Publications


51. Narendra Singh and Somanath Tripathy, Unveiling the Veiled: An Early Stage Detection of Fileless Malware, Computers & Security, Volume 141,(2024), 103819. (IF:5.6)

50. Susil Kumar Mohanty and Somanath Tripathy, Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack, IACM Transactions on Privacy and Security, Volume 27, Issue 4, Article No.: 30, Pages 1 - 26, (2024). https://doi.org/10.1109/JBHI.2024.3449756 (IF: 3.0)

49. Susmita Palmal,Sriparna Saha, Nikhilanand Arya and Somanath Tripathy, CAGCL: Predicting Short- and Long-Term Breast Cancer Survival with Cross-Modal Attention and Graph Contrastive Learning, IEEE Journal of Biomedical and Health Informatics,(2024). https://doi.org/10.1145/3687476 (IF: 6.7)

48. V. Singh, K. C. Ray and Somanath Tripathy, Real-Time Monitoring of Illegal Logging Events Using Intelligent Acoustic Sensors Nodes, IEEE Sensors Journal,Volume: 24, Issue: 17,(2024). https://doi.org/10.1109/JSEN.2024.3419897 (IF: 4.3)

47. Narendra Singh and Somanath Tripathy, It's too late if exfiltrate: Early stage Android ransomware detection, Computers & Security, Volume 141,(2024), 103819. https://doi.org/10.1016/j.cose.2024.103819 (IF:5.6)

46. Srikant Pradhan, Somanath Tripathy and Rakesh Matam, Towards optimal edge resource utilization: Predictive analytics and reinforcement learning for task offloading, Internet of Things,Volume 26,101147,(2024),101147. https://doi.org/10.1016/j.iot.2024.101147 (IF:5.9)

45. Susmita Palmal,Nikhilanand Arya,Sriparna Saha and Somanath Tripathy, Integrative prognostic modeling for breast cancer: Unveiling optimal multimodal combinations using graph convolutional networks and calibrated random forest, Applied Soft omputing,Volume 154,(2024),111379. https://doi.org/10.1016/j.asoc.2024.111379 (IF:8.7)

44. Harsh Kasyap and Somanath Tripathy, Sine: Similarity is not enough for mitigating Local Model Poisoning Attacks in Federated Learning , IEEE Transactions on Dependable and Secure Computing,(2024),1545-5971. https://doi.org/10.1109/TDSC.2024.3353317 (IF: 7.3)

43. Debasmita Manna and Somanath Tripathy, TriMPA: Triggerless Targeted Model Poisoning Attack in DNN , IEEE Transactions on Computational Social Systems,(2024),2329-924X. https://doi.org/10.1109/TCSS.2023.3349269 (IF:5)

42. V. Singh, K. C. Ray and Somanath Tripathy, An Efficient Method and Hardware System for Monitoring of Illegal Logging Events in Forest, IEEE Systems Journal,(2024),Volume: 18,1937-9234. https://doi.org/10.1109/JSYST.2023.3333677 (IF: 4.4, H5: 77)

41. Partha Sarathi Chakraborty, Omkar Santosh Gavhane and Somanath Tripathy, SEVCOD: Secure and Efficient Verifiable Computation on Outsourced Data, Cluster Computing - The Journal of Networks, Software Tools and Applications (Springer),(2023). https://doi.org/10.1007/s10586-023-04190-9 (IF: 4.4, H5: 69)

40. Harsh Kasyap, Somanath Tripathy, Privacy-preserving and Byzantine-robust Federated Learning Framework using Permissioned Blockchain, Expert Systems with Applications,Volume 238, Part E, (2024), 122210, 1873-6793 https://doi.org/10.1016/j.eswa.2023.122210 (IF: 8.5, H5: 148)

39. Susmita Palmal,Nikhilanand Arya,Sriparna Saha and Somanath Tripathy, Breast cancer survival prognosis using the graph convolutional network with Choquet fuzzy integral, Scientific Reports volume 13, Article number: 14757, (2023), 2045-2322 https://doi.org/10.1038/s41598-023-40341-z (IF: 4.6, H5:210)

38. Partha Sarathi Chakraborty, Somanath Tripathy, and Sanjeet Kumar Nayak BASPED: Blockchain assisted Secure Searchable Public Key Encryption over Outsourced Data, International Journal of Information Security, Springer, (2023), Volume 23,10.1007/s10207-023-00753-4, 1615-5270 (IF: 3.2, H5: 31)

37. Harsh Kasyap, Somanath Tripathy, Beyond data poisoning in federated learning, Expert Systems with Applications,volume: 235, (2023) https://doi.org/10.1016/j.eswa.2023.121192 (IF: 8.5, H5: 148)

36. Susmita Palmal, Sriparna Saha and Somanath Tripathy, Multi-objective Optimization with Majority Voting Ensemble of Classifiers for Prediction of HIV-1 Protease Cleavage Site, Soft Computing, Volume 27, (2023). https://doi.org/10.1007/s00500-023-08431-2 (IF: 4.1, H5: 83)

35. Harsh Kasyap, Arpan Manna, and Somanath Tripathy, An Efficient Blockchain assisted Reputation aware Decentralized Federated Learning Framework, IEEE Transactions on Network and Service Management, (2022). https://doi.org/10.1109/TNSM.2022.3231283,1932-4537 (IF: 4.75, H5: 53)

34. Nemi Chandra Rathore, Somanath Tripathy, Restricting Data-Leakage using Fine-Grained Access Control on OSN Objects, International Journal of Information Security (Springer),(2022). https://doi.org/10.1007/s10207-022-00629-z (IF: 2.427)

33. Susil Kumar Mohanty, Somanath Tripathy, SIoVChain: Time-Lock Contract based Privacy Preserving Data Sharing in SIoV, IEEE Transactions on Intelligent Transportation Systems,(2022). https://doi.org/10.1109/TITS.2022.3192566 (IF: 9.551, H5: 115)

32. Vikash Kumar Rai, Somanath Tripathy, Jimson Mathew, Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF, Journal of Hardware and Systems Security (Springer), (2021). https://doi.org/10.1007/s41635-021-00120-6, (IF: NA, H5: 20)

31. Sanjay Murmu, Harsh Kasyap, Somanath Tripathy, PassMon: A Technique for Password Generation and Strength Estimation, Journal of Network and Systems Management (Springer), (2021). Volume 30, article number 13, {2022}, https://doi.org/10.1007/s10922-021-09620-w (IF: 2.026, H5: 22, Core Ranking: B)

30. Sanjeet Kumar Nayak, Somanath Tripathy, SEPS: Efficient Public-key based Secure Search over Outsourced Data, Journal of Information Security and Applications (Elsevier), Volume 61, (2021), 102932. https://doi.org/10.1016/j.jisa.2021.102932 (IF: 2.3, H5: 31)

29. K. Dhal, S. C. Rai, P. K. Pattnaik, Somanath Tripathy, CEMAR: A Fine Grained Access Control with Revocation Mechanism for Centralized Multi-Authority Cloud Storage, The Journal of Supercomputing (Springer), Volume 78, pages 987–1009, (2022). https://doi.org/10.1007/s11227-021-03908-z (IF: 2.474, H5: 45, Core Ranking: B)

28. Susil Kumar Mohanty, Somanath Tripathy, n-HTLC: Neo Hashed Time-Lock Commitment to Defend Against Wormhole Attack in Payment Channel Networks, Computers & Security (Elsevier), Volume 106, (2021), 102291. https://doi.org/10.1016/j.cose.2021.102291 (IF: 5.105, H5: 78, Core Ranking: B)

27. Srikanta Pradhan, Somanath Tripathy, FRAC: A Flexible Resource Allocation for Vehicular Cloud System, IET Intelligent Transport Systems, Volume 14, Issue 14, (2021) . https://doi.org/10.1049/iet-its.2020.0390 (IF: 2.480, H5: 29)

26. Nemi Chandra Rathore, Somanath Tripathy, 'Effective Visibility Prediction on Online Social Network', in IEEE Transactions on Computational Social Systems, Volume 8, Issue 2, pp. 355-364, (2021). https://doi.org/10.1109/TCSS.2020.3042713. (IF: 3.29, H5: 12)

25. Somanath Tripathy, Vikash Kumar Rai, Jimson Mathew 'MARPUF: Physical Unclonable Function with Improved Machine Learning Attack Resistance ', IET Circuits, Devices & Systems,Volume15, Issue 5,(2021). https://doi.org/10.1049/cds2.12042 (IF: 1.290)

24. Harsh Kasyap, Somanath Tripathy, 'Privacy-Preserving Learning Framework for Healthcare System', ACM Transactions on Multimedia Computing, Communications, and Applications, Volume 17, Issue 2, pp 1–24,(2020). https://doi.org/10.1145/3426474 (IF: 2.25, H5: 32, Core Ranking: B)

23. Sumit Kumar Tetarave, Somanath Tripathy, 'PJ-Sec: Secure Node Joining in Mobile P2P Networks', CCF Transactions on Pervasive Computing and Interaction (Springer), Volume 3, pp 13–24, (2021). https://doi.org/10.1007/s42486-020-00047-x .

22. Devansh Gupta, Somanath Tripathy, Bodhisatwa Mazumdar, 'Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes', Journal of Hardware and Systems Security (Springer), Volume 4, pp 297–313,(2020). https://doi.org/10.1007/s41635-020-00104-y .

21. Sumit Kumar Tetarave, Somanath Tripathy and R. K. Ghosh, Enhancing Quality of Experience using Peer-to-Peer Overlay on Device-to-Device Communications, International Journal of Communication Systems (Wiley), Volume 33, Issue 15,(2020). https://doi.org/10.1002/dac.4546 (IF: 1.319, H5: 32)

20. Nemi Chandra Rathore, Somanath Tripathy, AppMonitor: Restricting Information Leakage to Third-Party Applications, Social Network Analysis and Mining (Springer), Volume 10, Issue 49,(2020). https://doi.org/10.1007/s13278-020-00662-7 (IF: 1.610, H5: 24)

19. Vikash Kumar Rai, Somanath Tripathy, Rajat Subhra Chakraborty, Jimson Mathew, HTRNG: High throughput True Random Number Generator using Memristor, IEEE VLSI CIRCUITS AND SYSTEMS LETTER,Volume 6 – Issue 1,(2020). (IF: N.A )

18. Sanjeet Kumar Nayak, Somanath Tripathy, SEDS: secure and efficient server-aided data deduplication scheme for cloud storage , International Journal of Information Security (Springer), Volume 19, Issue 2, pp 229-240,(2020). https://doi.org/10.1007/s10207-019-00455-w (IF: 1.822, H5: 25)

17. Vikash Kumar Rai, Boreddy V. Reddy, Somanath Tripathy, Jimson Mathew Correlation Power Analysis and Effective Defense Approach on Light Encryption Device Block Cipher Security and Privacy (Wiley), Volume 2, Issue 5,(2019). https://doi.org/10.1002/spy2.87 (IF: 1.9)

16. Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John, and Anshika Srivastava, Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets , IEEE Access, Volume 7, pp 67983 - 67995,(2019). https://doi.org/10.1109/ACCESS.2019.2906875 (IF: 4.098, H5: 89)

15. Ashutosh Kumar Sinha, Somanath Tripathy, CookieArmor: Safeguarding Against Cross-site Request Forgery and Session Hijacking, Security and Privacy (Wiley), Volume 2, Issue 2, (2019). https://doi.org/10.1002/spy2.60 (IF: 1.9)

14. Sanjeet Kumar Nayak, Somanath Tripathy, SEMKC:Secure & Efficient Computation over Outsourced Data Encrypted under Multiple Keys, IEEE Transactions on Emerging Topics in Computing, Volume 9, Issue 1, pp 414-428,(2018). https://doi.org/10.1109/TETC.2018.2859051. (IF: 4.989, H5: 42)

13. Sanjeet Kumar Nayak, Somanath Tripathy, SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage, IEEE Transactions on Services Computing,(2018),1939-1374. https://doi.org/10.1109/TSC.2018.2820713. (IF: 5.707, H5: 50)

12. Subho Shankar Basu, Somanath Tripathy, Securing Multicast Group Communication in IoT-Enabled Systems, IETE Technical Review (Taylor & Francis),(2018),0256-4602. https://doi.org/10.1080/02564602.2017.1407681 (IF: 1.618, H5: 19)

11. Nemi Chandra Rathore, Somanath Tripathy, A Trust-based Collaborative Access Control Model with Policy Aggregation for Online Social Networks, Social Network Analysis and Mining (Springer), Volume 7,(2017). https://doi.org/10.1007/s13278-017-0425-6 (IF: 1.61, H5: 25)

10. Rakesh Matam, Somanath Tripathy, Secure Multicast Routing Algorithm for Wireless Mesh Networks, Journal of Computer Networks and Communications (Hindwai), Volume 2016, pp 1-11, (2016). https://doi.org/10.1155/2016/1563464 (IF: 1.56, H5: 13)

9. Tapas Pandit, Rana Barua, Somanath Tripathy, eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (Springer), Volume 5, pp 65-85, (2014). https://doi.org/10.22667/JOWUA.2014.12.31.065 (IF: 1.2)

8. Rakesh Matam, Somanath Tripathy, WRSR: Wormhole Resistant Secure Routing for Wireless Mesh Networks, EURASIP Journal on Wireless Communications and Networking (Springer), Volume 2013, (2013). https://doi.org/10.1186/1687-1499-2013-180 (IF: 1.592, H5: 35)

7. Rakesh Matam, Somanath Tripathy, Improved Heuristics for Multicast Routing in Wireless Mesh Networks, Wireless Networks (Springer), Volume 19, Issue 8, pp 1829-1837, (2013). https://doi.org/10.1007/s11276-013-0575-z (IF: 2.405, H5: 34)

6. Rakesh Matam, Somanath Tripathy, Provably Secure Routing Protocol for Wireless Mesh Networks, International Journal of Network Security, Volume 16, Issue 3, pp 168-178, (2014). (H5: 23)

5. Somanath Tripathy, ESF: An Efficient Security Framework for Wireless Sensor Network, International Journal of Communication Networks and Distributed Systems (Inderscience), Volume 10, Issue 2, pp 176-194, (2013). https://doi.org/10.1504/IJCNDS.2013.051822 (IF: 0.64, H5: 11)

4. Somanath Tripathy and Sukumar Nandi, Cellular Automata-based Authentication for Low-cost RFID Systems, International Journal of Communication Networks and Distributed Systems (Inderscience), Volume 3, Issue 3, pp 199-216, (2009). https://doi.org/10.1504/IJCNDS.2009.026875 (IF: 0.64, H5: 11)

3. Somanath Tripathy and Sukumar Nandi, LCASE: Lightweight Cellular Automatabased Symmetric-key Encryption, International Journal of Network Security, Volume 8, Issue 3, pp 243-252, (2009). (H5: 23)

2. Somanath Tripathy and Sukumar Nandi, Defense Against Outside attacks in Wireless Sensor Networks', Computer Communications journal (Elsevier), Volume 31, Issue 4, pp 818-826, (2008). https://doi.org/10.1016/j.comcom.2007.10.025 (IF: 2.766, H5: 49)

1. Somanath Tripathy and Sukumar Nandi, Secure User-identification and Key Distribution Scheme Preserving Anonymity, International Journal of Security Network (Inderscience), Volume 3, Issue 3, pp 201-205, (2008). https://doi.org/10.1504/IJSN.2008.020094 (H5: 9)

76. Debasmita Manna and Somanath Tripathy, Patch based backdoor attack on Deep Neural Networks , 20th International Conference on Information Systems Security , 16-20 December 2024, LNMIIT, Jaipur, India. ( National : India )

75. Nemichand Rinwa, Harsh Kasyap and Somanath Tripathy, Patch-based Adversarial Attack against DNNs, BuildSEC'24 Building a Secure & Empowered Cyberspace, 19-20 December 2024, IIIT Delhi, India.

74. Partha Sarathi Chakraborty and Somanath Tripathy, SPVPC: Smart Contract based Publicly Verifiable Polynomial Computations, 18th International Conference on Network and System Security (NSS 2024), 20-22 November 2024, Zayed University, Abu Dhabi, UAE. (H5:21, Core Ranking: B)

73. Ankur Jain and Somanath Tripathy, SmartAudit: Smart Contract Vulnerability Detection using Transfer learning, 10th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2024), 20-22 November 2024, Zayed University, Abu Dhabi, UAE. (H5:, Core Ranking: )

72. Ajay Chandra Korlapati, Sanjeet Kumar Nayak, Partha Sarathi Chakraborty and Somanath Tripathy, SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain, The 18th International Conference on Information Security Practice and Experience (ISPEC 2023), 24-25 August 2023, DTU Mødecenter, Denmark. (H5:10, Core Ranking: B)

71. Narendra Singh, Somanath Tripathy, MDLDroid: Multimodal Deep Learning based Android Malware Detection , 19th International Conference on Information Systems Security (ICISS), 2023,NIT Raipur, India. ( National : India )

70. Harsh Kasyap, Somanath Tripathy, and Mauro Conti., HDFL: Private and Robust Federated Learning using Hyperdimensional Computing , 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023), Exeter, UK. (H5:35, Core Ranking: A)

69. Susmita Palmal, Sriparna Saha, Somanath Tripathy, A Multi-modal Graph Convolutional Network for Predicting Human Breast Cancer Prognosis , 29th International Conference on Neural Information Processing (ICONIP), pp 187-198, IIT Indore, India. ( Core Ranking: A)

68. Susmita Palmal, Sriparna Saha, Somanath Tripathy, HIV-1 Protease Cleavage Site Prediction using Stacked Autoencoder with Ensemble of Classifiers , International Joint Conference on Neural Networks (IJCNN), 1-8, 2022, Padova, Italy.

67. Debasmita Manna, Harsh Kasyap, Somanath Tripathy, MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning , 18th International Conference on Information Systems Security (ICISS), 2022, pp 139–154, IIT Tirupati, India.

66. Narendra Singh, Somanath Tripathy, Bruhadeshwar Bezawada, SHIELD: A Multimodal Deep Learning Framework For Android Malware Detection , 18th International Conference on Information Systems Security (ICISS), 2022, pp. 64–83, IIT Tirupati, India.

65. Arvind Kumar, Rakesh Matam, Srinibas Swain, Somanath Tripathy, Mithun Mukherjee, Jaime Lloret, Delay Aware Fault-Tolerant Concurrent Data Collection Trees in Shared IIoT Applications , IEEE Global Communications Conference (IEEE GLOBECOM), 2022, Rio de Janeiro, Brazil. (H5: 63, Core Ranking: B)

64. Badavath Shravan Naik, Somanath Tripathy, Susil Kumar Mohanty, MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle , IEEE Global Communications Conference (IEEE GLOBECOM), 2022, Rio de Janeiro, Brazil. (H5: 63, Core Ranking: B)

63. Partha Sarathi Chakraborty, Puspesh Kumar, Mangesh Shivaji Chandrawanshi, Somanath Tripathy, BASDB: Blockchain assisted Secure Outsourced Database Search , IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), 2022, Pune, India.

62. Partha Sarathi Chakraborty, Mangesh Shivaji Chandrawanshi, Puspesh Kumar, Somanath Tripathy, BSMFS: Blockchain Assisted Secure Multi-Keyword Fuzzy Search Over Encrypted Data , 5th IEEE International Conference on Blockchain, Finland (2022). (H5: 23)

61. Harsh Kasyap, Somanath Tripathy, Hidden Vulnerabilities in Cosine Similarity based Poisoning Defense , 56th Annual Conference on Information Sciences and Systems (CISS 2022), Princeton University, USA, March 9-11, 2022. (H5: 21)

60. Somanath Tripathy, Narendra Singh, Divyanshu N Singh, ADAM: Automatic Detection of Android Malware , 14th International Conference on Security for Information Technology and Communications (SECITC 2021), Romania, November 25-26, 2021.

59. Arpan Manna, Harsh Kasyap, Somanath Tripathy, Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning, 23rd International Conference on Information and Communications Security (ICICS 2021), Chongqing, China, Sept 17-19, 2021. (H5: 11, Core Ranking: B)

58. Somanath Tripathy, Mayank Agarwal, Sandip Chakhraborty, Beyond Uber and Lyft: A Decentralized Cab Consortium over Blockchains, 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure (ACM BSCI 2021), Hong Kong, China, June 7-11, 2021.

57. Bishmita Hazarika, Rakesh Matam, Somanath Tripathy, Multiple RPL Objective Functions for Heterogenous IoT Networks, 35th International Conference on Advanced Information Networking and Applications (AINA-2021) Ryerson University, Toronto, Canada, May 12-14, 2021. (H5: 26, Core Ranking: B)

56. Vikash Kumar Rai, Somanath Tripathy, Jimson Mathew TRGP: A Low-Cost Re-Configurable TRNG-PUF Architecture for IoT, 22nd International Symposium on Quality Electronic Design (ISQED'21) California, USA, April 7-9, 2021. (H5: 16)

55. Parth Parag Kulkarni, Harsh Kasyap, Somanath Tripathy, 'DNet: An Efficient Privacy-preserving Distributed Learning Framework for Healthcare Systems', In: Goswami D., Hoang T.A. (eds) Distributed Computing and Internet Technology. (ICDCIT 2021), Bhubaneswar, India, Jan 7-10, 2021. Lecture Notes in Computer Science, vol 12582. Springer, Cham. https://doi.org/10.1007/978-3-030-65621-8_9 (Core Ranking: C )

54. Rishu Roshan, Rakesh Matam, Mithun Mukherjee, Jaime Lloret, Somanath Tripathy, 'A Secure Task-Offloading Framework for Cooperative Fog Computing Environment', IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM), Taipei, Taiwan, Dec 7-11, 2020, pp. 1-6, doi: 10.1109/GLOBECOM42002.2020.9322509. (Core Ranking: B, H5: 57)

53. Narendra Singh, Harsh Kasyap, Somanath Tripathy, Collaborative Learning Based Effective Malware Detection System, MLCS - International Workshops of ECML PKDD 2020, Ghent, Belgium, In: Koprinska I. et al. (eds) ECML PKDD 2020 Workshops. ECML PKDD Septempber 14, 2020. Communications in Computer and Information Science, vol 1323. Springer, Cham. https://doi.org/10.1007/978-3-030-65965-3_13

52. Vikash Kumar Rai, Somanath Tripathy, and Jimson Mathew, 2SPUF: Machine Learning Attack Resistant SRAM PUF, Third ISEA Conference on Security and Privacy (ISEA-ISAP), Guwahati, India, February 27 - March 1, 2020, pp. 149-154, doi: 10.1109/ISEA-ISAP49340.2020.235013.

51. Somanath Tripathy and Susil Kumar Mohanty, MAPPCN: Multi-hop, Anonymous and Privacy-Preserving Payment Channel Network, International Workshops on Trusted Smart Contracts (WTSC), In Association with International Conference on Financial Cryptography and Data Security (FC 2020), Kota Kinabalu, Malaysia, February 14, 2020, Springer, Cham. https://doi.org/10.1007/978-3-030-54455-3_34

50. Kasturi Dhal, Satyananda Champati Rai, Prasant Kumar Pattnaik, Somanath Tripathy, KeySED:An Efficient Keyword based Search over Encrypted Data in Cloud Environment, International Conference on Data Science and Engineering (ICDSE), Patna, India, Sep 27, 2019, pp. 133-138. DOI: 10.1109/ICDSE47409.2019.8971478

49. Vivek Singh, Kailash Chandra Ray, and Somanath Tripathy, Blind Detection and Classification Algorithm for Smart Audio Monitoring System, IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), Rourkela, India, Dec 16, 2019, pp. 133-138, doi: 10.1109/iSES47678.2019.00038.

48. Chanchal Suman, Somanath Tripathy and Sriparna Saha, An Intrusion Detection System Using Unsupervised Feature Selection, IEEE Region 10 Conference (TENCON), Kochi, India, October 17-20, 2019, pp. 19-24, doi: 10.1109/TENCON.2019.8929510.

47. Jeevan Surya Maddu, Somanath Tripathy, and Sanjeet Kumar Nayak , SDNGuard: An Extension in Software Defined Network to Defend DoS Attack IEEE Region 10 Symposium (TENSYMP), Kolkata, India, 9 June 2019, pp. 44-49, doi: 10.1109/TENSYMP46218.2019.8971302.

46. Sumit Kumar Tetarave, Somanath Tripathy, Secure Opportunistic Data Exchange using Smart Devices in 5G/LTE-A networks, Security and Privacy. ISEA-ISAP 2019. Communications in Computer and Information Science, Singapore January 9-11, 2019, vol 939. Springer https://doi.org/10.1007/978-981-13-7561-3_1.

45. Srikanta Pradhan, Somanath Tripathy, Sukumar Nandi, Blockchain based Security Framework for P2P Filesharing system, IEEE International Conference on Advanced Networks and Telecommunicaiton Systems (ANTS18), Indore, India, December 16-19, 2018. DOI: 10.1109/ANTS.2018.8710078 (H5: 13)

44. Devansh Gupta, Somanath Tripathy, Bodhisatwa Mazumdar, Correlation Power Analysis on KASUMI: Attack and Countermeasure, International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, Kanpur, India, December 15-19, 2018. https://doi.org/10.1007/978-3-030-05072-6_9

43. Nemi Chandra Rathore, Somanath Tripathy, Epidemic model based visibility estimation in Online Social Netowrks, International Conference on Advances in Computing, Communication and Informatics (ICACCI18), Bangalore, India, September 19-22, 2018. DOI: 10.1109/ICACCI.2018.8554671(H5: 24)

42. Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan and Caroline John, eBot: Approach towards modeling an advanced P2P Botnet, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-18), New York, USA, July 31 - August 3, 2018. DOI: 10.1109/TrustCom/BigDataSE.2018.00065 (Core Ranking: A, H5: 24)

41. Sumit Kumar Tetarave, Somanath Tripathy and R. K. Ghosh, GMP2P: Mobile P2P over GSM for efficient file sharing", International Conference on Distributed Computing and Internet Technology(ICDCIT'18), Bhubaneswar, India, January 11 - 13, 2018 https://doi.org/10.1007/978-3-319-72344-0_18 (Core Ranking: C)

40. Sumit Kumar Tetarave, Somanath Tripathy and R. K. Ghosh, VChord: An efficient fille sharing on LTE/GSM Network, International Conference on Distributed Computing and Networking, (ICDCN'18) Varanasi, India, January 4 - 7, 2018 https://doi.org/10.1145/3154273.3154329 (Core Ranking: B, H5: 19)

39. Sanjeet Kumar Nayak and Somanath Tripathy, SEMFS: Secure & Efficient Multi-keyword Fuzzy Search for Cloud Storage, International Conference on Information System Security (ICISS'17), Mumbai, India, December 16 - 20, 2017 https://doi.org/10.1007/978-3-319-72598-7_4 (Core Ranking: B, H5: 11)

38. Vikash Kumar Rai, Somanath Tripathy and Jimson Mathew, Memristor based Random Number Generator: Architectures and Evaluation, International Conference on Smart Computing & Communications 2017 (ICSCC 2017), Kurukshetra, India, December 7 - 8, 2017 https://doi.org/10.1016/j.procs.2017.12.074

37. Srikata Pradhan and Somanath Tripathy, CAP: Collaborative Attack on Pastry, International Conference on Security Of Information And Networks, (SIN'17), Jaipur, India, October 13 - 15, 2017 https://doi.org/10.1145/3136825.3136865

36. Somanath Tripathy and Praveen Kumar, CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy International Network and System Security(NSS 2017), Helsinki, Finland, August 21 - 23, 2017 Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_7 (Core Ranking: B, H5: 10)

35. Sarbpreet, Somanath Tripathy and Jimson Mathew, Design and Evaluationof an IoT Enabled SecureMulti-service Ambulance Tracking System IEEE Region 10 International Conference (TENCON), Singapore 22 - 25 November 2016, DOI: 10.1109/TENCON.2016.7848420

34. Sanjeet Kumar Nayak and Somanath Tripathy, Privacy Preserving Provable Data Possession for Cloud based Electronic Health Record System In Proceedings of 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Pages: 860-867, Tianjin, China, 2016 DOI: 10.1109/TrustCom.2016.0149 (Core Ranking: A, H5: 24)

33. Nemi Chandra Rathore, Somanth Tripathy, Collaborative Access Control Model for Online Social Networks IEEE International Advance Computing Conference(IACC), Bhimavaram, India, page: 19-24, 27-28 Feb. 2016. DOI: 10.1109/IACC.2016.14

32. R. Matam, Somanath Tripathy, Denial of Service attack on Low Rate Wireless Personal Area Networks National Conference on Communications (NCC), Guwahati, India, 2016 DOI: 10.1109/NCC.2016.7561148 (H5: 15)

31. N.C. Rathore, Prashant Shaw and Somanath Tripathy, Collaborative Access Control Mechanism for Online Social Networks, International Conference on Distributed Computing and Internet Technology(ICDCIT), Bhubaneswar, India, 25 December 2015 Cham. https://doi.org/10.1007/978-3-319-28034-9_19 (Core Ranking: C)

30. Subho Shankar Basu, Somanath Tripathy and Atanu Roy Chowdhury, Design challenges and Security issues in the Internet of Things, IEEE Region 10 Symposium, Ahmedabad, India, 13th May - 15th May 2015, DOI: 10.1109/TENSYMP.2015.25

29. S.K. Teterave, Somanath Tripathy and S. Peri, S-Gossip: Security enhanced Gossip Protocol for Unstructured P2P Networks, International Conference on Distributed Computing and Internet Technology(ICDCIT), Bhubaneswar, India, 5-8 February 2015. Cham. https://doi.org/10.1007/978-3-319-14977-6_28 (Core Ranking: C)

28. N. C. Rathor, Somanath Tripathy and J. Chandra, Predicting User Visibility in Online Social Network using Local Connectivity Properties International Conference on Distributed Computing and Internet Technology(ICDCIT), Bhubaneswar, India, 5-8 February 2015. Springer, Cham. https://doi.org/10.1007/978-3-319-14977-6_46 (Core Ranking: C)

