Publications
- article17th International Conference on COMmunication Systems and NETworks (COMSNETS)
Leveraging Benford’s Law for Effective Intrusion Detection in MQTT-IoT Networks
Monali SwainCharugundla Lakshmi NishithaManjula MagantiKamalakanta SethiNikhil TripathiBenford’s Law and Fraud DetectionStatistics and ProbabilityJanuary 20250 citationsIEEE Explore - book chapterSpringer proceedings in complexity
Design of Pairing Free Attribute-Based Encryption for Smart Grid Applications
Anjali KumariSreevallabh KaranamSwejan AnnabathiniKamalakanta SethiSmart grids are integrated systems utilizing lightweight and intelligent device to monitor, manage, and optimize the production, distribution, and con...
Cryptography and Data SecurityInternet Traffic Analysis and Secure E-votingCryptographic Implementations and SecurityArtificial IntelligenceArtificial IntelligenceArtificial IntelligenceJanuary 20250 citationsSpringer International Publishing - articleJournal of Information Security and Applications
Federated reinforcement learning based intrusion detection system using dynamic attention mechanism
Sreekanth VadigiKamalakanta SethiDinesh MohantyShom Prasad DasPadmalochan BeraNetwork Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial IntelligenceSeptember 20238 citationsElsevier BV - book chapterLecture notes in computer science
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology
Kamalakanta SethiAniket AgrawalPadmalochan BeraBlockchain Technology Applications and SecurityIoT and Edge/Fog ComputingSmart Grid Security and ResilienceInformation SystemsComputer Networks and CommunicationsControl and Systems EngineeringJanuary 20230 citationsSpringer Science+Business Media - book chapterSpringer proceedings in complexity
Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption
Aniket AgrawalKamalakanta SethiPadmalochan BeraAdvanced Steganography and Watermarking TechniquesInternet Traffic Analysis and Secure E-votingCryptography and Data SecurityComputer Vision and Pattern RecognitionArtificial IntelligenceArtificial IntelligenceJanuary 20230 citationsSpringer International Publishing - articleIEEE Access
Analysis of Continual Learning Models for Intrusion Detection System
Sai PrasathKamalakanta SethiDinesh MohantyPadmalochan BeraSubhransu Ranjan Samantaray2017 Deep Learning based Intrusion Detection Systems (IDSs) have received significant attention from the research community for their capability to ha...
Network Security and Intrusion DetectionAnomaly Detection Techniques and ApplicationsDomain Adaptation and Few-Shot LearningComputer Networks and CommunicationsArtificial IntelligenceArtificial IntelligenceJanuary 202217 citationsInstitute of Electrical and Electronics Engineers - articleIEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
Inviolable e-Question paper via QR code Watermarking and Visual Cryptography
Aniket AgrawalKamalakanta SethiPadmalochan Bera1 Recurrent allegations of electronic question paper (e-QP) leakage and examination malpractices in educational institutions can be handled by the cou...
Advanced Steganography and Watermarking TechniquesQR Code Applications and TechnologiesChaos-based Image/Signal EncryptionComputer Vision and Pattern RecognitionInformation SystemsDecember 20211 citationsIEEE Xplore - article IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
IoT-Based Aggregate Smart Grid Energy Data Extraction using Image Recognition and Partial Homomorphic Encryption
Aniket AgrawalKamalakanta SethiPadmalochan Bera0 The high expense of upgrading traditional analog and digital smart grid meters with network sensor devices is a major implementation cost for collec...
Cryptography and Data SecurityCryptographic Implementations and SecurityChaos-based Image/Signal EncryptionArtificial IntelligenceArtificial IntelligenceComputer Vision and Pattern RecognitionDecember 20214 citationsIEEE Xplore - articleJournal of Information Security and Applications
Attention based multi-agent intrusion detection systems using reinforcement learning
Kamalakanta SethiY. Venu MadhavRahul KumarPadmalochan BeraNetwork Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial IntelligenceJuly 202166 citationsElsevier BV - articleInternational Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Intelligent Intrusion Detection System for Smart Grid Applications
Dinesh MohantyKamalakanta SethiSai PrasathRashmi Ranjan RoutPadmalochan BeraSmart grid is a cyber-physical system that enhances the capability of conventional power networks leveraging functional automation information and com...
