default search action
Padmalochan Bera
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c53]Mitali Sinha, Padmalochan Bera, Manoranjan Satpathy:
SYN-Monitor: An Energy Efficient Defense System against TCP-SYN Flooding Attacks in SDN. ICDCN 2025: 346-351 - [c52]Kasturi Routray, Padmalochan Bera:
Secure and Expressive Authorized Keyword Search in Cloud-Assisted Cyber-Physical Systems. ICDCN 2025: 390-395 - 2024
- [c51]Rojalini Tripathy, Padmalochan Bera:
A Cost-effective Framework for Privacy Preserving Federated Learning. ICDCN 2024: 298-303 - [c50]Kasturi Routray, Padmalochan Bera:
Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption. ICDCN 2024: 346-352 - [c49]Abhishek Uniyal, Bappaditya Mandal, Niladri B. Puhan, Padmalochan Bera:
Interpretative Attention Networks for Structural Component Recognition. ICPR (16) 2024: 63-77 - [c48]Kasturi Routray, Satyansh Shukla, Padmalochan Bera:
Multi-Client Searchable Encryption with Granular Access Control for Cloud-Assisted IoT. MobiCom 2024: 1620-1622 - [c47]Kasturi Routray, Padmalochan Bera:
Efficient and Secure Cloud Data Sharing Using CP-ABE Supporting Dynamic Attributes. MobiCom 2024: 2245-2247 - [c46]Kasturi Routray, Padmalochan Bera:
Lightweight and Decentralized Access Control for Cloud-Assisted Industrial Control Systems. RICSS@CCS 2024: 71-78 - [c45]Kasturi Routray, Padmalochan Bera:
Poster: Fine-Grained Access Control with Efficient Range Comparison for Outsourced Data. SIGCOMM (Posters and Demos) 2024: 72-74 - 2023
- [j17]Sreekanth Vadigi, Kamalakanta Sethi, Dinesh Mohanty, Shom Prasad Das, Padmalochan Bera:
Federated reinforcement learning based intrusion detection system using dynamic attention mechanism. J. Inf. Secur. Appl. 78: 103608 (2023) - [j16]Madhukrishna Priyadarsini, Padmalochan Bera, Sajal K. Das, Mohammad Ashiqur Rahman:
A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach. IEEE Trans. Dependable Secur. Comput. 20(2): 1500-1515 (2023) - [c44]Madhukrishna Priyadarsini, Pooja Mittal, Joy Chandra Mukherjee, Padmalochan Bera:
Budget-constrained Controller Placement in Software-defined Network. ICDCN 2023: 217-226 - [c43]Kamalakanta Sethi, Aniket Agrawal, Padmalochan Bera:
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology. ICISS 2023: 431-448 - [c42]Kasturi Routray, Padmalochan Bera:
Context-Aware Attribute Based Access Control for Cloud-based SCADA Systems. IIoT-NETs@SIGCOMM 2023: 35-40 - 2022
- [j15]Sai Prasath, Kamalakanta Sethi, Dinesh Mohanty, Padmalochan Bera, Subhransu Ranjan Samantaray:
Analysis of Continual Learning Models for Intrusion Detection System. IEEE Access 10: 121444-121464 (2022) - [c41]Kasturi Routray, Padmalochan Bera:
RLT-CPABE: Revocable Location and Time Aware Ciphertext Policy Attribute-Based Encryption. ANTS 2022: 409-414 - [c40]Aniket Agrawal, Kamalakanta Sethi, Padmalochan Bera:
Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption. Cyber Science 2022: 411-436 - [c39]Madhukrishna Priyadarsini, Padmalochan Bera:
An SDN Implemented Adaptive Load Balancing Scheme for Mobile Networks. ICDCIT 2022: 127-139 - 2021
- [j14]Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera:
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems. Clust. Comput. 24(2): 1525-1550 (2021) - [j13]Madhukrishna Priyadarsini, Padmalochan Bera:
Software defined networking architecture, traffic management, security, and placement: A survey. Comput. Networks 192: 108047 (2021) - [j12]Kamalakanta Sethi, Venu Madhav Yatam, Rahul Kumar, Padmalochan Bera:
Attention based multi-agent intrusion detection systems using reinforcement learning. J. Inf. Secur. Appl. 61: 102923 (2021) - [c38]Aniket Agrawal, Kamalakanta Sethi, Padmalochan Bera:
Inviolable e-Question paper via QR code Watermarking and Visual Cryptography. ANTS 2021: 266-271 - [c37]Aniket Agrawal, Kamalakanta Sethi, Padmalochan Bera:
IoT-Based Aggregate Smart Grid Energy Data Extraction using Image Recognition and Partial Homomorphic Encryption. ANTS 2021: 408-413 - [c36]Dinesh Mohanty, Kamalakanta Sethi, Sai Prasath, Rashmi Ranjan Rout, Padmalochan Bera:
Intelligent Intrusion Detection System for Smart Grid Applications. CyberSA 2021: 1-8 - [c35]Shobhit, Padmalochan Bera:
ModCGAN: A Multimodal Approach to Detect New Malware. CyberSA 2021: 1-2 - [c34]Mitali Sinha, Padmalochan Bera, Manoranjan Satpathy:
An Anomaly Free Distributed Firewall System for SDN. CyberSA 2021: 1-8 - 2020
- [j11]Madhukrishna Priyadarsini, Shailesh Kumar, Padmalochan Bera, Mohammad Ashiqur Rahman:
An energy-efficient load distribution framework for SDN controllers. Computing 102(9): 2073-2098 (2020) - [j10]Kamalakanta Sethi, E. Sai Rupesh, Rahul Kumar, Padmalochan Bera, Venu Madhav Yatam:
A context-aware robust intrusion detection system: a reinforcement learning-based approach. Int. J. Inf. Sec. 19(6): 657-678 (2020) - [j9]Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera:
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation. J. Inf. Secur. Appl. 51: 102435 (2020) - [j8]Bata Krishna Tripathy, Swagat Kumar Jena, Padmalochan Bera, Satyabrata Das:
An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks. Wirel. Pers. Commun. 114(2): 1339-1370 (2020) - [c33]Kamalakanta Sethi, Rahul Kumar, Nishant Prajapati, Padmalochan Bera:
A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference. COMSNETS 2020: 1-6 - [c32]Kamalakanta Sethi, Rahul Kumar, Nishant Prajapati, Padmalochan Bera:
Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure. COMSNETS 2020: 1-6 - [c31]Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera:
Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications. COMSNETS 2020: 503-506 - [c30]Madhukrishna Priyadarsini, Pooja Mittal, Padmalochan Bera:
Smart City Renovation using SDN Framework. COMSNETS 2020: 794-799 - [c29]Ankit Pradhan, R. Punith, Kamalakanta Sethi, Padmalochan Bera:
Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption. CyberSA 2020: 1-8 - [c28]Ankit Pradhan, Venu Madhav Yatam, Padmalochan Bera:
Self-Attention for Cyberbullying Detection. CyberSA 2020: 1-6 - [c27]Rahul Kumar, Kamalakanta Sethi, Nishant Prajapati, Rashmi Ranjan Rout, Padmalochan Bera:
Machine Learning based Malware Detection in Cloud Environment using Clustering Approach. ICCCNT 2020: 1-7 - [c26]Kamalakanta Sethi, Rahul Kumar, Dinesh Mohanty, Padmalochan Bera:
Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement Learning. SPACE 2020: 66-85
2010 – 2019
- 2019
- [j7]Madhukrishna Priyadarsini, Joy Chandra Mukherjee, Padmalochan Bera, Shailesh Kumar, A. H. M. Jakaria, Mohammad Ashiqur Rahman:
An adaptive load balancing scheme for software-defined network controllers. Comput. Networks 164 (2019) - [c25]Ankit Pradhan, Kamalakanta Sethi, Shrohan Mohapatra, Padmalochan Bera:
Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata. CANS 2019: 434-456 - [c24]Kamalakanta Sethi, Rahul Kumar, Lingaraj Sethi, Padmalochan Bera, Prashanta Kumar Patra:
A Novel Machine Learning Based Malware Detection and Classification Framework. Cyber Security 2019: 1-4 - [c23]Kamalakanta Sethi, Ankit Pradhan, R. Punith, Padmalochan Bera:
A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud. Cyber Security 2019: 1-8 - [c22]Madhukrishna Priyadarsini, Padmalochan Bera, Mohammad Ashiqur Rahman:
A Signalling Game-Based Security Enforcement Mechanism for SDN Controllers. ICCCNT 2019: 1-7 - 2018
- [j6]Bata Krishna Tripathy, Debi Prasad Das, Swagat Kumar Jena, Padmalochan Bera:
Risk based Security Enforcement in Software Defined Network. Comput. Secur. 78: 321-335 (2018) - [c21]Madhukrishna Priyadarsini, Padmalochan Bera:
A New Approach for SDN Performance Enhancement. CN 2018: 115-129 - [c20]Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera:
A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach. ICDCN 2018: 49:1-49:4 - [c19]Madhukrishna Priyadarsini, Padmalochan Bera, Mohammad Ashiqur Rahman:
A new approach for energy efficiency in software defined network. SDS 2018: 67-73 - 2017
