Padmalochan Bera and
                  Satyabrata Das},
  title        = {An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc
                  Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {114},
  number       = {2},
  pages        = {1339--1370},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11277-020-07423-x},
  doi          = {10.1007/S11277-020-07423-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/TripathyJBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/SethiKPB20,
  author       = {Kamalakanta Sethi and
                  Rahul Kumar and
                  Nishant Prajapati and
                  Padmalochan Bera},
  title        = {A Lightweight Intrusion Detection System using Benford's Law and Network
                  Flow Size Difference},
  booktitle    = {2020 International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMSNETS48256.2020.9027422},
  doi          = {10.1109/COMSNETS48256.2020.9027422},
  timestamp    = {Tue, 17 Mar 2020 15:15:11 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/SethiKPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/SethiKPB20a,
  author       = {Kamalakanta Sethi and
                  Rahul Kumar and
                  Nishant Prajapati and
                  Padmalochan Bera},
  title        = {Deep Reinforcement Learning based Intrusion Detection System for Cloud
                  Infrastructure},
  booktitle    = {2020 International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMSNETS48256.2020.9027452},
  doi          = {10.1109/COMSNETS48256.2020.9027452},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/SethiKPB20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/SethiPB20,
  author       = {Kamalakanta Sethi and
                  Ankit Pradhan and
                  Padmalochan Bera},
  title        = {Attribute-Based Data Security with Obfuscated Access Policy for Smart
                  Grid Applications},
  booktitle    = {2020 International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020},
  pages        = {503--506},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMSNETS48256.2020.9027398},
  doi          = {10.1109/COMSNETS48256.2020.9027398},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/SethiPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/PriyadarsiniMB20,
  author       = {Madhukrishna Priyadarsini and
                  Pooja Mittal and
                  Padmalochan Bera},
  title        = {Smart City Renovation using {SDN} Framework},
  booktitle    = {2020 International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020},
  pages        = {794--799},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMSNETS48256.2020.9027417},
  doi          = {10.1109/COMSNETS48256.2020.9027417},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/PriyadarsiniMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/PradhanPSB20,
  author       = {Ankit Pradhan and
                  R. Punith and
                  Kamalakanta Sethi and
                  Padmalochan Bera},
  title        = {Smart Grid Data Security using Practical {CP-ABE} with Obfuscated
                  Policy and Outsourcing Decryption},
  booktitle    = {2020 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment, CyberSA 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSA49311.2020.9139628},
  doi          = {10.1109/CYBERSA49311.2020.9139628},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/PradhanPSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/PradhanYB20,
  author       = {Ankit Pradhan and
                  Venu Madhav Yatam and
                  Padmalochan Bera},
  title        = {Self-Attention for Cyberbullying Detection},
  booktitle    = {2020 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment, CyberSA 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSA49311.2020.9139711},
  doi          = {10.1109/CYBERSA49311.2020.9139711},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/PradhanYB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/KumarSPRB20,
  author       = {Rahul Kumar and
                  Kamalakanta Sethi and
                  Nishant Prajapati and
                  Rashmi Ranjan Rout and
                  Padmalochan Bera},
  title        = {Machine Learning based Malware Detection in Cloud Environment using
                  Clustering Approach},
  booktitle    = {11th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCNT49239.2020.9225627},
  doi          = {10.1109/ICCCNT49239.2020.9225627},
  timestamp    = {Thu, 22 Oct 2020 13:44:41 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/KumarSPRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/SethiKMB20,
  author       = {Kamalakanta Sethi and
                  Rahul Kumar and
                  Dinesh Mohanty and
                  Padmalochan Bera},
  editor       = {Lejla Batina and
                  Stjepan Picek and
                  Mainack Mondal},
  title        = {Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep
                  Reinforcement Learning},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 10th International
                  Conference, {SPACE} 2020, Kolkata, India, December 17-21, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12586},
  pages        = {66--85},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66626-2\_4},
  doi          = {10.1007/978-3-030-66626-2\_4},
  timestamp    = {Tue, 05 Jan 2021 17:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/space/SethiKMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PriyadarsiniMBK19,