Network Security and Intrusion DetectionSmart Grid Security and ResilienceAdvanced Malware Detection TechniquesComputer Networks and CommunicationsControl and Systems EngineeringSignal ProcessingJune 20213 citationsIEEE Xplore - articleCluster Computing
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
Kamalakanta SethiAnkit PradhanPadmalochan BeraCryptography and Data SecurityComplexity and Algorithms in GraphsPrivacy-Preserving Technologies in DataArtificial IntelligenceComputational Theory and MathematicsArtificial IntelligenceJanuary 202137 citationsSpringer Science+Business Media - article2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)
Machine Learning based Malware Detection in Cloud Environment using Clustering Approach
Rahul KumarKamalakanta SethiNishant PrajapatiRashmi Ranjan RoutPadmalochan BeraEnforcing security and resilience in a cloud platform is an essential but challenging problem due to the presence of large number heterogeneous applic...
Advanced Malware Detection TechniquesNetwork Security and Intrusion DetectionVideo Surveillance and Tracking MethodsSignal ProcessingComputer Networks and CommunicationsComputer Vision and Pattern RecognitionJuly 202023 citationsIEEE Explore - articleInternational Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption
Ankit PradhanR. Punith.Kamalakanta SethiPadmalochan BeraSmart grid consists of multiple different entities related to various energy management systems which share fine-grained measurements among themselves...
Cryptography and Data SecurityPrivacy-Preserving Technologies in DataBlockchain Technology Applications and SecurityArtificial IntelligenceArtificial IntelligenceInformation SystemsJune 20202 citationsIEEE Explore - articleJournal of Information Security and Applications
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
Kamalakanta SethiAnkit PradhanPadmalochan BeraCryptography and Data SecurityComplexity and Algorithms in GraphsPrivacy-Preserving Technologies in DataArtificial IntelligenceComputational Theory and MathematicsArtificial IntelligenceJanuary 202051 citationsElsevier BV - articleInternational Conference on COMmunication Systems & NETworkS (COMSNETS)
A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference
Kamalakanta SethiRahul KumarNishant PrajapatiPadmalochan BeraIn today's world, the integration of various computing devices and embedded systems is creating a giant network that popularly termed as internet thin...
Benford’s Law and Fraud DetectionAnomaly Detection Techniques and ApplicationsDigital Media Forensic DetectionStatistics and ProbabilityArtificial IntelligenceComputer Vision and Pattern RecognitionJanuary 20204 citationsIEEE Explore - articleInternational Conference on COMmunication Systems & NETworkS (COMSNETS)
Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure
Kamalakanta SethiRahul KumarNishant PrajapatiPadmalochan BeraIntrusion Detection in cloud platform is a challenging problem due to its extensive usage and distributed nature that are constant targets of new unkn...
Network Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial IntelligenceJanuary 202057 citationsIEEE Explore - articleInternational Conference on COMmunication Systems & NETworkS (COMSNETS)
Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications
Kamalakanta SethiAnkit PradhanPadmalochan BeraSmart grid employs intelligent transmission and distribution networks for effective reliable delivery of electricity. It uses fine-grained electrical ...
