Padmalochan Bera

Orcid: 0000-0002-0044-7051

According to our database1, Padmalochan Bera authored at least 64 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Cost-effective Framework for Privacy Preserving Federated Learning.
Proceedings of the 25th International Conference on Distributed Computing and Networking, 2024

Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption.
Proceedings of the 25th International Conference on Distributed Computing and Networking, 2024

2023
Federated reinforcement learning based intrusion detection system using dynamic attention mechanism.
J. Inf. Secur. Appl., November, 2023

A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach.
IEEE Trans. Dependable Secur. Comput., 2023

Context-Aware Attribute Based Access Control for Cloud-based SCADA Systems.
Proceedings of the 1st Workshop on Enhanced Network Techniques and Technologies for the Industrial IoT to Cloud Continuum, 2023

Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.
Proceedings of the Information Systems Security - 19th International Conference, 2023

Budget-constrained Controller Placement in Software-defined Network.
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023

2022
Analysis of Continual Learning Models for Intrusion Detection System.
IEEE Access, 2022

An SDN Implemented Adaptive Load Balancing Scheme for Mobile Networks.
Proceedings of the Distributed Computing and Intelligent Technology, 2022

Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption.
Proceedings of the International Conference on Cybersecurity, 2022

RLT-CPABE: Revocable Location and Time Aware Ciphertext Policy Attribute-Based Encryption.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022

2021
Attention based multi-agent intrusion detection systems using reinforcement learning.
J. Inf. Secur. Appl., 2021

Software defined networking architecture, traffic management, security, and placement: A survey.
Comput. Networks, 2021

PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems.
Clust. Comput., 2021

An Anomaly Free Distributed Firewall System for SDN.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

ModCGAN: A Multimodal Approach to Detect New Malware.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

Intelligent Intrusion Detection System for Smart Grid Applications.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

IoT-Based Aggregate Smart Grid Energy Data Extraction using Image Recognition and Partial Homomorphic Encryption.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

Inviolable e-Question paper via QR code Watermarking and Visual Cryptography.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

2020
An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2020

Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation.
J. Inf. Secur. Appl., 2020

A context-aware robust intrusion detection system: a reinforcement learning-based approach.
Int. J. Inf. Sec., 2020

An energy-efficient load distribution framework for SDN controllers.
Computing, 2020

Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement Learning.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

Machine Learning based Malware Detection in Cloud Environment using Clustering Approach.
Proceedings of the 11th International Conference on Computing, 2020

Self-Attention for Cyberbullying Detection.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

Smart City Renovation using SDN Framework.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2019
An adaptive load balancing scheme for software-defined network controllers.
Comput. Networks, 2019

A Signalling Game-Based Security Enforcement Mechanism for SDN Controllers.
Proceedings of the 10th International Conference on Computing, 2019

A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

A Novel Machine Learning Based Malware Detection and Classification Framework.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Risk based Security Enforcement in Software Defined Network.
Comput. Secur., 2018

A new approach for energy efficiency in software defined network.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach.
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018

A New Approach for SDN Performance Enhancement.
Proceedings of the Computer Networks - 25th International Conference, 2018

2017
A novel malware analysis for malware detection and classification using machine learning algorithms.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

A novel implementation of parallel homomorphic encryption for secure data storage in cloud.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

A Novel Secure and Efficient Policy Management Framework for Software Defined Network.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Formal integrated network security analysis tool: formal query-based network security configuration analysis.
IET Networks, 2015

A Security Enforcement Framework for Virtual Machine Migration Auction.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

2014
OHMF: A Query Based Optimal Healthcare Medication Framework.
CoRR, 2014

2013
A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid.
IEEE Trans. Smart Grid, 2013

A Query Driven Security Testing Framework for Enterprise Network.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

2012
Policy Based ACL Configuration Synthesis in Enterprise Networks: A Formal Approach.
Proceedings of the International Symposium on Electronic System Design, 2012

SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
A WLAN security management framework based on formal spatio-temporal RBAC model.
Secur. Commun. Networks, 2011

Build and Test Your Own Network Configuration.
Proceedings of the Security and Privacy in Communication Networks, 2011

2010
Policy Based Security Analysis in Enterprise Networks: A Formal Approach.
IEEE Trans. Netw. Serv. Manag., 2010

Integrated security analysis framework for an enterprise network - a formal approach.
IET Inf. Secur., 2010

A mobile IP based WLAN security management framework with reconfigurable hardware acceleration.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Generating policy based security implementation in enterprise network: a formal framework.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management.
Proceedings of the Information Systems, Technology and Management, 2010

A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model.
Proceedings of the Recent Trends in Network Security and Applications, 2010

A Query based Formal Security Analysis Framework for Enterprise LAN.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Fault Analysis of Security Policy Implementations in Enterprise Networks.
Proceedings of the First International Conference on Networks and Communications, 2009

Formal Verification of Security Policy Implementations in Enterprise Networks.
Proceedings of the Information Systems Security, 5th International Conference, 2009


  Loading...