An evolutionary SVM model for DDOS attack detection in software defined networks KS Sahoo, BK Tripathy, K Naik, S Ramasubbareddy, B Balusamy, M Khari, ... IEEE access 8, 132502-132513, 2020 | 202 | 2020 |
Intuitionistic fuzzy rough sets SP Jena, SK Ghosh, BK Tripathy Notes on Intuitionistic Fuzzy Sets 8 (1), 1-18, 2002 | 114 | 2002 |
A novel communication framework between MANET and WSN in IoT based smart environment BK Tripathy, SK Jena, V Reddy, S Das, SK Panda International Journal of Information Technology 13 (3), 921-931, 2021 | 48 | 2021 |
A novel malware analysis framework for malware detection and classification using machine learning approach K Sethi, SK Chaudhary, BK Tripathy, P Bera Proceedings of the 19th international conference on distributed computing …, 2018 | 38 | 2018 |
An adaptive secure and efficient routing protocol for mobile ad hoc networks BK Tripathy, SK Jena, P Bera, S Das Wireless Personal Communications 114 (2), 1339-1370, 2020 | 27 | 2020 |
A novel malware analysis for malware detection and classification using machine learning algorithms K Sethi, SK Chaudhary, BK Tripathy, P Bera Proceedings of the 10th International Conference on Security of Information …, 2017 | 20 | 2017 |
A novel secure and efficient policy management framework for software defined network BK Tripathy, AG Sethy, P Bera, MA Rahman 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 16 | 2016 |
Intuitionistic fuzzy metric spaces B Tripathy Notes on IFS 5 (2), 1999 | 11 | 1999 |
Risk based security enforcement in software defined network BK Tripathy, DP Das, SK Jena, P Bera Computers & Security 78, 321-335, 2018 | 10 | 2018 |
Security and privacy issues in blockchain technology D Preethi, N Khare, BK Tripathy Blockchain Technology and the Internet of Things, 245-263, 2020 | 9 | 2020 |
An Intuitionistic fuzzy count and cardinality of Intuitionistic fuzzy sets BK Tripathy, SP Jena, SK Ghosh Malaya Journal of Matematik 1 (04), 123-133, 2013 | 9 | 2013 |
A virtual execution platform for OpenFlow controller using NFV BK Tripathy, KS Sahoo, AK Luhach, NZ Jhanjhi, SK Jena Journal of King Saud University-Computer and Information Sciences 34 (3 …, 2022 | 8 | 2022 |
Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study BK Tripathy, P Bera, MA Rahman 2016 8th International Conference on Communication Systems and Networks …, 2016 | 8 | 2016 |
Risk assessment in IT infrastructure BK Tripathy Security and Privacy From a Legal, Ethical, and Technical Perspective, 93, 2020 | 7 | 2020 |
On the theory of bags and lists BK Tripathy, SP Jena, SK Ghosh Information Sciences (USA) 132, 241-254, 2001 | 7 | 2001 |
A kerberos based secure communication system in smart (internet of things) environment SK Jena, BK Tripathy, P Gupta, S Das Journal of Computational and Theoretical Nanoscience 16 (5-6), 2381-2388, 2019 | 6 | 2019 |
Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud K Sethi, A Chopra, P Bera, BK Tripathy Proceedings of the 10th International Conference on Security of Information …, 2017 | 6 | 2017 |
Introduction to machine learning A Tandon, N Salimath, S Bhatia, K Sethi, BK Tripathy Book Bazooka, 2019 | 5 | 2019 |
Internet of Things (IoT): Technologies BK Tripathy, CRC Press Applications, Challenges and Solutions, 2017 | 5 | 2017 |
A new mobility control approach for improved route availability in mobile Ad Hoc networks BK Tripathy, SK Jena, P Bera, S Das Arabian Journal for Science and Engineering 44, 9627-9639, 2019 | 2 | 2019 |