  author       = {Madhukrishna Priyadarsini and
                  Joy Chandra Mukherjee and
                  Padmalochan Bera and
                  Shailesh Kumar and
                  A. H. M. Jakaria and
                  Mohammad Ashiqur Rahman},
  title        = {An adaptive load balancing scheme for software-defined network controllers},
  journal      = {Comput. Networks},
  volume       = {164},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comnet.2019.106918},
  doi          = {10.1016/J.COMNET.2019.106918},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PriyadarsiniMBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/PradhanSMB19,
  author       = {Ankit Pradhan and
                  Kamalakanta Sethi and
                  Shrohan Mohapatra and
                  Padmalochan Bera},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Distributed Multi-authority Attribute-Based Encryption Using Cellular
                  Automata},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {434--456},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_24},
  doi          = {10.1007/978-3-030-31578-8\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/PradhanSMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/SethiKSBP19,
  author       = {Kamalakanta Sethi and
                  Rahul Kumar and
                  Lingaraj Sethi and
                  Padmalochan Bera and
                  Prashanta Kumar Patra},
  title        = {A Novel Machine Learning Based Malware Detection and Classification
                  Framework},
  booktitle    = {2019 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2018, Oxford, United Kingdom, June
                  3-4, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CyberSecPODS.2019.8885196},
  doi          = {10.1109/CYBERSECPODS.2019.8885196},
  timestamp    = {Mon, 11 Nov 2019 19:24:37 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/SethiKSBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/SethiPPB19,
  author       = {Kamalakanta Sethi and
                  Ankit Pradhan and
                  R. Punith and
                  Padmalochan Bera},
  title        = {A Scalable Attribute Based Encryption for Secure Data Storage and
                  Access in Cloud},
  booktitle    = {2019 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2018, Oxford, United Kingdom, June
                  3-4, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CyberSecPODS.2019.8884981},
  doi          = {10.1109/CYBERSECPODS.2019.8884981},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/SethiPPB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/PriyadarsiniBR19,
  author       = {Madhukrishna Priyadarsini and
                  Padmalochan Bera and
                  Mohammad Ashiqur Rahman},
  title        = {A Signalling Game-Based Security Enforcement Mechanism for {SDN} Controllers},
  booktitle    = {10th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCCNT45670.2019.8944843},
  doi          = {10.1109/ICCCNT45670.2019.8944843},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/PriyadarsiniBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TripathyDJB18,
  author       = {Bata Krishna Tripathy and
                  Debi Prasad Das and
                  Swagat Kumar Jena and
                  Padmalochan Bera},
  title        = {Risk based Security Enforcement in Software Defined Network},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {321--335},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.010},
  doi          = {10.1016/J.COSE.2018.07.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TripathyDJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cn/PriyadarsiniB18,
  author       = {Madhukrishna Priyadarsini and
                  Padmalochan Bera},
  editor       = {Piotr Gaj and
                  Michal Sawicki and
                  Grazyna Suchacka and
                  Andrzej Kwiecien},
  title        = {A New Approach for {SDN} Performance Enhancement},
  booktitle    = {Computer Networks - 25th International Conference, {CN} 2018, Gliwice,
                  Poland, June 19-22, 2018, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {860},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92459-5\_10},
  doi          = {10.1007/978-3-319-92459-5\_10},
  timestamp    = {Thu, 14 Oct 2021 10:07:49 +0200},
  biburl       = {https://dblp.org/rec/conf/cn/PriyadarsiniB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/SethiCTB18,
  author       = {Kamalakanta Sethi and
                  Shankar Kumar Chaudhary and
                  Bata Krishna Tripathy and
                  Padmalochan Bera},
  editor       = {Paolo Bellavista and
                  Vijay K. Garg},
  title        = {A Novel Malware Analysis Framework for Malware Detection and Classification
                  using Machine Learning Approach},
  booktitle    = {Proceedings of the 19th International Conference on Distributed Computing
                  and Networking, {ICDCN} 2018, Varanasi, India, January 4-7, 2018},
  pages        = {49:1--49:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3154273.3154326},
  doi          = {10.1145/3154273.3154326},
  timestamp    = {Fri, 27 Mar 2020 08:54:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/SethiCTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/PriyadarsiniBR18,
  author       = {Madhukrishna Priyadarsini and
                  Padmalochan Bera and
                  Mohammad Ashiqur Rahman},