27. Amandeep Singh and Somanath Tripathy, TabSol:An efficient framework to defend Tabnabbing International Conference on Information Technology (ICIT), Bhubaneswar, India, 22-24 Dec. 2014 DOI: 10.1109/ICIT.2014.56

26. Tapas Pandit, Rana Barua, and Somanath Tripathy, eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect forward Secrecy International Conference on Network and System Security (NSS2015), New York, USA, 3-5 November 2015 Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_33 (Core Ranking: B)

25. R. Matam, Somanath Tripathy, B. Swathi, Provably Secure Peer-Link Establishment Protocol for Wireless Mesh Networks International Conference on Advances in Computing, Communications and Informatics (ICACCI), Delhi, India, 24-27 Sept. 2014 DOI: 10.1109/ICACCI.2014.6968300

24. R. Matam and Somanath Tripathy, AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, 2013. DOI: 10.1109/TrustCom.2013.13 (Core Ranking: A, H5: 24)

23. Rakesh Matam, Somanath Tripathy, Defence against Wormhole Attacks in Wireless Mesh Networks, International Conference on Information Systems Security (ICISS-2012), Guwahati, India, 15-19 December 2012. https://doi.org/10.1007/978-3-642-35130-3_13 (Core Ranking: B)

22. Somanath Tripathy, Debasish Sahoo, WAKE: Authentication and Key Establishment for Wireless Mesh Network, International Conference on Security in Computer Networks and Distributed Systems(SNDS 2012), Trivandrum, India, 11-12 October 2012 https://doi.org/10.1007/978-3-642-34135-9_7

21. Rakesh Matam & Somanath Tripathy, Reliability Enhanced Routing Protocol for Wireless Mesh Networks, In Proc. of Springer LNCS, 4th International Conference on wireless and mobile networks(WiMoN), Chennai, India 2012. https://doi.org/10.1007/978-3-642-31513-8_60

20. Bhumireddy Swathi, Somanath Tripathy & Rakesh Matam, Secure Peer-Link Establishment in Wireless Mesh Networks, In proc. of Springer LNCS, 5th International Conference on network security and its applications (CNSA), Chennai, India July 13-15, 2012. https://doi.org/10.1007/978-3-642-31513-8_19

19. Madhumita Mishra, Somanath Tripathy & Sathya Peri, SEPastry: Security Enhanced Pastry In proc. of Springer LNCS, 2nd International Workshop on Peer to Peer Networks and Trust Management, (P2PTM), Chennai,India July 13-15, 2012. https://doi.org/10.1007/978-3-642-31513-8_80

18. Rakesh. Matam and Somanath Tripathy, FRI-Attack: Fraduelent Routing Information Attack on Wireless Mesh Network, Intl. conference on wireless Technology for Humanitarian Relief (ACWR 2011), India, December 2011 https://doi.org/10.1145/2185216.2185307

17. Rakesh Matam & Somanath Tripathy, THWMP - Trust based secure routing for wireless mesh networks, In ACM proc. of International conference on communication computing and security-2011, NIT Rourkela, Rourkela India February 2011. https://doi.org/10.1145/1947940.1947950

16. Somanath Tripathy, Tin-Key: Effective Key-Establishment for Wireless Sensor Networks IEEE International Symposium on Trust Privacy and Security for emergent applications (TSP2010), Bradford, UK, 29 June-1 July 2010. DOI: 10.1109/CIT.2010.170

15. Somanath Tripathy, Effective Pair-wise Key Establishment Scheme for Wireless Sensor Networks, in proc. Of International Conference on Security of Information and Networks (SIN 2009), ACM Publisher, October 2009. https://doi.org/10.1145/1626195.1626236

14. Rahul Choudhari and Somanath Tripathy: SCTP-Sec: Secure Transmission Control Protocol, 3rd Hackers' Workshop on Computer and Internet Security, Hackin-2009, pp 44-49, IIT Kanpur, March 17-19, 2009.

13. Somanath Tripathy, LISA: LIghtweight Security Algorithm for Wireless Sensor Networks, International Conference on Distributed Computing and Internet Technology(ICDCIT 2007), Bangalore India, 17-20 December 2007. https://doi.org/10.1007/978-3-540-77115-9_13 (Core Ranking: C)

12. V.Chennakesavulu, Sukumar Nandi, Somanath Tripathy, OSASMAC: Opportunistic Secure Adaptive Sensor MAC Protocol, International Conference on Information Technology (ICIT), Rourkela, India 17-20 Dec. 2007 DOI: 10.1109/ICIT.2007.36

11. Somanath Tripathy, Sukumar Nandi and Abhijit Mitra, 'A Secured Response Algorithm with Query Authentication for Wireless Sensor Networks, 5th Asian International Mobile Computing Conference, AMOC-2007, Tata Mcgrawhill Publication, pp.220-225, 2007, India.

