Publications

  • article17th International Conference on COMmunication Systems and NETworks (COMSNETS)

    Leveraging Benford’s Law for Effective Intrusion Detection in MQTT-IoT Networks

    Monali SwainCharugundla Lakshmi NishithaManjula MagantiKamalakanta SethiNikhil Tripathi
    Benford’s Law and Fraud DetectionStatistics and Probability
    January 2025
    0 citations
    IEEE Explore
  • book chapterSpringer proceedings in complexity

    Design of Pairing Free Attribute-Based Encryption for Smart Grid Applications

    Anjali KumariSreevallabh KaranamSwejan AnnabathiniKamalakanta Sethi

    Smart grids are integrated systems utilizing lightweight and intelligent device to monitor, manage, and optimize the production, distribution, and con...

    Cryptography and Data SecurityInternet Traffic Analysis and Secure E-votingCryptographic Implementations and SecurityArtificial IntelligenceArtificial IntelligenceArtificial Intelligence
    January 2025
    0 citations
    Springer International Publishing
  • articleJournal of Information Security and Applications

    Federated reinforcement learning based intrusion detection system using dynamic attention mechanism

    Sreekanth VadigiKamalakanta SethiDinesh MohantyShom Prasad DasPadmalochan Bera
    Network Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial Intelligence
    September 2023
    8 citations
    Elsevier BV
  • book chapterLecture notes in computer science

    Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology

    Kamalakanta SethiAniket AgrawalPadmalochan Bera
    Blockchain Technology Applications and SecurityIoT and Edge/Fog ComputingSmart Grid Security and ResilienceInformation SystemsComputer Networks and CommunicationsControl and Systems Engineering
    January 2023
    0 citations
    Springer Science+Business Media
  • book chapterSpringer proceedings in complexity

    Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption

    Aniket AgrawalKamalakanta SethiPadmalochan Bera
    Advanced Steganography and Watermarking TechniquesInternet Traffic Analysis and Secure E-votingCryptography and Data SecurityComputer Vision and Pattern RecognitionArtificial IntelligenceArtificial Intelligence
    January 2023
    0 citations
    Springer International Publishing
  • articleIEEE Access

    Analysis of Continual Learning Models for Intrusion Detection System

    Sai PrasathKamalakanta SethiDinesh MohantyPadmalochan BeraSubhransu Ranjan Samantaray

    2017 Deep Learning based Intrusion Detection Systems (IDSs) have received significant attention from the research community for their capability to ha...

    Network Security and Intrusion DetectionAnomaly Detection Techniques and ApplicationsDomain Adaptation and Few-Shot LearningComputer Networks and CommunicationsArtificial IntelligenceArtificial Intelligence
    January 2022
    17 citations
    Institute of Electrical and Electronics Engineers
  • articleIEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)

    Inviolable e-Question paper via QR code Watermarking and Visual Cryptography

    Aniket AgrawalKamalakanta SethiPadmalochan Bera

    1 Recurrent allegations of electronic question paper (e-QP) leakage and examination malpractices in educational institutions can be handled by the cou...

    Advanced Steganography and Watermarking TechniquesQR Code Applications and TechnologiesChaos-based Image/Signal EncryptionComputer Vision and Pattern RecognitionInformation Systems
    December 2021
    1 citations
    IEEE Xplore
  • article IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)

    IoT-Based Aggregate Smart Grid Energy Data Extraction using Image Recognition and Partial Homomorphic Encryption

    Aniket AgrawalKamalakanta SethiPadmalochan Bera

    0 The high expense of upgrading traditional analog and digital smart grid meters with network sensor devices is a major implementation cost for collec...

    Cryptography and Data SecurityCryptographic Implementations and SecurityChaos-based Image/Signal EncryptionArtificial IntelligenceArtificial IntelligenceComputer Vision and Pattern Recognition
    December 2021
    4 citations
    IEEE Xplore
  • articleJournal of Information Security and Applications

    Attention based multi-agent intrusion detection systems using reinforcement learning

    Kamalakanta SethiY. Venu MadhavRahul KumarPadmalochan Bera
    Network Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial Intelligence
    July 2021
    66 citations
    Elsevier BV
  • articleInternational Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)

    Intelligent Intrusion Detection System for Smart Grid Applications

    Dinesh MohantyKamalakanta SethiSai PrasathRashmi Ranjan RoutPadmalochan Bera

    Smart grid is a cyber-physical system that enhances the capability of conventional power networks leveraging functional automation information and com...

    Network Security and Intrusion DetectionSmart Grid Security and ResilienceAdvanced Malware Detection TechniquesComputer Networks and CommunicationsControl and Systems EngineeringSignal Processing
    June 2021
    3 citations
    IEEE Xplore
  • articleCluster Computing

    PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems

    Kamalakanta SethiAnkit PradhanPadmalochan Bera
    Cryptography and Data SecurityComplexity and Algorithms in GraphsPrivacy-Preserving Technologies in DataArtificial IntelligenceComputational Theory and MathematicsArtificial Intelligence
    January 2021
    37 citations
    Springer Science+Business Media
  • article2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)

    Machine Learning based Malware Detection in Cloud Environment using Clustering Approach

    Rahul KumarKamalakanta SethiNishant PrajapatiRashmi Ranjan RoutPadmalochan Bera

    Enforcing security and resilience in a cloud platform is an essential but challenging problem due to the presence of large number heterogeneous applic...

    Advanced Malware Detection TechniquesNetwork Security and Intrusion DetectionVideo Surveillance and Tracking MethodsSignal ProcessingComputer Networks and CommunicationsComputer Vision and Pattern Recognition
    July 2020
    23 citations
    IEEE Explore
  • articleInternational Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)

    Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption

    Ankit PradhanR. Punith.Kamalakanta SethiPadmalochan Bera

    Smart grid consists of multiple different entities related to various energy management systems which share fine-grained measurements among themselves...

    Cryptography and Data SecurityPrivacy-Preserving Technologies in DataBlockchain Technology Applications and SecurityArtificial IntelligenceArtificial IntelligenceInformation Systems
    June 2020
    2 citations
    IEEE Explore
  • articleJournal of Information Security and Applications

    Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation

    Kamalakanta SethiAnkit PradhanPadmalochan Bera
    Cryptography and Data SecurityComplexity and Algorithms in GraphsPrivacy-Preserving Technologies in DataArtificial IntelligenceComputational Theory and MathematicsArtificial Intelligence
    January 2020
    51 citations
    Elsevier BV
  • articleInternational Conference on COMmunication Systems & NETworkS (COMSNETS)

    A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference

    Kamalakanta SethiRahul KumarNishant PrajapatiPadmalochan Bera

    In today's world, the integration of various computing devices and embedded systems is creating a giant network that popularly termed as internet thin...

    Benford’s Law and Fraud DetectionAnomaly Detection Techniques and ApplicationsDigital Media Forensic DetectionStatistics and ProbabilityArtificial IntelligenceComputer Vision and Pattern Recognition
    January 2020
    4 citations
    IEEE Explore
  • articleInternational Conference on COMmunication Systems & NETworkS (COMSNETS)

    Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure

    Kamalakanta SethiRahul KumarNishant PrajapatiPadmalochan Bera

    Intrusion Detection in cloud platform is a challenging problem due to its extensive usage and distributed nature that are constant targets of new unkn...

    Network Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial Intelligence
    January 2020
    57 citations
    IEEE Explore
  • articleInternational Conference on COMmunication Systems & NETworkS (COMSNETS)

    Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications

    Kamalakanta SethiAnkit PradhanPadmalochan Bera

    Smart grid employs intelligent transmission and distribution networks for effective reliable delivery of electricity. It uses fine-grained electrical ...

