| A context-aware robust intrusion detection system: a reinforcement learning-based approach K Sethi, E Sai Rupesh, R Kumar, P Bera, Y Venu Madhav International Journal of Information Security 19 (6), 657-678, 2020 | 167 | 2020 |
| Attention based multi-agent intrusion detection systems using reinforcement learning K Sethi, YV Madhav, R Kumar, P Bera Journal of Information Security and Applications 61, 102923, 2021 | 133 | 2021 |
| Software defined networking architecture, traffic management, security, and placement: A survey M Priyadarsini, P Bera Computer Networks 192, 108047, 2021 | 130 | 2021 |
| Deep reinforcement learning based intrusion detection system for cloud infrastructure K Sethi, R Kumar, N Prajapati, P Bera 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS …, 2020 | 101 | 2020 |
| A novel machine learning based malware detection and classification framework K Sethi, R Kumar, L Sethi, P Bera, PK Patra 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 93 | 2019 |
| Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation K Sethi, A Pradhan, P Bera Journal of Information Security and applications 51, 102435, 2020 | 76 | 2020 |
| A noninvasive threat analyzer for advanced metering infrastructure in smart grid MA Rahman, E Al-Shaer, P Bera IEEE Transactions on Smart Grid 4 (1), 273-287, 2012 | 60 | 2012 |
| A novel malware analysis framework for malware detection and classification using machine learning approach K Sethi, SK Chaudhary, BK Tripathy, P Bera Proceedings of the 19th international conference on distributed computing …, 2018 | 57 | 2018 |
| Policy based security analysis in enterprise networks: A formal approach P Bera, SK Ghosh, P Dasgupta IEEE Transactions on Network and Service Management 7 (4), 231-243, 2010 | 52 | 2010 |
| PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems K Sethi, A Pradhan, P Bera Cluster Computing 24 (2), 1525-1550, 2021 | 47 | 2021 |
| Analysis of continual learning models for intrusion detection system S Prasath, K Sethi, D Mohanty, P Bera, SR Samantaray IEEE Access 10, 121444-121464, 2022 | 43 | 2022 |
| An adaptive secure and efficient routing protocol for mobile ad hoc networks BK Tripathy, SK Jena, P Bera, S Das Wireless Personal Communications 114 (2), 1339-1370, 2020 | 39 | 2020 |
| Machine learning based malware detection in cloud environment using clustering approach R Kumar, K Sethi, N Prajapati, RR Rout, P Bera 2020 11th International Conference on Computing, Communication and …, 2020 | 39 | 2020 |
| An adaptive load balancing scheme for software-defined network controllers M Priyadarsini, JC Mukherjee, P Bera, S Kumar, AHM Jakaria, ... Computer Networks 164, 106918, 2019 | 39 | 2019 |
| SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid MA Rahman, P Bera, E Al-Shaer 2012 Proceedings IEEE INFOCOM, 2255-2263, 2012 | 38 | 2012 |
| Federated reinforcement learning based intrusion detection system using dynamic attention mechanism S Vadigi, K Sethi, D Mohanty, SP Das, P Bera Journal of Information Security and Applications 78, 103608, 2023 | 35 | 2023 |
| A novel malware analysis for malware detection and classification using machine learning algorithms K Sethi, SK Chaudhary, BK Tripathy, P Bera Proceedings of the 10th International Conference on Security of Information …, 2017 | 33 | 2017 |
| An energy-efficient load distribution framework for SDN controllers M Priyadarsini, S Kumar, P Bera, MA Rahman Computing 102 (9), 2073-2098, 2020 | 29 | 2020 |
| Robust adaptive cloud intrusion detection system using advanced deep reinforcement learning K Sethi, R Kumar, D Mohanty, P Bera International Conference on Security, Privacy, and Applied Cryptography …, 2020 | 28 | 2020 |
| Self-attention for cyberbullying detection A Pradhan, VM Yatam, P Bera 2020 International Conference on Cyber Situational Awareness, Data Analytics …, 2020 | 25 | 2020 |