A survey of role mining B Mitra, S Sural, J Vaidya, V Atluri ACM Computing Surveys (CSUR) 48 (4), 1-37, 2016 | 271 | 2016 |
A novel blockchain based framework to secure IoT-LLNs against routing attacks R Sahay, G Geethakumari, B Mitra Computing 102 (11), 2445-2470, 2020 | 60 | 2020 |
Policy Engineering in RBAC and ABAC S Das, B Mitra, V Atluri, J Vaidya, S Sural From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018 | 42 | 2018 |
Migrating from RBAC to temporal RBAC B Mitra, S Sural, J Vaidya, V Atluri IET Information Security 11 (5), 294-300, 2017 | 29 | 2017 |
Toward mining of temporal roles B Mitra, S Sural, V Atluri, J Vaidya Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013 | 27 | 2013 |
Efficient framework for detection of version number attack in internet of things R Sahay, G Geethakumari, B Mitra, I Sahoo Intelligent Systems Design and Applications: 18th International Conference …, 2020 | 26 | 2020 |
Mining temporal roles using many-valued concepts B Mitra, S Sural, J Vaidya, V Atluri Computers & Security 60, 79-94, 2016 | 23 | 2016 |
Mitigating the worst parent attack in RPL based internet of things R Sahay, G Geethakumari, B Mitra Cluster Computing 25 (2), 1303-1320, 2022 | 21 | 2022 |
A novel network partitioning attack against routing protocol in internet of things R Sahay, G Geethakumari, B Mitra Ad Hoc Networks 121, 102583, 2021 | 21 | 2021 |
The generalized temporal role mining problem B Mitra, S Sural, V Atluri, J Vaidya Journal of Computer Security 23 (1), 31-58, 2015 | 21 | 2015 |
Exponential smoothing based approach for detection of blackhole attacks in IoT R Sahay, G Geethakumari, B Mitra, V Thejas 2018 IEEE International Conference on Advanced Networks and …, 2018 | 20 | 2018 |
Investigating packet dropping attacks in rpl-dodag in iot R Sahay, G Geethakumari, B Mitra, N Goyal 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 1-5, 2019 | 13 | 2019 |
A holistic framework for prediction of routing attacks in IoT-LLNs R Sahay, G Geethakumari, B Mitra The Journal of Supercomputing 78 (1), 1409-1433, 2022 | 10 | 2022 |
PAMMELA: Policy Administration Methodology using Machine Learning V Gumma, B Mitra, S Dey, P Patel, S Suman, S Das, J and Vaidya In Proceedings of the 19th International Conference on Security and …, 2022 | 9 | 2022 |
Enhancing user access information with spatial data B Mitra, B Harika Journal of Information and Optimization Sciences 40 (2), 203-217, 2019 | 7 | 2019 |
Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism R Sahay, G Geethakumari, K Modugu, B Mitra 2018 IEEE Symposium Series on Computational Intelligence (SSCI), 1715-1722, 2018 | 7 | 2018 |
A feedforward neural network based model to predict sub-optimal path attack in IoT-LLNs R Sahay, G Geethakumari, B Mitra 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet …, 2020 | 6 | 2020 |
A DiffServ Architecture for QoS‐Aware Routing for Delay‐Sensitive and Best‐Effort Services in IEEE 802.16 Mesh Networks I Bhakta, S Chakraborty, B Mitra, DK Sanyal, S Chattopadhyay, ... Journal of Computer Networks and Communications 2011 (1), 951310, 2011 | 6 | 2011 |
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems L Chavali, A Krishnan, P Saxena, B Mitra, AS Chivukula Computers & Security 142, 103854, 2024 | 5 | 2024 |
Optimal feature set selection for IoT device fingerprinting on edge infrastructure using machine intelligence SS Wanode, M Anand, B Mitra IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops …, 2022 | 5 | 2022 |