10. Atanu Roy Chowdhury, Somanath Tripathy and Sukumar Nandi, Securing Wireless Sensor Networks Against Spurious Injections, International Conference on Communication Systems Software and Middleware (COMSWARE), Bangalore, India 7-12 Jan. 2007, DOI: 10.1109/COMSWA.2007.382600

9. Somanath Tripathy, Sukumar Nandi and Atanu Roy Chowdhury, CARMA: Cellular Automata-based Remote Mutual Authentication International Conference on Information Technology (ICIT), Bhubaneswar, India 18-21 Dec. 2006, DOI: 10.1109/ICIT.2006.35

8. Somanath Tripathy and Sukumar Nandi, Efficient Remote User Authentication and Key Establishment for Multi-Server Environment, International Conference on Distributed Computing and Internet Technology(ICDCIT 2006), Bhubaneswar, India 20-23 December 2006, https://doi.org/10.1007/11951957_30 (Core Ranking: C)

7. Somanath Tripathy and Sukumar Nandi, Security Enhanced used Identification and Distribution Scheme preserving Anonymity, in Proc. of Intl. Conf. on Emerging Applications of IT (EAIT 2006), Elsevier, pp.201-204, 2006, (India).

6. Somanath Tripathy and Sukumar Nandi, RPAKE: RCA based Password Authenticated Key-Exchange scheme, IEEE India Conference (INDICON), New Delhi, India 15-17 Sept. 2006, DOI: 10.1109/INDCON.2006.302796

5. Somanath Tripathy and Sukumar Nandi, Robust Mutual Authentication for low cost RFID systems, IEEE International Conference on Industrial Informatics (INDIN), Singapore, 16-18 Aug. 2006. DOI: 10.1109/INDIN.2006.275705 (H5: 21)

4. Somanath Tripathy and Sukumar Nandi: Cryptosystem for Low power devices, 4th International Symposium on Turbo Codes & Related Topics; 6th International ITG-Conference on Source and Channel Coding, Munich, Germany 3-7 April 2006, ISBN:978-3-8007-2947-0

3. Somanath Tripathy, Atanu Roy Chowdhury and Sukumar Nandi: CARA: Cellular Automata based Remote user authentication, International Conference on Communication Systems Software and Middleware (COMSWARE), New Delhi, India 8-12 Jan. 2006, DOI: 10.1109/COMSWA.2006.1665158

2. Somanath Tripathy and Sukumar Nandi, CASE: Cellular Automata based Symmetric Encryption, Third International Conference on Innovative Applications of Information Technology for Developing World, AACC 2005, 2005, (Nepal). https://doi.org/10.1142/9781860948534_0020

1. Somanath Tripathy, Sukumar Nandi, Broadcast on Demand: A heuristic for real-time multiple data broadcast strategy in mobile environments, Asia Pacific Conference on Parallel and Distributed Computing Technologies (ObComAPC-2004), (India)

4. Chanchal Suman, Somanath Tripathy, and Sriparna Saha, 'Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework', arXiv preprint arXiv:1905.06562, 2019.

3. Nemi Chandra Rathore, Somanath Tripathy, 'InfoRest: Restricting Privacy Leakage to Online Social Network App', arXiv preprint arXiv:1905.06403, 2019.

2. Sumit Kumar Tetarave, Somanath Tripathy, 'Robust Node ID Assignment for Mobile P2P Networks', arXiv preprint arXiv:1905.05388, 2019.

1. Sumit Kumar Tetarave, Somanath Tripathy, and R K Ghosh, 'Enhancing Quality of Experience using DHT Overlay on Device-to-Device Communications in LTE-A Networks', arXiv preprint arXiv:1905.02381, 2019.

6.Rakesh Matam Somanath Tripathy, "Task offloading using fog analytics" , Managing Internet of Things Applications across Edge and Cloud Data Centres, IET Digital Library, 2024 .

5. Somanath Tripathy, Rudrapatna K. Shyamasundar, and Rajiv Ranjan, "17th International Conference on Information Systems Security" , Springer, ICISS 2021, Patna, India, December 16–20, 2021.

4. Subhendu Kumar Pani, Somanath Tripathy, George Jandieri, Sumit Kundu, and Talal Ashraf Butt, "Applications of Machine Learning in Big-Data Analytics and Cloud Computing" , River Publishers Series in Computing and Information Science and Technology, River Publishers, 2021.

3. Vikash Kumar Rai, Somanath Tripathy, and Jimson Mathew, "Multi-bit True Random Number Generator for IoT Devices using Memristor" , Security of Internet of Things Nodes, Chapman and Hall/CRC, 2021.

2. S. Dehuri and S. Tripathy, "An Extended Bayesian/HAPSO Intelligent Method in Intrusion Detection System ". In S. Dehuri and S.-B. Cho (Eds.) Knowledge Mining Using Intelligent Agents, Imperial College Press, pp. 133-160, 2010.

1. Subho Shankar Basu, Somanath Tripathy, "Secure Multicast Communication Techniques for IoT", Security and Fault Tolerance in Internet of Things. Page Springer, Cham, 2019. DOI: 10.1007/978-3-030-02807-7_3

1. Vikash Kumar Rai, Somanath Tripathy and Jimson Mathew, 'A hybrid multi bit random number generator', filed (LRN No: P2572-IN)

Copyright Dr. Somanath Tripathy