- [c18]Bata Krishna Tripathy, Ashray Sudhir, Padmalochan Bera, Mohammad Ashiqur Rahman:
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network. COMPSAC (1) 2017: 548-556 - [c17]Kamalakanta Sethi, Amartya Majumdar, Padmalochan Bera:
A novel implementation of parallel homomorphic encryption for secure data storage in cloud. Cyber Security 2017: 1-7 - [c16]Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera:
A novel malware analysis for malware detection and classification using machine learning algorithms. SIN 2017: 107-113 - [c15]Kamalakanta Sethi, Anish Chopra, Padmalochan Bera, Bata Krishna Tripathy:
Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud. SIN 2017: 194-199 - 2016
- [c14]Bata Krishna Tripathy, Ananta Gopal Sethy, Padmalochan Bera, Mohammad Ashiqur Rahman:
A Novel Secure and Efficient Policy Management Framework for Software Defined Network. COMPSAC Workshops 2016: 423-430 - [c13]Bata Krishna Tripathy, Padmalochan Bera, Mohammad Ashiqur Rahman:
Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study. COMSNETS 2016: 1-8 - 2015
- [j5]Soumya Maity, Padmalochan Bera, S. K. Ghosh, Ehab Al-Shaer:
Formal integrated network security analysis tool: formal query-based network security configuration analysis. IET Networks 4(2): 137-147 (2015) - [c12]Santosh Kumar Majhi, Padmalochan Bera:
A Security Enforcement Framework for Virtual Machine Migration Auction. SafeConfig@CCS 2015: 47-53 - 2014
- [i1]Santosh Kumar Majhi, Padmalochan Bera:
OHMF: A Query Based Optimal Healthcare Medication Framework. CoRR abs/1410.5815 (2014) - 2013
- [j4]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Padmalochan Bera:
A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid. IEEE Trans. Smart Grid 4(1): 273-287 (2013) - [c11]Padmalochan Bera, Soumya Kanti Ghosh:
A Query Driven Security Testing Framework for Enterprise Network. ICST Workshops 2013: 476-483 - 2012
- [c10]Mohammad Ashiqur Rahman, Padmalochan Bera, Ehab Al-Shaer:
SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid. INFOCOM 2012: 2255-2263 - [c9]Soumya Maity, Padmalochan Bera, S. K. Ghosh:
Policy Based ACL Configuration Synthesis in Enterprise Networks: A Formal Approach. ISED 2012: 314-318 - 2011
- [j3]Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
A WLAN security management framework based on formal spatio-temporal RBAC model. Secur. Commun. Networks 4(9): 981-993 (2011) - [c8]Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer:
Build and Test Your Own Network Configuration. SecureComm 2011: 522-532 - 2010
- [j2]Padmalochan Bera, Santosh K. Ghosh, Pallab Dasgupta:
Integrated security analysis framework for an enterprise network - a formal approach. IET Inf. Secur. 4(4): 283-300 (2010) - [j1]Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
Policy Based Security Analysis in Enterprise Networks: A Formal Approach. IEEE Trans. Netw. Serv. Manag. 7(4): 231-243 (2010) - [c7]Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh, Pallab Dasgupta:
A Query based Formal Security Analysis Framework for Enterprise LAN. CIT 2010: 407-414 - [c6]Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh, Pallab Dasgupta:
A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model. CNSA 2010: 232-241 - [c5]Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management. ICISTM 2010: 76-88 - [c4]Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh:
Generating policy based security implementation in enterprise network: a formal framework. SafeConfig 2010: 1-8 - [c3]Soumya Maity, Padmalochan Bera, Soumya Kanti Ghosh:
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration. SIN 2010: 218-223
2000 – 2009
- 2009
- [c2]Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
Formal Verification of Security Policy Implementations in Enterprise Networks. ICISS 2009: 117-131 - [c1]Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
Fault Analysis of Security Policy Implementations in Enterprise Networks. NetCoM 2009: 240-245
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint