Search Results - "Sethi, Kamalakanta"
-
1
Analysis of Continual Learning Models for Intrusion Detection System
Published in IEEE access (2022)“…Deep Learning based Intrusion Detection Systems (IDSs) have received significant attention from the research community for their capability to handle…”
Get full text
Journal Article -
2
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
Published in Journal of information security and applications (01-04-2020)“…Multi-authority ciphertext policy attribute-based encryption (CP-ABE) is one of the promising approaches where multiple authorities issue and manage various…”
Get full text
Journal Article -
3
Attention based multi-agent intrusion detection systems using reinforcement learning
Published in Journal of information security and applications (01-09-2021)“…Designing an effective network intrusion system (IDS) is a challenging problem because of the emergence of a large number of novel attacks and heterogeneous…”
Get full text
Journal Article -
4
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
Published in Cluster computing (01-06-2021)“…Attribute-based encryption (ABE) has evolved as an efficient and secure method for storage of data with fine-grained access control in cloud platforms. In…”
Get full text
Journal Article -
5
A context-aware robust intrusion detection system: a reinforcement learning-based approach
Published in International journal of information security (01-12-2020)“…Detection and prevention of intrusions in enterprise networks and systems is an important, but challenging problem due to extensive growth and usage of…”
Get full text
Journal Article -
6
Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure
Published in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (01-01-2020)“…Intrusion Detection in cloud platform is a challenging problem due to its extensive usage and distributed nature that are constant targets of new and unknown…”
Get full text
Conference Proceeding -
7
A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference
Published in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (01-01-2020)“…In today's world, the integration of various computing devices and embedded systems is creating a giant network that is popularly termed as the internet of…”
Get full text
Conference Proceeding -
8
Federated reinforcement learning based intrusion detection system using dynamic attention mechanism
Published in Journal of information security and applications (01-11-2023)“…Due to the recent advancements in the Internet of Things (IoT) and cloud computing technologies, the detection and prevention of intrusions in enterprise…”
Get full text
Journal Article -
9
Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications
Published in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (01-01-2020)“…Smart grid employs intelligent transmission and distribution networks for effective and reliable delivery of electricity. It uses fine-grained electrical…”
Get full text
Conference Proceeding -
10
IoT-Based Aggregate Smart Grid Energy Data Extraction using Image Recognition and Partial Homomorphic Encryption
Published in 2021 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (13-12-2021)“…The high expense of upgrading traditional analog and digital smart grid meters with network sensor devices is a major implementation cost for collecting energy…”
Get full text
Conference Proceeding -
11
Inviolable e-Question paper via QR code Watermarking and Visual Cryptography
Published in 2021 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (13-12-2021)“…Recurrent allegations of electronic question paper (e-QP) leakage and examination malpractices in educational institutions can be handled by the course faculty…”
Get full text
Conference Proceeding -
12
A Novel Machine Learning Based Malware Detection and Classification Framework
Published in 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (01-06-2019)“…As time progresses, new and complex malware types are being generated which causes a serious threat to computer systems. Due to this drastic increase in the…”
Get full text
Conference Proceeding -
13
Machine Learning based Malware Detection in Cloud Environment using Clustering Approach
Published in 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (01-07-2020)“…Enforcing security and resilience in a cloud platform is an essential but challenging problem due to the presence of a large number of heterogeneous…”
Get full text
Conference Proceeding -
14
Intelligent Intrusion Detection System for Smart Grid Applications
Published in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (14-06-2021)“…Smart grid is a cyber-physical system that enhances the capability of conventional power networks leveraging functional automation of information and…”
Get full text
Conference Proceeding -
15
Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption
Published in 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (01-06-2020)“…Smart grid consists of multiple different entities related to various energy management systems which share fine-grained energy measurements among themselves…”
Get full text
Conference Proceeding -
16
A novel implementation of parallel homomorphic encryption for secure data storage in cloud
Published in 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security) (01-06-2017)“…Due to the digitization of data in large scale and varying requirements of the organizations to serve different stakeholders, there is a need to compute, store…”
Get full text
Conference Proceeding -
17
A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud
Published in 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (01-06-2019)“…Today a large volume of data is stored in cloud that requires fine grained accessibility for heterogeneous users. Cipher-text policy attribute based encryption…”
Get full text
Conference Proceeding -
18
Analysis of Continual Learning Models for Intrusion Detection System
Published in Access, IEEE (2022)“…Deep Learning based Intrusion Detection Systems (IDSs) have received significant attention from the research community for their capability to handle…”
Get full text
Standard -
19
A new hybrid watermarking technique using DCT and DWT based on scaling factor
Published in 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (01-02-2015)“…The Digital Watermarking can be used to hide an image over a cover image and also for copyright protection. In particular, digital image watermarking…”
Get full text
Conference Proceeding