    Cryptography and Data SecuritySmart Grid Security and ResilienceSecurity and Verification in ComputingArtificial IntelligenceControl and Systems EngineeringArtificial Intelligence
    January 2020
    1 citations
    IEEE Explore
  • book chapterLecture notes in computer science

    Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement Learning

    Kamalakanta SethiRahul KumarDinesh MohantyPadmalochan Bera
    Network Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial Intelligence
    January 2020
    14 citations
    Springer Science+Business Media
  • articleInternational Journal of Information Security

    A context-aware robust intrusion detection system: a reinforcement learning-based approach

    Kamalakanta SethiE. Sai RupeshRahul KumarPadmalochan BeraY. Venu Madhav
    Network Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial Intelligence
    December 2019
    106 citations
    Springer Science+Business Media
  • articleInternational Conference on Cyber Security and Protection of Digital Services (Cyber Security)

    A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud

    Kamalakanta SethiAnkit PradhanR. Punith.Padmalochan Bera

    Today a large volume of data is stored in cloud that requires fine grained accessibility for heterogeneous users. Cipher-text policy attribute based e...

    Cryptography and Data SecurityComplexity and Algorithms in GraphsPrivacy-Preserving Technologies in DataArtificial IntelligenceComputational Theory and MathematicsArtificial Intelligence
    June 2019
    3 citations
    IEEE Explore
  • articleInternational Conference on Cyber Security and Protection of Digital Services (Cyber Security)

    A Novel Machine Learning Based Malware Detection and Classification Framework

    Kamalakanta SethiRahul KumarLingaraj SethiPadmalochan BeraPrashanta Kumar Patra

    As time progresses, new and complex malware types are being generated which causes a serious threat to computer systems. Due this drastic increase in ...

    Advanced Malware Detection TechniquesNetwork Security and Intrusion DetectionAnomaly Detection Techniques and ApplicationsSignal ProcessingComputer Networks and CommunicationsArtificial Intelligence
    June 2019
    57 citations
    IEEE Explore
  • book chapterLecture notes in computer science

    Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata

    Ankit PradhanKamalakanta SethiShrohan MohapatraPadmalochan Bera
    Cellular Automata and ApplicationsCryptography and Data SecurityCoding theory and cryptographyComputational Theory and MathematicsArtificial IntelligenceArtificial Intelligence
    January 2019
    0 citations
    Springer Science+Business Media
  • articleProceedings of the 19th International Conference on Distributed Computing and Networking

    A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach

    Kamalakanta SethiShankar Kumar ChaudharyBata Krishan TripathyPadmalochan Bera

    Nowadays, the digitization of world is under a serious threat due to emergence various new and complex malware every day. Due this, traditional signat...

    Advanced Malware Detection TechniquesDigital and Cyber ForensicsNetwork Security and Intrusion DetectionSignal ProcessingInformation SystemsComputer Networks and Communications
    January 2018
    37 citations
    ACM Digital Library
  • articleProceedings of the 10th International Conference on Security of Information and Networks

    Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud

    Kamalakanta SethiAnish ChopraPadmalochan BeraBata Krishna Tripathy

    Recent advances in cloud technology facilitates data owners having limited resources to outsource their and computations remote servers Cloud. To prot...

    Cryptography and Data SecurityPrivacy-Preserving Technologies in DataCloud Data Security SolutionsArtificial IntelligenceInformation Systems
    October 2017
    6 citations
    ACM Digital Library
  • articleProceedings of the 10th International Conference on Security of Information and Networks

    A novel malware analysis for malware detection and classification using machine learning algorithms

    Kamalakanta SethiShankar Kumar ChaudharyBata Krishan TripathyPadmalochan Bera

    Nowadays, Malware has become a serious threat to the digitization of world due emergence various new and complex malware every day. Due this, traditio...

    Advanced Malware Detection TechniquesNetwork Security and Intrusion DetectionAnomaly Detection Techniques and ApplicationsSignal ProcessingComputer Networks and CommunicationsArtificial Intelligence
    October 2017
    22 citations
    ACM Digital Library
  • articleInternational Conference on Cyber Security And Protection Of Digital Services (Cyber Security)

    A novel implementation of parallel homomorphic encryption for secure data storage in cloud

    Kamalakanta SethiAmartya MajumdarPadmalochan Bera

    Due to the digitization of data in large scale and varying requirements organizations serve different stakeholders, there is a need compute, store ana...

    Cryptography and Data SecurityComplexity and Algorithms in GraphsCryptography and Residue ArithmeticArtificial IntelligenceComputational Theory and MathematicsInformation Systems
    June 2017
    9 citations
    IEEE Explore