  title        = {A new approach for energy efficiency in software defined network},
  booktitle    = {Fifth International Conference on Software Defined Systems, {SDS}
                  2018, Barcelona, Spain, April 23-26, 2018},
  pages        = {67--73},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SDS.2018.8370424},
  doi          = {10.1109/SDS.2018.8370424},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sds/PriyadarsiniBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TripathySBR17,
  author       = {Bata Krishna Tripathy and
                  Ashray Sudhir and
                  Padmalochan Bera and
                  Mohammad Ashiqur Rahman},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Formal Modelling and Verification of Requirements of Adaptive Routing
                  Protocol for Mobile Ad-Hoc Network},
  booktitle    = {41st {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 1},
  pages        = {548--556},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMPSAC.2017.132},
  doi          = {10.1109/COMPSAC.2017.132},
  timestamp    = {Mon, 02 Sep 2024 08:02:22 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/TripathySBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/SethiMB17,
  author       = {Kamalakanta Sethi and
                  Amartya Majumdar and
                  Padmalochan Bera},
  title        = {A novel implementation of parallel homomorphic encryption for secure
                  data storage in cloud},
  booktitle    = {2017 International Conference on Cyber Security And Protection Of
                  Digital Services, Cyber Security 2017, London, United Kingdom, June
                  19-20, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CyberSecPODS.2017.8074851},
  doi          = {10.1109/CYBERSECPODS.2017.8074851},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/SethiMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SethiCTB17,
  author       = {Kamalakanta Sethi and
                  Shankar Kumar Chaudhary and
                  Bata Krishna Tripathy and
                  Padmalochan Bera},
  editor       = {Rajveer Singh Shekhawat and
                  Manoj Singh Gaur and
                  Atilla El{\c{c}}i and
                  Jaideep Vaidya and
                  Oleg B. Makarevich and
                  Ron Poet and
                  Mehmet A. Orgun and
                  Vijaypal S. Dhaka and
                  Manoj Kumar Bohra and
                  Virender Singh and
                  Ludmila K. Babenko and
                  Naghmeh Moradpoor Sheykhkanloo and
                  Behnam Rahnama},
  title        = {A novel malware analysis for malware detection and classification
                  using machine learning algorithms},
  booktitle    = {Proceedings of the 10th International Conference on Security of Information
                  and Networks, {SIN} 2017, Jaipur, IN, India, October 13-15, 2017},
  pages        = {107--113},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3136825.3136883},
  doi          = {10.1145/3136825.3136883},
  timestamp    = {Tue, 06 Nov 2018 16:57:57 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SethiCTB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SethiCBT17,
  author       = {Kamalakanta Sethi and
                  Anish Chopra and
                  Padmalochan Bera and
                  Bata Krishna Tripathy},
  editor       = {Rajveer Singh Shekhawat and
                  Manoj Singh Gaur and
                  Atilla El{\c{c}}i and
                  Jaideep Vaidya and
                  Oleg B. Makarevich and
                  Ron Poet and
                  Mehmet A. Orgun and
                  Vijaypal S. Dhaka and
                  Manoj Kumar Bohra and
                  Virender Singh and
                  Ludmila K. Babenko and
                  Naghmeh Moradpoor Sheykhkanloo and
                  Behnam Rahnama},
  title        = {Integration of role based access control with homomorphic cryptosystem
                  for secure and controlled access of data in cloud},
  booktitle    = {Proceedings of the 10th International Conference on Security of Information
                  and Networks, {SIN} 2017, Jaipur, IN, India, October 13-15, 2017},
  pages        = {194--199},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3136825.3136902},
  doi          = {10.1145/3136825.3136902},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SethiCBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TripathySBR16,
  author       = {Bata Krishna Tripathy and
                  Ananta Gopal Sethy and
                  Padmalochan Bera and
                  Mohammad Ashiqur Rahman},
  title        = {A Novel Secure and Efficient Policy Management Framework for Software
                  Defined Network},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {423--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.31},
  doi          = {10.1109/COMPSAC.2016.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TripathySBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/TripathyBR16,
  author       = {Bata Krishna Tripathy and
                  Padmalochan Bera and
                  Mohammad Ashiqur Rahman},
  title        = {Analysis of trust models in Mobile Ad Hoc Networks: {A} simulation
                  based study},
  booktitle    = {8th International Conference on Communication Systems and Networks,
                  {COMSNETS} 2016, Bangalore, India, January 5-10, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMSNETS.2016.7440007},