Cryptography and Data SecuritySmart Grid Security and ResilienceSecurity and Verification in ComputingArtificial IntelligenceControl and Systems EngineeringArtificial IntelligenceJanuary 20201 citationsIEEE Explore - book chapterLecture notes in computer science
Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement Learning
Kamalakanta SethiRahul KumarDinesh MohantyPadmalochan BeraNetwork Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial IntelligenceJanuary 202014 citationsSpringer Science+Business Media - articleInternational Journal of Information Security
A context-aware robust intrusion detection system: a reinforcement learning-based approach
Kamalakanta SethiE. Sai RupeshRahul KumarPadmalochan BeraY. Venu MadhavNetwork Security and Intrusion DetectionAdvanced Malware Detection TechniquesInternet Traffic Analysis and Secure E-votingComputer Networks and CommunicationsSignal ProcessingArtificial IntelligenceDecember 2019106 citationsSpringer Science+Business Media - articleInternational Conference on Cyber Security and Protection of Digital Services (Cyber Security)
A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud
Kamalakanta SethiAnkit PradhanR. Punith.Padmalochan BeraToday a large volume of data is stored in cloud that requires fine grained accessibility for heterogeneous users. Cipher-text policy attribute based e...
Cryptography and Data SecurityComplexity and Algorithms in GraphsPrivacy-Preserving Technologies in DataArtificial IntelligenceComputational Theory and MathematicsArtificial IntelligenceJune 20193 citationsIEEE Explore - articleInternational Conference on Cyber Security and Protection of Digital Services (Cyber Security)
A Novel Machine Learning Based Malware Detection and Classification Framework
Kamalakanta SethiRahul KumarLingaraj SethiPadmalochan BeraPrashanta Kumar PatraAs time progresses, new and complex malware types are being generated which causes a serious threat to computer systems. Due this drastic increase in ...
Advanced Malware Detection TechniquesNetwork Security and Intrusion DetectionAnomaly Detection Techniques and ApplicationsSignal ProcessingComputer Networks and CommunicationsArtificial IntelligenceJune 201957 citationsIEEE Explore - book chapterLecture notes in computer science
Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
Ankit PradhanKamalakanta SethiShrohan MohapatraPadmalochan BeraCellular Automata and ApplicationsCryptography and Data SecurityCoding theory and cryptographyComputational Theory and MathematicsArtificial IntelligenceArtificial IntelligenceJanuary 20190 citationsSpringer Science+Business Media - articleProceedings of the 19th International Conference on Distributed Computing and Networking
A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach
Kamalakanta SethiShankar Kumar ChaudharyBata Krishan TripathyPadmalochan BeraNowadays, the digitization of world is under a serious threat due to emergence various new and complex malware every day. Due this, traditional signat...
Advanced Malware Detection TechniquesDigital and Cyber ForensicsNetwork Security and Intrusion DetectionSignal ProcessingInformation SystemsComputer Networks and CommunicationsJanuary 201837 citationsACM Digital Library - articleProceedings of the 10th International Conference on Security of Information and Networks
Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud
Kamalakanta SethiAnish ChopraPadmalochan BeraBata Krishna TripathyRecent advances in cloud technology facilitates data owners having limited resources to outsource their and computations remote servers Cloud. To prot...
Cryptography and Data SecurityPrivacy-Preserving Technologies in DataCloud Data Security SolutionsArtificial IntelligenceInformation SystemsOctober 20176 citationsACM Digital Library - articleProceedings of the 10th International Conference on Security of Information and Networks
A novel malware analysis for malware detection and classification using machine learning algorithms
Kamalakanta SethiShankar Kumar ChaudharyBata Krishan TripathyPadmalochan BeraNowadays, Malware has become a serious threat to the digitization of world due emergence various new and complex malware every day. Due this, traditio...
Advanced Malware Detection TechniquesNetwork Security and Intrusion DetectionAnomaly Detection Techniques and ApplicationsSignal ProcessingComputer Networks and CommunicationsArtificial IntelligenceOctober 201722 citationsACM Digital Library - articleInternational Conference on Cyber Security And Protection Of Digital Services (Cyber Security)
A novel implementation of parallel homomorphic encryption for secure data storage in cloud
Kamalakanta SethiAmartya MajumdarPadmalochan BeraDue to the digitization of data in large scale and varying requirements organizations serve different stakeholders, there is a need compute, store ana...
Cryptography and Data SecurityComplexity and Algorithms in GraphsCryptography and Residue ArithmeticArtificial IntelligenceComputational Theory and MathematicsInformation SystemsJune 20179 citationsIEEE Explore