A context-aware robust intrusion detection system: a reinforcement learning-based approach K Sethi, E Sai Rupesh, R Kumar, P Bera, Y Venu Madhav International Journal of Information Security 19, 657-678, 2020 | 138 | 2020 |
Attention based multi-agent intrusion detection systems using reinforcement learning K Sethi, YV Madhav, R Kumar, P Bera Journal of Information Security and Applications 61, 102923, 2021 | 104 | 2021 |
Software defined networking architecture, traffic management, security, and placement: A survey M Priyadarsini, P Bera Computer Networks 192, 108047, 2021 | 95 | 2021 |
Deep reinforcement learning based intrusion detection system for cloud infrastructure K Sethi, R Kumar, N Prajapati, P Bera 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS …, 2020 | 84 | 2020 |
A novel machine learning based malware detection and classification framework K Sethi, R Kumar, L Sethi, P Bera, PK Patra 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 76 | 2019 |
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation K Sethi, A Pradhan, P Bera Journal of Information Security and applications 51, 102435, 2020 | 64 | 2020 |
A noninvasive threat analyzer for advanced metering infrastructure in smart grid MA Rahman, E Al-Shaer, P Bera IEEE Transactions on Smart Grid 4 (1), 273-287, 2012 | 60 | 2012 |
Policy based security analysis in enterprise networks: A formal approach P Bera, SK Ghosh, P Dasgupta IEEE Transactions on Network and Service Management 7 (4), 231-243, 2010 | 48 | 2010 |
A novel malware analysis framework for malware detection and classification using machine learning approach K Sethi, SK Chaudhary, BK Tripathy, P Bera Proceedings of the 19th international conference on distributed computing …, 2018 | 46 | 2018 |
SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid MA Rahman, P Bera, E Al-Shaer 2012 Proceedings IEEE INFOCOM, 2255-2263, 2012 | 39 | 2012 |
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems K Sethi, A Pradhan, P Bera Cluster Computing 24, 1525-1550, 2021 | 35 | 2021 |
An adaptive secure and efficient routing protocol for mobile ad hoc networks BK Tripathy, SK Jena, P Bera, S Das Wireless Personal Communications 114 (2), 1339-1370, 2020 | 33 | 2020 |
An adaptive load balancing scheme for software-defined network controllers M Priyadarsini, JC Mukherjee, P Bera, S Kumar, AHM Jakaria, ... Computer Networks 164, 106918, 2019 | 32 | 2019 |
Machine learning based malware detection in cloud environment using clustering approach R Kumar, K Sethi, N Prajapati, RR Rout, P Bera 2020 11th International Conference on Computing, Communication and …, 2020 | 31 | 2020 |
A novel malware analysis for malware detection and classification using machine learning algorithms K Sethi, SK Chaudhary, BK Tripathy, P Bera Proceedings of the 10th International Conference on Security of Information …, 2017 | 25 | 2017 |
Analysis of continual learning models for intrusion detection system S Prasath, K Sethi, D Mohanty, P Bera, SR Samantaray IEEE Access 10, 121444-121464, 2022 | 23 | 2022 |
An energy-efficient load distribution framework for SDN controllers M Priyadarsini, S Kumar, P Bera, MA Rahman Computing 102 (9), 2073-2098, 2020 | 23 | 2020 |
Robust adaptive cloud intrusion detection system using advanced deep reinforcement learning K Sethi, R Kumar, D Mohanty, P Bera Security, Privacy, and Applied Cryptography Engineering: 10th International …, 2020 | 23 | 2020 |
Performance analysis of software defined network controller architecture—A simulation based survey M Priyadarsini, P Bera, R Bampal 2017 International Conference on Wireless Communications, Signal Processing …, 2017 | 20 | 2017 |
Formal verification of security policy implementations in enterprise networks P Bera, SK Ghosh, P Dasgupta Information Systems Security: 5th International Conference, ICISS 2009 …, 2009 | 20 | 2009 |