Follow
Barsha Mitra
Barsha Mitra
BITS Pilani, Hyderabad Campus
Verified email at hyderabad.bits-pilani.ac.in
Title
Cited by
Cited by
Year
A survey of role mining
B Mitra, S Sural, J Vaidya, V Atluri
ACM Computing Surveys (CSUR) 48 (4), 1-37, 2016
2712016
A novel blockchain based framework to secure IoT-LLNs against routing attacks
R Sahay, G Geethakumari, B Mitra
Computing 102 (11), 2445-2470, 2020
602020
Policy Engineering in RBAC and ABAC
S Das, B Mitra, V Atluri, J Vaidya, S Sural
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
422018
Migrating from RBAC to temporal RBAC
B Mitra, S Sural, J Vaidya, V Atluri
IET Information Security 11 (5), 294-300, 2017
292017
Toward mining of temporal roles
B Mitra, S Sural, V Atluri, J Vaidya
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
272013
Efficient framework for detection of version number attack in internet of things
R Sahay, G Geethakumari, B Mitra, I Sahoo
Intelligent Systems Design and Applications: 18th International Conference …, 2020
262020
Mining temporal roles using many-valued concepts
B Mitra, S Sural, J Vaidya, V Atluri
Computers & Security 60, 79-94, 2016
232016
Mitigating the worst parent attack in RPL based internet of things
R Sahay, G Geethakumari, B Mitra
Cluster Computing 25 (2), 1303-1320, 2022
212022
A novel network partitioning attack against routing protocol in internet of things
R Sahay, G Geethakumari, B Mitra
Ad Hoc Networks 121, 102583, 2021
212021
The generalized temporal role mining problem
B Mitra, S Sural, V Atluri, J Vaidya
Journal of Computer Security 23 (1), 31-58, 2015
212015
Exponential smoothing based approach for detection of blackhole attacks in IoT
R Sahay, G Geethakumari, B Mitra, V Thejas
2018 IEEE International Conference on Advanced Networks and …, 2018
202018
Investigating packet dropping attacks in rpl-dodag in iot
R Sahay, G Geethakumari, B Mitra, N Goyal
2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 1-5, 2019
132019
A holistic framework for prediction of routing attacks in IoT-LLNs
R Sahay, G Geethakumari, B Mitra
The Journal of Supercomputing 78 (1), 1409-1433, 2022
102022
PAMMELA: Policy Administration Methodology using Machine Learning
V Gumma, B Mitra, S Dey, P Patel, S Suman, S Das, J and Vaidya
In Proceedings of the 19th International Conference on Security and …, 2022
92022
Enhancing user access information with spatial data
B Mitra, B Harika
Journal of Information and Optimization Sciences 40 (2), 203-217, 2019
72019
Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism
R Sahay, G Geethakumari, K Modugu, B Mitra
2018 IEEE Symposium Series on Computational Intelligence (SSCI), 1715-1722, 2018
72018
A feedforward neural network based model to predict sub-optimal path attack in IoT-LLNs
R Sahay, G Geethakumari, B Mitra
2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet …, 2020
62020
A DiffServ Architecture for QoS‐Aware Routing for Delay‐Sensitive and Best‐Effort Services in IEEE 802.16 Mesh Networks
I Bhakta, S Chakraborty, B Mitra, DK Sanyal, S Chattopadhyay, ...
Journal of Computer Networks and Communications 2011 (1), 951310, 2011
62011
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems
L Chavali, A Krishnan, P Saxena, B Mitra, AS Chivukula
Computers & Security 142, 103854, 2024
52024
Optimal feature set selection for IoT device fingerprinting on edge infrastructure using machine intelligence
SS Wanode, M Anand, B Mitra
IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops …, 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20