default search action
Barsha Mitra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Lalitha Chavali, Abhinav Krishnan, Paresh Saxena, Barsha Mitra, Aneesh Sreevallabh Chivukula:
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems. Comput. Secur. 142: 103854 (2024) - [c17]Lalitha Chavali, Paresh Saxena, Barsha Mitra:
Knowledge Empowered Deep Reinforcement Learning to Prioritize Alerts Generated by Intrusion Detection Systems. AINA (4) 2024: 400-411 - [c16]Vibhum Raj Tripathi, Srikant Tangirala, Divakarla Venkata Sasanka, Dheeraj Reddy, Chinmay S. Dalal, Barsha Mitra:
SINTTRA: Sliding Window Based Temporally Aware Network Traffic Analyzer for IoT Device Fingerprinting. IS 2024: 1-7 - [c15]Abhishek Joshi, Divyateja Pasupuleti, P. Nischith, Sarvesh Sutaone, Soumil Ray, Soumyadeep Dey, Barsha Mitra:
Malware Analysis Using Transformer Based Models: An Empirical Study. SECRYPT 2024: 858-865 - 2023
- [c14]Arjun Prasad, Kevin Kanichery Biju, Soumya Somani, Barsha Mitra:
Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis. SECRYPT 2023: 335-344 - [c13]Chirag Jaju, Dhairya Agrawal, Rishi Poddar, Shubh Badjate, Sidharth Anand, Barsha Mitra, Soumyadeep Dey:
Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration. SECRYPT 2023: 863-869 - [i3]Sidharth Anand, Barsha Mitra, Soumyadeep Dey, Abhinav Rao, Rupsa Dhar, Jaideep Vaidya:
MALITE: Lightweight Malware Detection and Classification for Constrained Devices. CoRR abs/2309.03294 (2023) - 2022
- [j10]Rashmi Sahay, G. Geethakumari, Barsha Mitra:
Mitigating the worst parent attack in RPL based internet of things. Clust. Comput. 25(2): 1303-1320 (2022) - [j9]Rashmi Sahay, G. Geethakumari, Barsha Mitra:
Correction: Mitigating the worst parent attack in RPL based internet of things. Clust. Comput. 25(5): 3765 (2022) - [j8]Rashmi Sahay, G. Geethakumari, Barsha Mitra:
A holistic framework for prediction of routing attacks in IoT-LLNs. J. Supercomput. 78(1): 1409-1433 (2022) - [c12]Sarvesh Sanjay Wanode, Milind Anand, Barsha Mitra:
Optimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine Intelligence. INFOCOM Workshops 2022: 1-6 - [c11]Varun Gumma, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das, Jaideep Vaidya:
PAMMELA: Policy Administration Methodology using Machine Learning. SECRYPT 2022: 147-157 - 2021
- [j7]Rashmi Sahay, G. Geethakumari, Barsha Mitra:
A novel Network Partitioning Attack against Routing Protocol in Internet of Things. Ad Hoc Networks 121: 102583 (2021) - [c10]Rashmi Sahay, G. Geethakumari, Barsha Mitra:
IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs. ANTS 2021: 1-6 - [c9]Sohail Rajdev, Barsha Mitra:
Enforcing Cardinality Constraint in Temporal RBAC. SECRYPT 2021: 639-646 - [i2]Varun Gumma, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das:
PAMMELA: Policy Administration Methodology using Machine Learning. CoRR abs/2111.07060 (2021) - 2020
- [j6]Rashmi Sahay, G. Geethakumari, Barsha Mitra:
A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing 102(11): 2445-2470 (2020) - [c8]Rashmi Sahay, G. Geethakumari, Barsha Mitra:
A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs. CCGRID 2020: 400-409
2010 – 2019
- 2019
- [c7]Aditya Dubey, Uttara Ravi, Somya Sharma, Barsha Mitra:
Toward Implementing Spatio-Temporal RBAC Extensions. ICISS 2019: 59-78 - 2018
- [c6]Rashmi Sahay, G. Geethakumari, Barsha Mitra, V. Thejas:
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT. ANTS 2018: 1-6 - [c5]Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Engineering in RBAC and ABAC. From Database to Cyber Security 2018: 24-54 - [c4]Rashmi Sahay, G. Geethakumari, Barsha Mitra, Ipsit Sahoo:
Efficient Framework for Detection of Version Number Attack in Internet of Things. ISDA (2) 2018: 480-492 - [c3]Rashmi Sahay, G. Geethakumari, Koushik Modugu, Barsha Mitra:
Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism. SSCI 2018: 1715-1722 - 2017
- [j5]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Migrating from RBAC to temporal RBAC. IET Inf. Secur. 11(5): 294-300 (2017) - [c2]Soumyadeep Dey, Barsha Mitra, Jayanta Mukhopadhyay, Shamik Sural:
A Comparative Study of Margin Noise Removal Algorithms on MarNR: A Margin Noise Dataset of Document Images. OST@ICDAR 2017: 35-39 - 2016
- [j4]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Mining temporal roles using many-valued concepts. Comput. Secur. 60: 79-94 (2016) - [j3]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
A Survey of Role Mining. ACM Comput. Surv. 48(4): 50:1-50:37 (2016) - 2015
- [j2]Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
The generalized temporal role mining problem. J. Comput. Secur. 23(1): 31-58 (2015) - 2013
- [c1]Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Toward Mining of Temporal Roles. DBSec 2013: 65-80 - [i1]Ishita Bhakta, Sandip Chakraborty, Debarshi Kumar Sanyal, Barsha Mitra, Samiran Chattopadhyay, Matangini Chattopadhyay:
Designing an Efficient Delay Sensitive Routing Metric for IEEE 802.16 Mesh Networks. CoRR abs/1306.3903 (2013) - 2011
- [j1]Ishita Bhakta, Sandip Chakraborty, Barsha Mitra, Debarshi Kumar Sanyal, Samiran Chattopadhyay, Matangini Chattopadhyay:
A DiffServ Architecture for QoS-Aware Routing for Delay-Sensitive and Best-Effort Services in IEEE 802.16 Mesh Networks. J. Comput. Networks Commun. 2011: 951310:1-951310:13 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint