Barsha Mitra

According to our database1, Barsha Mitra authored at least 31 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems.
Comput. Secur., 2024

Malware Analysis Using Transformer Based Models: An Empirical Study.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

SINTTRA: Sliding Window Based Temporally Aware Network Traffic Analyzer for IoT Device Fingerprinting.
Proceedings of the 12th IEEE International Conference on Intelligent Systems, 2024

Knowledge Empowered Deep Reinforcement Learning to Prioritize Alerts Generated by Intrusion Detection Systems.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
MALITE: Lightweight Malware Detection and Classification for Constrained Devices.
CoRR, 2023

Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
A holistic framework for prediction of routing attacks in IoT-LLNs.
J. Supercomput., 2022

Correction: Mitigating the worst parent attack in RPL based internet of things.
Clust. Comput., 2022

Mitigating the worst parent attack in RPL based internet of things.
Clust. Comput., 2022

PAMMELA: Policy Administration Methodology using Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Optimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine Intelligence.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
PAMMELA: Policy Administration Methodology using Machine Learning.
CoRR, 2021

A novel Network Partitioning Attack against Routing Protocol in Internet of Things.
Ad Hoc Networks, 2021

Enforcing Cardinality Constraint in Temporal RBAC.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

2020
A novel blockchain based framework to secure IoT-LLNs against routing attacks.
Computing, 2020

A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

2019
Toward Implementing Spatio-Temporal RBAC Extensions.
Proceedings of the Information Systems Security - 15th International Conference, 2019

2018
Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Efficient Framework for Detection of Version Number Attack in Internet of Things.
Proceedings of the Intelligent Systems Design and Applications, 2018

Policy Engineering in RBAC and ABAC.
Proceedings of the From Database to Cyber Security, 2018

Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Migrating from RBAC to temporal RBAC.
IET Inf. Secur., 2017

A Comparative Study of Margin Noise Removal Algorithms on MarNR: A Margin Noise Dataset of Document Images.
Proceedings of the 1st International Workshop on Open Services and Tools for Document Analysis, 2017

2016
A Survey of Role Mining.
ACM Comput. Surv., 2016

Mining temporal roles using many-valued concepts.
Comput. Secur., 2016

2015
The generalized temporal role mining problem.
J. Comput. Secur., 2015

2013
Designing an Efficient Delay Sensitive Routing Metric for IEEE 802.16 Mesh Networks.
CoRR, 2013

Toward Mining of Temporal Roles.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2011
A DiffServ Architecture for QoS-Aware Routing for Delay-Sensitive and Best-Effort Services in IEEE 802.16 Mesh Networks.
J. Comput. Networks Commun., 2011


  Loading...