Feedback

Prof. Barsha Mitra  

Associate Professor,
Dept. of Computer Science and Information Systems

Birla Institute of Technology & Science, Pilani
Hyderabad Campus
Jawahar Nagar, Kapra Mandal
Dist.-Medchal-500 078
Telangana, India

Publications

Book Chapters

  • Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural, Policy Engineering in RBAC and ABAC,  Book Title: From Database to Cyber Security, Editors: Pierangela Samarati Indrajit Ray, Indrakshi Ray, Publisher: LNCS Festschrift (Springer) Book Series (volume 11170), Pages: 24-54, Publication Date: 2018.

Journals

  • Lalitha Chavali, Abhinav Krishnan, Paresh Saxena, Barsha Mitra, Aneesh Sreevallabh Chivukula, Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems, Computers & Security, Vol. 142, 2024.
  • Rashmi Sahay, G Geethakumari, Barsha MitraA holistic framework for prediction of routing attacks in IoT-LLNs, The Journal of Supercomputing, Vol. 78, pages 1409–1433, 2022.
  • Rashmi Sahay, G. Geethakumari, Barsha MitraMitigating the Worst Parent Attack in RPL based Internet of Things, Springer Cluster Computing Journal, Vol. 25, pages 1303–1320, 2022.
  • Rashmi Sahay, G. Geethakumari, Barsha MitraA novel Network Partitioning Attack against Routing Protocol in Internet of Things, Ad Hoc Networks, Vol. 121, October 2021.
  •  Rashmi Sahay, G Geethakumari, Barsha MitraA novel blockchain based framework to secure IoT-LLNs against routing attacks, Computing Journal, Volume: 102, pages: 2445-2470, Springer, November 2020.
  • Barsha Mitra, B Harika, Enhancing user access information with spatial data, Journal of Information and Optimization Sciences, Publisher: Taylor & Francis, Volume: 40, pages: 203-217, March 2019.
  • Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijay Atluri, Migrating from RBAC to Temporal RBAC, IET Information Security, Volume: 11, Issue: 5,  pages: 294 – 300, September 2017.
  • Barsha Mitra, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri, A Survey of Role Mining, ACM Computing Surveys (CSUR), Vol. 48(4), pages: 50:1-50:37, February 2016.
  • Barsha Mitra, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri, Mining Temporal Roles using Many-Valued Concepts, Computers & Security (COSE), Vol. 60, 2016 (DOI:http://dx.doi.org/10.1016/j.cose.2016.04.002).
  • Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, and Jaideep Vaidya, The generalized temporal role mining problem, Journal of  Computer Security (JCS), Vol. 23(1), pages: 31-58, March 2015. 
  • Ishita Bhakta, Sandip Chakraborty, Barsha Mitra, Debarshi Kumar Sanyal, Samiran Chattopadhyay, and Matangini Chattopadhyay,  A DiffServ Architecture for QoS-Aware Routing for Delay-Sensitive and Best-Effort Services in IEEE 802.16 Mesh Networks, Journal of Computer Networks and Communications, Vol. 2011, Article ID 951310, 13 pages, 2011(DOI:10.1155/2011/951310).

Conferences

  • Vibhum Raj Tripathi, Srikant Tangirala, Divakarla Venkata Sasanka, Dheeraj Reddy, Chinmay S Dalal, and Barsha Mitra, SINTTRA: Sliding Window based Temporally Aware Network Traffic Analyzer for IoT Device Fingerprinting, IEEE Intelligent Systems, 12th International Conference, pages 1 - 7, Varna, Bulgaria, 2024.
  • Abhishek Joshi, Divyateja Pasupuleti, Nischith P, Sarvesh Sutaone, Soumil Ray, Soumyadeep Dey, and Barsha Mitra, Malware Analysis Using Transformer Based Models: An Empirical Study, 21st International Conference on Security and Cryptography (SECRYPT), pages 858-865, Dijon, France, 2024.   
  • Lalitha Chavali, Paresh Saxena, and Barsha Mitra, Knowledge empowered deep reinforcement learning to prioritize alerts generated by intrusion detection systems, 38th International Conference on Advanced Information Networking and Applications (AINA), pages 400-411, Japan, 2024.
  • Arjun Prasad, Kevin Biju, Soumya Somani, and Barsha MitraContext-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis, 20th International Conference on Security and Cryptography (SECRYPT), pages 335-344, Rome, Italy, 2023.
  • Chirag Jaju, Dhairya Agrawal, Rishi Poddar, Shubh Badjate, Sidharth Anand, Barsha Mitra, and Soumyadeep Dey, Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration20th International Conference on Security and Cryptography (SECRYPT), pages 863-869, Rome, Italy, July 2023.
  • Varun Gumma, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das, Jaideep Vaidya, PAMMELA: Policy Administration Methodology using Machine Learning, accepted in 19th International Conference on Security and Cryptography (SECRYPT), pages 147 - 157, Lisbon, Portugal, July 2022. 
  • Sarvesh Sanjay Wanode, Milind Anand, Barsha MitraOptimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine Intelligence, IEEE INFOCOM WKSHPS: A4E 2022: AI/ML for Edge/Fog Networks, pages  1 - 6, May 2022.
  • Rashmi Sahay, G. Geethakumari, Barsha MitraIB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs, IEEE International Conference on Advanced Networks and Telecommunications Systems (IEEE ANTS), Dec 13 - 16, 2021, Hyderabad, India.
  • Varun Gumma, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das, PAMMELA: Policy Administration Methodology using Machine Learning, arXiv preprint arXiv:2111.07060.
  • Sohail Rajdev, Barsha Mitra, Enforcing Cardinality Constraint in Temporal RBAC, 18th International Conference on Security and Cryptography (SECRYPT), pages 639 - 646, July 2021 (Online Event).
  • Rashmi Sahay, G Geethakumari, Barsha MitraPartitioning Attacks Against RPL in the Internet of Things Environment, 26th (virtual) International Conference on Advanced Computing and Communications (ADCOM 2020), pages 115 - 127, December 2020.
  • Rashmi Sahay, G Geethakumari, Barsha MitraA feedforward neural network based model to predict sub-optimal path attack in IoT-LLNs, 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), pages 400 - 409, May 2020.
  • Aditya Dubey, Uttara Ravi, Somya Sharma, Barsha MitraToward Implementing Spatio-Temporal RBAC Extensions, International Conference on Information Systems Security (ICISS), pages 59 - 78, Hyderabad, India, December 2019.
  • Rashmi Sahay, G. Geethakumari, Barsha Mitra, Naman Goyal, Investigating Packet Dropping Attacks in RPL-DODAG in IoT, 5th IEEE International Conference for Convergence in Technology (I2CT), pages 1-5, Bombay, India, March 2019.
  • Rashmi Sahay, G Geethakumari, Barsha Mitra, V Thejas, Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pages 1-6, Indore, India, December 2018.
  • Rashmi Sahay, G Geethakumari, Barsha Mitra, Ipsit Sahoo, Efficient Framework for Detection of Version Number Attack in Internet of Things, International Conference on Intelligent Systems Design and Applications (ISDA), pages 480-492, Vellore, India, December 2018.
  • Rashmi Sahay, G Geethakumari, Koushik Modugu, Barsha Mitra, Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism, IEEE Symposium Series on Computational Intelligence (SSCI), pages 1715-1722, Bangalore, India, November 2018.
  • Soumyadeep Dey, Barsha Mitra, Jayanta Mukhopadhyay, Shamik Sural, A Comparative Study of Margin Noise Removal Algorithms on MarNR: A Margin Noise Dataset of Document Images,14th IAPR International Conference on Document Analysis and Recognition (ICDAR), pages 35-39, Kyoto, Japan, November 2017.
  • Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, and Jaideep Vaidya, Toward mining of temporal roles, 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), pages 65-80, New Jersey, USA, July 2013.
  • Barsha Mitra, Debarshi Kumar Sanyal, Matangini Chattopadhyay, and Samiran Chattopadhyay, A Novel QoS Differentiation Framework for IEEE 802.11 WLANs: A Game-Theoretic Approach Using an Optimal Channel Access Scheme, 1st International Conference on Computational Intelligence and Information Technology (CIIT), pages 500-502, Pune, India, November 2011.

Google Scholar Page: https://scholar.google.com/citations?user=_huCqoIAAAAJ&hl=en