default search action
BibTeX records: Padmalochan Bera
@inproceedings{DBLP:conf/icdcn/TripathyB24, author = {Rojalini Tripathy and Padmalochan Bera}, title = {A Cost-effective Framework for Privacy Preserving Federated Learning}, booktitle = {Proceedings of the 25th International Conference on Distributed Computing and Networking, {ICDCN} 2024, Chennai, India, January 4-7, 2024}, pages = {298--303}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3631461.3631955}, doi = {10.1145/3631461.3631955}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/TripathyB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/RoutrayB24, author = {Kasturi Routray and Padmalochan Bera}, title = {Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption}, booktitle = {Proceedings of the 25th International Conference on Distributed Computing and Networking, {ICDCN} 2024, Chennai, India, January 4-7, 2024}, pages = {346--352}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3631461.3631466}, doi = {10.1145/3631461.3631466}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/RoutrayB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/RoutrayB24, author = {Kasturi Routray and Padmalochan Bera}, title = {Poster: Fine-Grained Access Control with Efficient Range Comparison for Outsourced Data}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2024 Conference: Posters and Demos, Sydney, NSW, Australia, August 4-8, 2024}, pages = {72--74}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3672202.3673748}, doi = {10.1145/3672202.3673748}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/RoutrayB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VadigiSMDB23, author = {Sreekanth Vadigi and Kamalakanta Sethi and Dinesh Mohanty and Shom Prasad Das and Padmalochan Bera}, title = {Federated reinforcement learning based intrusion detection system using dynamic attention mechanism}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103608}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103608}, doi = {10.1016/J.JISA.2023.103608}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VadigiSMDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PriyadarsiniBDR23, author = {Madhukrishna Priyadarsini and Padmalochan Bera and Sajal K. Das and Mohammad Ashiqur Rahman}, title = {A Security Enforcement Framework for {SDN} Controller Using Game Theoretic Approach}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1500--1515}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3158690}, doi = {10.1109/TDSC.2022.3158690}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PriyadarsiniBDR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/PriyadarsiniMMB23, author = {Madhukrishna Priyadarsini and Pooja Mittal and Joy Chandra Mukherjee and Padmalochan Bera}, title = {Budget-constrained Controller Placement in Software-defined Network}, booktitle = {24th International Conference on Distributed Computing and Networking, {ICDCN} 2023, Kharagpur, India, January 4-7, 2023}, pages = {217--226}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3571306.3571406}, doi = {10.1145/3571306.3571406}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/PriyadarsiniMMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SethiAB23, author = {Kamalakanta Sethi and Aniket Agrawal and Padmalochan Bera}, editor = {Vallipuram Muthukkumarasamy and Sithu D. Sudarsan and Rudrapatna K. Shyamasundar}, title = {Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology}, booktitle = {Information Systems Security - 19th International Conference, {ICISS} 2023, Raipur, India, December 16-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {431--448}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49099-6\_26}, doi = {10.1007/978-3-031-49099-6\_26}, timestamp = {Thu, 04 Jan 2024 08:13:46 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SethiAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiot-nets/RoutrayB23, author = {Kasturi Routray and Padmalochan Bera}, title = {Context-Aware Attribute Based Access Control for Cloud-based {SCADA} Systems}, booktitle = {Proceedings of the 1st Workshop on Enhanced Network Techniques and Technologies for the Industrial IoT to Cloud Continuum, IIoT-NETs 2023, New York, NY, USA, 10 September 2023}, pages = {35--40}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3609389.3610569}, doi = {10.1145/3609389.3610569}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiot-nets/RoutrayB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PrasathSMBS22, author = {Sai Prasath and Kamalakanta Sethi and Dinesh Mohanty and Padmalochan Bera and Subhransu Ranjan Samantaray}, title = {Analysis of Continual Learning Models for Intrusion Detection System}, journal = {{IEEE} Access}, volume = {10}, pages = {121444--121464}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3222715}, doi = {10.1109/ACCESS.2022.3222715}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/PrasathSMBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/RoutrayB22, author = {Kasturi Routray and Padmalochan Bera}, title = {{RLT-CPABE:} Revocable Location and Time Aware Ciphertext Policy Attribute-Based Encryption}, booktitle = {{IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2022, Gandhinagar, Gujarat, India, December 18-21, 2022}, pages = {409--414}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ANTS56424.2022.10227786}, doi = {10.1109/ANTS56424.2022.10227786}, timestamp = {Tue, 05 Sep 2023 20:33:27 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/RoutrayB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/AgrawalSB22, author = {Aniket Agrawal and Kamalakanta Sethi and Padmalochan Bera}, editor = {Cyril Onwubiko and Pierangelo Rosati and Aunshul Rege and Arnau Erola and Xavier J. A. Bellekens and Hanan Hindy and Martin Gilje Jaatun}, title = {Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked {QR} Code and Partial Homomorphic Encryption}, booktitle = {Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, Cyber Science 2022, Wales, UK, June 20-21, 2022}, series = {Springer Proceedings in Complexity}, pages = {411--436}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-6414-5\_23}, doi = {10.1007/978-981-19-6414-5\_23}, timestamp = {Wed, 06 Sep 2023 16:51:41 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/AgrawalSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/PriyadarsiniB22, author = {Madhukrishna Priyadarsini and Padmalochan Bera}, editor = {Raju S. Bapi and Sandeep S. Kulkarni and Swarup Mohalik and Sathya Peri}, title = {An {SDN} Implemented Adaptive Load Balancing Scheme for Mobile Networks}, booktitle = {Distributed Computing and Intelligent Technology - 18th International Conference, {ICDCIT} 2022, Bhubaneswar, India, January 19-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13145}, pages = {127--139}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-94876-4\_8}, doi = {10.1007/978-3-030-94876-4\_8}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcit/PriyadarsiniB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SethiPB21, author = {Kamalakanta Sethi and Ankit Pradhan and Padmalochan Bera}, title = {{PMTER-ABE:} a practical multi-authority {CP-ABE} with traceability, revocation and outsourcing decryption for secure access control in cloud systems}, journal = {Clust. Comput.}, volume = {24}, number = {2}, pages = {1525--1550}, year = {2021}, url = {https://doi.org/10.1007/s10586-020-03202-2}, doi = {10.1007/S10586-020-03202-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/SethiPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PriyadarsiniB21, author = {Madhukrishna Priyadarsini and Padmalochan Bera}, title = {Software defined networking architecture, traffic management, security, and placement: {A} survey}, journal = {Comput. Networks}, volume = {192}, pages = {108047}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108047}, doi = {10.1016/J.COMNET.2021.108047}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PriyadarsiniB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SethiYKB21, author = {Kamalakanta Sethi and Venu Madhav Yatam and Rahul Kumar and Padmalochan Bera}, title = {Attention based multi-agent intrusion detection systems using reinforcement learning}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102923}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102923}, doi = {10.1016/J.JISA.2021.102923}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SethiYKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/AgrawalSB21, author = {Aniket Agrawal and Kamalakanta Sethi and Padmalochan Bera}, title = {Inviolable e-Question paper via {QR} code Watermarking and Visual Cryptography}, booktitle = {{IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2021, Hyderabad, India, December 13-16, 2021}, pages = {266--271}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ANTS52808.2021.9936948}, doi = {10.1109/ANTS52808.2021.9936948}, timestamp = {Tue, 22 Nov 2022 09:54:53 +0100}, biburl = {https://dblp.org/rec/conf/IEEEants/AgrawalSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/AgrawalSB21a, author = {Aniket Agrawal and Kamalakanta Sethi and Padmalochan Bera}, title = {IoT-Based Aggregate Smart Grid Energy Data Extraction using Image Recognition and Partial Homomorphic Encryption}, booktitle = {{IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2021, Hyderabad, India, December 13-16, 2021}, pages = {408--413}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ANTS52808.2021.9936902}, doi = {10.1109/ANTS52808.2021.9936902}, timestamp = {Tue, 22 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEants/AgrawalSB21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MohantySPRB21, author = {Dinesh Mohanty and Kamalakanta Sethi and Sai Prasath and Rashmi Ranjan Rout and Padmalochan Bera}, title = {Intelligent Intrusion Detection System for Smart Grid Applications}, booktitle = {International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CyberSA52016.2021.9478200}, doi = {10.1109/CYBERSA52016.2021.9478200}, timestamp = {Thu, 22 Jul 2021 18:53:44 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/MohantySPRB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/ShobhitB21, author = {Shobhit and Padmalochan Bera}, title = {ModCGAN: {A} Multimodal Approach to Detect New Malware}, booktitle = {International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CyberSA52016.2021.9478232}, doi = {10.1109/CYBERSA52016.2021.9478232}, timestamp = {Thu, 22 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/ShobhitB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/SinhaBS21, author = {Mitali Sinha and Padmalochan Bera and Manoranjan Satpathy}, title = {An Anomaly Free Distributed Firewall System for {SDN}}, booktitle = {International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CyberSA52016.2021.9478256}, doi = {10.1109/CYBERSA52016.2021.9478256}, timestamp = {Thu, 22 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/SinhaBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/PriyadarsiniKBR20, author = {Madhukrishna Priyadarsini and Shailesh Kumar and Padmalochan Bera and Mohammad Ashiqur Rahman}, title = {An energy-efficient load distribution framework for {SDN} controllers}, journal = {Computing}, volume = {102}, number = {9}, pages = {2073--2098}, year = {2020}, url = {https://doi.org/10.1007/s00607-019-00751-2}, doi = {10.1007/S00607-019-00751-2}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/PriyadarsiniKBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SethiRKBY20, author = {Kamalakanta Sethi and E. Sai Rupesh and Rahul Kumar and Padmalochan Bera and Venu Madhav Yatam}, title = {A context-aware robust intrusion detection system: a reinforcement learning-based approach}, journal = {Int. J. Inf. Sec.}, volume = {19}, number = {6}, pages = {657--678}, year = {2020}, url = {https://doi.org/10.1007/s10207-019-00482-7}, doi = {10.1007/S10207-019-00482-7}, timestamp = {Wed, 28 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/SethiRKBY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SethiPB20, author = {Kamalakanta Sethi and Ankit Pradhan and Padmalochan Bera}, title = {Practical traceable multi-authority {CP-ABE} with outsourcing decryption and access policy updation}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102435}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102435}, doi = {10.1016/J.JISA.2019.102435}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SethiPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/TripathyJBD20, author = {Bata Krishna Tripathy and Swagat Kumar Jena and Padmalochan Bera and Satyabrata Das}, title = {An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks}, journal = {Wirel. Pers. Commun.}, volume = {114}, number = {2}, pages = {1339--1370}, year = {2020}, url = {https://doi.org/10.1007/s11277-020-07423-x}, doi = {10.1007/S11277-020-07423-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/TripathyJBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/SethiKPB20, author = {Kamalakanta Sethi and Rahul Kumar and Nishant Prajapati and Padmalochan Bera}, title = {A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference}, booktitle = {2020 International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMSNETS48256.2020.9027422}, doi = {10.1109/COMSNETS48256.2020.9027422}, timestamp = {Tue, 17 Mar 2020 15:15:11 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/SethiKPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/SethiKPB20a, author = {Kamalakanta Sethi and Rahul Kumar and Nishant Prajapati and Padmalochan Bera}, title = {Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure}, booktitle = {2020 International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMSNETS48256.2020.9027452}, doi = {10.1109/COMSNETS48256.2020.9027452}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/SethiKPB20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/SethiPB20, author = {Kamalakanta Sethi and Ankit Pradhan and Padmalochan Bera}, title = {Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications}, booktitle = {2020 International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020}, pages = {503--506}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMSNETS48256.2020.9027398}, doi = {10.1109/COMSNETS48256.2020.9027398}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/SethiPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/PriyadarsiniMB20, author = {Madhukrishna Priyadarsini and Pooja Mittal and Padmalochan Bera}, title = {Smart City Renovation using {SDN} Framework}, booktitle = {2020 International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020}, pages = {794--799}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMSNETS48256.2020.9027417}, doi = {10.1109/COMSNETS48256.2020.9027417}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/PriyadarsiniMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/PradhanPSB20, author = {Ankit Pradhan and R. Punith and Kamalakanta Sethi and Padmalochan Bera}, title = {Smart Grid Data Security using Practical {CP-ABE} with Obfuscated Policy and Outsourcing Decryption}, booktitle = {2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSA49311.2020.9139628}, doi = {10.1109/CYBERSA49311.2020.9139628}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/PradhanPSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/PradhanYB20, author = {Ankit Pradhan and Venu Madhav Yatam and Padmalochan Bera}, title = {Self-Attention for Cyberbullying Detection}, booktitle = {2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSA49311.2020.9139711}, doi = {10.1109/CYBERSA49311.2020.9139711}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/PradhanYB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/KumarSPRB20, author = {Rahul Kumar and Kamalakanta Sethi and Nishant Prajapati and Rashmi Ranjan Rout and Padmalochan Bera}, title = {Machine Learning based Malware Detection in Cloud Environment using Clustering Approach}, booktitle = {11th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCNT49239.2020.9225627}, doi = {10.1109/ICCCNT49239.2020.9225627}, timestamp = {Thu, 22 Oct 2020 13:44:41 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/KumarSPRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/SethiKMB20, author = {Kamalakanta Sethi and Rahul Kumar and Dinesh Mohanty and Padmalochan Bera}, editor = {Lejla Batina and Stjepan Picek and Mainack Mondal}, title = {Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement Learning}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, {SPACE} 2020, Kolkata, India, December 17-21, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12586}, pages = {66--85}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66626-2\_4}, doi = {10.1007/978-3-030-66626-2\_4}, timestamp = {Tue, 05 Jan 2021 17:43:06 +0100}, biburl = {https://dblp.org/rec/conf/space/SethiKMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PriyadarsiniMBK19, author = {Madhukrishna Priyadarsini and Joy Chandra Mukherjee and Padmalochan Bera and Shailesh Kumar and A. H. M. Jakaria and Mohammad Ashiqur Rahman}, title = {An adaptive load balancing scheme for software-defined network controllers}, journal = {Comput. Networks}, volume = {164}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.106918}, doi = {10.1016/J.COMNET.2019.106918}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PriyadarsiniMBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PradhanSMB19, author = {Ankit Pradhan and Kamalakanta Sethi and Shrohan Mohapatra and Padmalochan Bera}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {434--456}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_24}, doi = {10.1007/978-3-030-31578-8\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/PradhanSMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/SethiKSBP19, author = {Kamalakanta Sethi and Rahul Kumar and Lingaraj Sethi and Padmalochan Bera and Prashanta Kumar Patra}, title = {A Novel Machine Learning Based Malware Detection and Classification Framework}, booktitle = {2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CyberSecPODS.2019.8885196}, doi = {10.1109/CYBERSECPODS.2019.8885196}, timestamp = {Mon, 11 Nov 2019 19:24:37 +0100}, biburl = {https://dblp.org/rec/conf/cybersecpods/SethiKSBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/SethiPPB19, author = {Kamalakanta Sethi and Ankit Pradhan and R. Punith and Padmalochan Bera}, title = {A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud}, booktitle = {2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CyberSecPODS.2019.8884981}, doi = {10.1109/CYBERSECPODS.2019.8884981}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/SethiPPB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/PriyadarsiniBR19, author = {Madhukrishna Priyadarsini and Padmalochan Bera and Mohammad Ashiqur Rahman}, title = {A Signalling Game-Based Security Enforcement Mechanism for {SDN} Controllers}, booktitle = {10th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCCNT45670.2019.8944843}, doi = {10.1109/ICCCNT45670.2019.8944843}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/PriyadarsiniBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TripathyDJB18, author = {Bata Krishna Tripathy and Debi Prasad Das and Swagat Kumar Jena and Padmalochan Bera}, title = {Risk based Security Enforcement in Software Defined Network}, journal = {Comput. Secur.}, volume = {78}, pages = {321--335}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.010}, doi = {10.1016/J.COSE.2018.07.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TripathyDJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cn/PriyadarsiniB18, author = {Madhukrishna Priyadarsini and Padmalochan Bera}, editor = {Piotr Gaj and Michal Sawicki and Grazyna Suchacka and Andrzej Kwiecien}, title = {A New Approach for {SDN} Performance Enhancement}, booktitle = {Computer Networks - 25th International Conference, {CN} 2018, Gliwice, Poland, June 19-22, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {860}, pages = {115--129}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92459-5\_10}, doi = {10.1007/978-3-319-92459-5\_10}, timestamp = {Thu, 14 Oct 2021 10:07:49 +0200}, biburl = {https://dblp.org/rec/conf/cn/PriyadarsiniB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/SethiCTB18, author = {Kamalakanta Sethi and Shankar Kumar Chaudhary and Bata Krishna Tripathy and Padmalochan Bera}, editor = {Paolo Bellavista and Vijay K. Garg}, title = {A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach}, booktitle = {Proceedings of the 19th International Conference on Distributed Computing and Networking, {ICDCN} 2018, Varanasi, India, January 4-7, 2018}, pages = {49:1--49:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3154273.3154326}, doi = {10.1145/3154273.3154326}, timestamp = {Fri, 27 Mar 2020 08:54:53 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/SethiCTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sds/PriyadarsiniBR18, author = {Madhukrishna Priyadarsini and Padmalochan Bera and Mohammad Ashiqur Rahman}, title = {A new approach for energy efficiency in software defined network}, booktitle = {Fifth International Conference on Software Defined Systems, {SDS} 2018, Barcelona, Spain, April 23-26, 2018}, pages = {67--73}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SDS.2018.8370424}, doi = {10.1109/SDS.2018.8370424}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sds/PriyadarsiniBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TripathySBR17, author = {Bata Krishna Tripathy and Ashray Sudhir and Padmalochan Bera and Mohammad Ashiqur Rahman}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network}, booktitle = {41st {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 1}, pages = {548--556}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/COMPSAC.2017.132}, doi = {10.1109/COMPSAC.2017.132}, timestamp = {Mon, 02 Sep 2024 08:02:22 +0200}, biburl = {https://dblp.org/rec/conf/compsac/TripathySBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/SethiMB17, author = {Kamalakanta Sethi and Amartya Majumdar and Padmalochan Bera}, title = {A novel implementation of parallel homomorphic encryption for secure data storage in cloud}, booktitle = {2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CyberSecPODS.2017.8074851}, doi = {10.1109/CYBERSECPODS.2017.8074851}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/SethiMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SethiCTB17, author = {Kamalakanta Sethi and Shankar Kumar Chaudhary and Bata Krishna Tripathy and Padmalochan Bera}, editor = {Rajveer Singh Shekhawat and Manoj Singh Gaur and Atilla El{\c{c}}i and Jaideep Vaidya and Oleg B. Makarevich and Ron Poet and Mehmet A. Orgun and Vijaypal S. Dhaka and Manoj Kumar Bohra and Virender Singh and Ludmila K. Babenko and Naghmeh Moradpoor Sheykhkanloo and Behnam Rahnama}, title = {A novel malware analysis for malware detection and classification using machine learning algorithms}, booktitle = {Proceedings of the 10th International Conference on Security of Information and Networks, {SIN} 2017, Jaipur, IN, India, October 13-15, 2017}, pages = {107--113}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3136825.3136883}, doi = {10.1145/3136825.3136883}, timestamp = {Tue, 06 Nov 2018 16:57:57 +0100}, biburl = {https://dblp.org/rec/conf/sin/SethiCTB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SethiCBT17, author = {Kamalakanta Sethi and Anish Chopra and Padmalochan Bera and Bata Krishna Tripathy}, editor = {Rajveer Singh Shekhawat and Manoj Singh Gaur and Atilla El{\c{c}}i and Jaideep Vaidya and Oleg B. Makarevich and Ron Poet and Mehmet A. Orgun and Vijaypal S. Dhaka and Manoj Kumar Bohra and Virender Singh and Ludmila K. Babenko and Naghmeh Moradpoor Sheykhkanloo and Behnam Rahnama}, title = {Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud}, booktitle = {Proceedings of the 10th International Conference on Security of Information and Networks, {SIN} 2017, Jaipur, IN, India, October 13-15, 2017}, pages = {194--199}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3136825.3136902}, doi = {10.1145/3136825.3136902}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SethiCBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TripathySBR16, author = {Bata Krishna Tripathy and Ananta Gopal Sethy and Padmalochan Bera and Mohammad Ashiqur Rahman}, title = {A Novel Secure and Efficient Policy Management Framework for Software Defined Network}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {423--430}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.31}, doi = {10.1109/COMPSAC.2016.