  doi          = {10.1109/COMSNETS.2016.7440007},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/TripathyBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/MaityBGA15,
  author       = {Soumya Maity and
                  Padmalochan Bera and
                  S. K. Ghosh and
                  Ehab Al{-}Shaer},
  title        = {Formal integrated network security analysis tool: formal query-based
                  network security configuration analysis},
  journal      = {{IET} Networks},
  volume       = {4},
  number       = {2},
  pages        = {137--147},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-net.2013.0090},
  doi          = {10.1049/IET-NET.2013.0090},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/MaityBGA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/MajhiB15,
  author       = {Santosh Kumar Majhi and
                  Padmalochan Bera},
  editor       = {Ehab Al{-}Shaer and
                  Christopher S. Oehmen and
                  Mohammad Ashiqur Rahman},
  title        = {A Security Enforcement Framework for Virtual Machine Migration Auction},
  booktitle    = {Proceedings of the 2015 Workshop on Automated Decision Making for
                  Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October
                  12, 2015},
  pages        = {47--53},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2809826.2809829},
  doi          = {10.1145/2809826.2809829},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/MajhiB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MajhiB14,
  author       = {Santosh Kumar Majhi and
                  Padmalochan Bera},
  title        = {{OHMF:} {A} Query Based Optimal Healthcare Medication Framework},
  journal      = {CoRR},
  volume       = {abs/1410.5815},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.5815},
  eprinttype    = {arXiv},
  eprint       = {1410.5815},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MajhiB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/RahmanAB13,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer and
                  Padmalochan Bera},
  title        = {A Noninvasive Threat Analyzer for Advanced Metering Infrastructure
                  in Smart Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {4},
  number       = {1},
  pages        = {273--287},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSG.2012.2228283},
  doi          = {10.1109/TSG.2012.2228283},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/RahmanAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/BeraG13,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh},
  title        = {A Query Driven Security Testing Framework for Enterprise Network},
  booktitle    = {Sixth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg,
                  March 18-22, 2013},
  pages        = {476--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICSTW.2013.62},
  doi          = {10.1109/ICSTW.2013.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/BeraG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RahmanBA12,
  author       = {Mohammad Ashiqur Rahman and
                  Padmalochan Bera and
                  Ehab Al{-}Shaer},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {SmartAnalyzer: {A} noninvasive security threat analyzer for {AMI}
                  smart grid},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2255--2263},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195611},
  doi          = {10.1109/INFCOM.2012.6195611},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/RahmanBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ised/MaityBG12,
  author       = {Soumya Maity and
                  Padmalochan Bera and
                  S. K. Ghosh},
  title        = {Policy Based {ACL} Configuration Synthesis in Enterprise Networks:
                  {A} Formal Approach},
  booktitle    = {International Symposium on Electronic System Design, ISEDs 2012, Kolkata,
                  India, December 19-22, 2012},
  pages        = {314--318},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISED.2012.72},
  doi          = {10.1109/ISED.2012.72},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ised/MaityBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BeraGD11,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  title        = {A {WLAN} security management framework based on formal spatio-temporal
                  {RBAC} model},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {9},
  pages        = {981--993},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.232},
  doi          = {10.1002/SEC.232},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BeraGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Al-HajBA11,
  author       = {Saeed Al{-}Haj and
                  Padmalochan Bera and
                  Ehab Al{-}Shaer},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Build and Test Your Own Network Configuration},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {522--532},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_33},
  doi          = {10.1007/978-3-642-31909-9\_33},
  timestamp    = {Mon, 24 Jun 2024 20:34:51 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Al-HajBA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BeraGD10,
  author       = {Padmalochan Bera and
                  Santosh K. Ghosh and
                  Pallab Dasgupta},
  title        = {Integrated security analysis framework for an enterprise network -
