Search Results - "Sethi, Kamalakanta"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Analysis of Continual Learning Models for Intrusion Detection System by Prasath, Sai, Sethi, Kamalakanta, Mohanty, Dinesh, Bera, Padmalochan, Samantaray, Subhransu Ranjan

    Published in IEEE access (2022)
    “…Deep Learning based Intrusion Detection Systems (IDSs) have received significant attention from the research community for their capability to handle…”
    Get full text
    Journal Article
  2. 2

    Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation by Sethi, Kamalakanta, Pradhan, Ankit, Bera, Padmalochan

    “…Multi-authority ciphertext policy attribute-based encryption (CP-ABE) is one of the promising approaches where multiple authorities issue and manage various…”
    Get full text
    Journal Article
  3. 3

    Attention based multi-agent intrusion detection systems using reinforcement learning by Sethi, Kamalakanta, Madhav, Y. Venu, Kumar, Rahul, Bera, Padmalochan

    “…Designing an effective network intrusion system (IDS) is a challenging problem because of the emergence of a large number of novel attacks and heterogeneous…”
    Get full text
    Journal Article
  4. 4

    PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems by Sethi, Kamalakanta, Pradhan, Ankit, Bera, Padmalochan

    Published in Cluster computing (01-06-2021)
    “…Attribute-based encryption (ABE) has evolved as an efficient and secure method for storage of data with fine-grained access control in cloud platforms. In…”
    Get full text
    Journal Article
  5. 5

    A context-aware robust intrusion detection system: a reinforcement learning-based approach by Sethi, Kamalakanta, Sai Rupesh, E., Kumar, Rahul, Bera, Padmalochan, Venu Madhav, Y.

    “…Detection and prevention of intrusions in enterprise networks and systems is an important, but challenging problem due to extensive growth and usage of…”
    Get full text
    Journal Article
  6. 6

    Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure by Sethi, Kamalakanta, Kumar, Rahul, Prajapati, Nishant, Bera, Padmalochan

    “…Intrusion Detection in cloud platform is a challenging problem due to its extensive usage and distributed nature that are constant targets of new and unknown…”
    Get full text
    Conference Proceeding
  7. 7

    A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference by Sethi, Kamalakanta, Kumar, Rahul, Prajapati, Nishant, Bera, Padmalochan

    “…In today's world, the integration of various computing devices and embedded systems is creating a giant network that is popularly termed as the internet of…”
    Get full text
    Conference Proceeding
  8. 8

    Federated reinforcement learning based intrusion detection system using dynamic attention mechanism by Vadigi, Sreekanth, Sethi, Kamalakanta, Mohanty, Dinesh, Das, Shom Prasad, Bera, Padmalochan

    “…Due to the recent advancements in the Internet of Things (IoT) and cloud computing technologies, the detection and prevention of intrusions in enterprise…”
    Get full text
    Journal Article
  9. 9

    Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications by Sethi, Kamalakanta, Pradhan, Ankit, Bera, Padmalochan

    “…Smart grid employs intelligent transmission and distribution networks for effective and reliable delivery of electricity. It uses fine-grained electrical…”
    Get full text
    Conference Proceeding
  10. 10

    IoT-Based Aggregate Smart Grid Energy Data Extraction using Image Recognition and Partial Homomorphic Encryption by Agrawal, Aniket, Sethi, Kamalakanta, Bera, Padmalochan

    “…The high expense of upgrading traditional analog and digital smart grid meters with network sensor devices is a major implementation cost for collecting energy…”
    Get full text
    Conference Proceeding
  11. 11

    Inviolable e-Question paper via QR code Watermarking and Visual Cryptography by Agrawal, Aniket, Sethi, Kamalakanta, Bera, Padmalochan

    “…Recurrent allegations of electronic question paper (e-QP) leakage and examination malpractices in educational institutions can be handled by the course faculty…”
    Get full text
    Conference Proceeding
  12. 12

    A Novel Machine Learning Based Malware Detection and Classification Framework by Sethi, Kamalakanta, Kumar, Rahul, Sethi, Lingaraj, Bera, Padmalochan, Patra, Prashanta Kumar

    “…As time progresses, new and complex malware types are being generated which causes a serious threat to computer systems. Due to this drastic increase in the…”
    Get full text
    Conference Proceeding
  13. 13

    Machine Learning based Malware Detection in Cloud Environment using Clustering Approach by Kumar, Rahul, Sethi, Kamalakanta, Prajapati, Nishant, Rout, Rashmi Ranjan, Bera, Padmalochan

    “…Enforcing security and resilience in a cloud platform is an essential but challenging problem due to the presence of a large number of heterogeneous…”
    Get full text
    Conference Proceeding
  14. 14

    Intelligent Intrusion Detection System for Smart Grid Applications by Mohanty, Dinesh, Sethi, Kamalakanta, Prasath, Sai, Rout, Rashmi Ranjan, Bera, Padmalochan

    “…Smart grid is a cyber-physical system that enhances the capability of conventional power networks leveraging functional automation of information and…”
    Get full text
    Conference Proceeding
  15. 15

    Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption by Pradhan, Ankit, R, Punith, Sethi, Kamalakanta, Bera, Padmalochan

    “…Smart grid consists of multiple different entities related to various energy management systems which share fine-grained energy measurements among themselves…”
    Get full text
    Conference Proceeding
  16. 16

    A novel implementation of parallel homomorphic encryption for secure data storage in cloud by Sethi, Kamalakanta, Majumdar, Amartya, Bera, Padmalochan

    “…Due to the digitization of data in large scale and varying requirements of the organizations to serve different stakeholders, there is a need to compute, store…”
    Get full text
    Conference Proceeding
  17. 17

    A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud by Sethi, Kamalakanta, Pradhan, Ankit, Punith, R, Bera, Padmalochan

    “…Today a large volume of data is stored in cloud that requires fine grained accessibility for heterogeneous users. Cipher-text policy attribute based encryption…”
    Get full text
    Conference Proceeding
  18. 18

    Analysis of Continual Learning Models for Intrusion Detection System by Prasath, Sai, Sethi, Kamalakanta, Mohanty, Dinesh, Bera, Padmalochan, Samantaray, Subhransu Ranjan

    Published in Access, IEEE (2022)
    “…Deep Learning based Intrusion Detection Systems (IDSs) have received significant attention from the research community for their capability to handle…”
    Get full text
    Standard
  19. 19

    A new hybrid watermarking technique using DCT and DWT based on scaling factor by Raju, U. S. N., Sethi, Kamalakanta, Choudhary, Sunaina, Jain, Priyanka

    “…The Digital Watermarking can be used to hide an image over a cover image and also for copyright protection. In particular, digital image watermarking…”
    Get full text
    Conference Proceeding