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TripathySBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/TripathyBR16, author = {Bata Krishna Tripathy and Padmalochan Bera and Mohammad Ashiqur Rahman}, title = {Analysis of trust models in Mobile Ad Hoc Networks: {A} simulation based study}, booktitle = {8th International Conference on Communication Systems and Networks, {COMSNETS} 2016, Bangalore, India, January 5-10, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/COMSNETS.2016.7440007}, doi = {10.1109/COMSNETS.2016.7440007}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/TripathyBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/MaityBGA15, author = {Soumya Maity and Padmalochan Bera and S. K. Ghosh and Ehab Al{-}Shaer}, title = {Formal integrated network security analysis tool: formal query-based network security configuration analysis}, journal = {{IET} Networks}, volume = {4}, number = {2}, pages = {137--147}, year = {2015}, url = {https://doi.org/10.1049/iet-net.2013.0090}, doi = {10.1049/IET-NET.2013.0090}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/MaityBGA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/MajhiB15, author = {Santosh Kumar Majhi and Padmalochan Bera}, editor = {Ehab Al{-}Shaer and Christopher S. Oehmen and Mohammad Ashiqur Rahman}, title = {A Security Enforcement Framework for Virtual Machine Migration Auction}, booktitle = {Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015}, pages = {47--53}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2809826.2809829}, doi = {10.1145/2809826.2809829}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/MajhiB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MajhiB14, author = {Santosh Kumar Majhi and Padmalochan Bera}, title = {{OHMF:} {A} Query Based Optimal Healthcare Medication Framework}, journal = {CoRR}, volume = {abs/1410.5815}, year = {2014}, url = {http://arxiv.org/abs/1410.5815}, eprinttype = {arXiv}, eprint = {1410.5815}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MajhiB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/RahmanAB13, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer and Padmalochan Bera}, title = {A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid}, journal = {{IEEE} Trans. Smart Grid}, volume = {4}, number = {1}, pages = {273--287}, year = {2013}, url = {https://doi.org/10.1109/TSG.2012.2228283}, doi = {10.1109/TSG.2012.2228283}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/RahmanAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/BeraG13, author = {Padmalochan Bera and Soumya Kanti Ghosh}, title = {A Query Driven Security Testing Framework for Enterprise Network}, booktitle = {Sixth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013}, pages = {476--483}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICSTW.2013.62}, doi = {10.1109/ICSTW.2013.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/BeraG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/RahmanBA12, author = {Mohammad Ashiqur Rahman and Padmalochan Bera and Ehab Al{-}Shaer}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {SmartAnalyzer: {A} noninvasive security threat analyzer for {AMI} smart grid}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2255--2263}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195611}, doi = {10.1109/INFCOM.2012.6195611}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/RahmanBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ised/MaityBG12, author = {Soumya Maity and Padmalochan Bera and S. K. Ghosh}, title = {Policy Based {ACL} Configuration Synthesis in Enterprise Networks: {A} Formal Approach}, booktitle = {International Symposium on Electronic System Design, ISEDs 2012, Kolkata, India, December 19-22, 2012}, pages = {314--318}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISED.2012.72}, doi = {10.1109/ISED.2012.72}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ised/MaityBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BeraGD11, author = {Padmalochan Bera and Soumya Kanti Ghosh and Pallab Dasgupta}, title = {A {WLAN} security management framework based on formal spatio-temporal {RBAC} model}, journal = {Secur. Commun. Networks}, volume = {4}, number = {9}, pages = {981--993}, year = {2011}, url = {https://doi.org/10.1002/sec.232}, doi = {10.1002/SEC.232}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BeraGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Al-HajBA11, author = {Saeed Al{-}Haj and Padmalochan Bera and Ehab Al{-}Shaer}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Build and Test Your Own Network Configuration}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {522--532}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_33}, doi = {10.1007/978-3-642-31909-9\_33}, timestamp = {Mon, 24 Jun 2024 20:34:51 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Al-HajBA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BeraGD10, author = {Padmalochan Bera and Santosh K. Ghosh and Pallab Dasgupta}, title = {Integrated security analysis framework for an enterprise network - a formal approach}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {283--300}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0174}, doi = {10.1049/IET-IFS.2009.0174}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BeraGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/BeraGD10, author = {Padmalochan Bera and Soumya Kanti Ghosh and Pallab Dasgupta}, title = {Policy Based Security Analysis in Enterprise Networks: {A} Formal Approach}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {7}, number = {4}, pages = {231--243}, year = {2010}, url = {https://doi.org/10.1109/TNSM.2010.1012.0365}, doi = {10.1109/TNSM.2010.1012.0365}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/BeraGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/BeraMGD10, author = {Padmalochan Bera and Soumya Maity and Soumya Kanti Ghosh and Pallab Dasgupta}, title = {A Query based Formal Security Analysis Framework for Enterprise {LAN}}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {407--414}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.96}, doi = {10.1109/CIT.2010.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/BeraMGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/BeraMGD10, author = {Padmalochan Bera and Soumya Maity and Soumya Kanti Ghosh and Pallab Dasgupta}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A {SAT} Based Verification Framework for Wireless {LAN} Security Policy Management Supported by {STRBAC} Model}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {232--241}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_24}, doi = {10.1007/978-3-642-14478-3\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/BeraMGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icistm/BeraGD10, author = {Padmalochan Bera and Soumya Kanti Ghosh and Pallab Dasgupta}, editor = {Sushil K. Prasad and Harrick M. Vin and Sartaj Sahni and Mahadeo Jaiswal and Bundit Thipakorn}, title = {A Spatio-Temporal Role-Based Access Control Model for Wireless {LAN} Security Policy Management}, booktitle = {Information Systems, Technology and Management - 4th International Conference, {ICISTM} 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {54}, pages = {76--88}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12035-0\_9}, doi = {10.1007/978-3-642-12035-0\_9}, timestamp = {Fri, 02 Nov 2018 09:44:37 +0100}, biburl = {https://dblp.org/rec/conf/icistm/BeraGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/BeraMG10, author = {Padmalochan Bera and Soumya Maity and Soumya Kanti Ghosh}, editor = {Tony Sager and Gail{-}Joon Ahn and Krishna Kant and Heather Richter Lipford}, title = {Generating policy based security implementation in enterprise network: a formal framework}, booktitle = {3rd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010}, pages = {1--8}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866898.1866900}, doi = {10.1145/1866898.1866900}, timestamp = {Thu, 13 Feb 2020 15:16:46 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/BeraMG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MaityBG10, author = {Soumya Maity and Padmalochan Bera and Soumya Kanti Ghosh}, editor = {Oleg B. Makarevich and Atilla El{\c{c}}i and Mehmet A. Orgun and Sorin A. Huss and Ludmila K. Babenko and Alexander G. Chefranov and Vijay Varadharajan}, title = {A mobile {IP} based {WLAN} security management framework with reconfigurable hardware acceleration}, booktitle = {Proceedings of the 3rd International Conference on Security of Information and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010}, pages = {218--223}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854099.1854143}, doi = {10.1145/1854099.1854143}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MaityBG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BeraGD09, author = {Padmalochan Bera and Soumya Kanti Ghosh and Pallab Dasgupta}, editor = {Atul Prakash and Indranil Gupta}, title = {Formal Verification of Security Policy Implementations in Enterprise Networks}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {117--131}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_10}, doi = {10.1007/978-3-642-10772-6\_10}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BeraGD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netcom/BeraGD09, author = {Padmalochan Bera and Soumya Kanti Ghosh and Pallab Dasgupta}, title = {Fault Analysis of Security Policy Implementations in Enterprise Networks}, booktitle = {First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009}, pages = {240--245}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NetCoM.2009.82}, doi = {10.1109/NETCOM.2009.82}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netcom/BeraGD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.