                  a formal approach},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {283--300},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0174},
  doi          = {10.1049/IET-IFS.2009.0174},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BeraGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/BeraGD10,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  title        = {Policy Based Security Analysis in Enterprise Networks: {A} Formal
                  Approach},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {7},
  number       = {4},
  pages        = {231--243},
  year         = {2010},
  url          = {https://doi.org/10.1109/TNSM.2010.1012.0365},
  doi          = {10.1109/TNSM.2010.1012.0365},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/BeraGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/BeraMGD10,
  author       = {Padmalochan Bera and
                  Soumya Maity and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  title        = {A Query based Formal Security Analysis Framework for Enterprise {LAN}},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {407--414},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.96},
  doi          = {10.1109/CIT.2010.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/BeraMGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/BeraMGD10,
  author       = {Padmalochan Bera and
                  Soumya Maity and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A {SAT} Based Verification Framework for Wireless {LAN} Security Policy
                  Management Supported by {STRBAC} Model},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {232--241},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_24},
  doi          = {10.1007/978-3-642-14478-3\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/BeraMGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icistm/BeraGD10,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  editor       = {Sushil K. Prasad and
                  Harrick M. Vin and
                  Sartaj Sahni and
                  Mahadeo Jaiswal and
                  Bundit Thipakorn},
  title        = {A Spatio-Temporal Role-Based Access Control Model for Wireless {LAN}
                  Security Policy Management},
  booktitle    = {Information Systems, Technology and Management - 4th International
                  Conference, {ICISTM} 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {54},
  pages        = {76--88},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12035-0\_9},
  doi          = {10.1007/978-3-642-12035-0\_9},
  timestamp    = {Fri, 02 Nov 2018 09:44:37 +0100},
  biburl       = {https://dblp.org/rec/conf/icistm/BeraGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/BeraMG10,
  author       = {Padmalochan Bera and
                  Soumya Maity and
                  Soumya Kanti Ghosh},
  editor       = {Tony Sager and
                  Gail{-}Joon Ahn and
                  Krishna Kant and
                  Heather Richter Lipford},
  title        = {Generating policy based security implementation in enterprise network:
                  a formal framework},
  booktitle    = {3rd {ACM} Workshop on Assurable and Usable Security Configuration,
                  SafeConfig 2010, Chicago, IL, USA, October 4, 2010},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866898.1866900},
  doi          = {10.1145/1866898.1866900},
  timestamp    = {Thu, 13 Feb 2020 15:16:46 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/BeraMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MaityBG10,
  author       = {Soumya Maity and
                  Padmalochan Bera and
                  Soumya Kanti Ghosh},
  editor       = {Oleg B. Makarevich and
                  Atilla El{\c{c}}i and
                  Mehmet A. Orgun and
                  Sorin A. Huss and
                  Ludmila K. Babenko and
                  Alexander G. Chefranov and
                  Vijay Varadharajan},
  title        = {A mobile {IP} based {WLAN} security management framework with reconfigurable
                  hardware acceleration},
  booktitle    = {Proceedings of the 3rd International Conference on Security of Information
                  and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September
                  7-11, 2010},
  pages        = {218--223},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854099.1854143},
  doi          = {10.1145/1854099.1854143},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/MaityBG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BeraGD09,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Formal Verification of Security Policy Implementations in Enterprise
                  Networks},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {117--131},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_10},
  doi          = {10.1007/978-3-642-10772-6\_10},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BeraGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netcom/BeraGD09,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  title        = {Fault Analysis of Security Policy Implementations in Enterprise Networks},
  booktitle    = {First International Conference on Networks and Communications, NetCoM
                  2009, Chennai, India, December 27-29, 2009},
  pages        = {240--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NetCoM.2009.82},
  doi          = {10.1109/NETCOM.2009.82},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netcom/BeraGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}