BITS Pilani

  • Page last updated on Wednesday, April 03, 2024

Publications

banner
Publications

Latest Publications

 

Research Publications
  2024
1. S Rasagna Vakkalanka, G Geethakumari, Jinil Bhavin Shah and Nisarg Chaudhari, "Task Integrity Checker: A Blockchain-Enabled Trust Management System for Fog Nodes", Accepted at the 20th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC 2024), May 27-31, 2024, Cyprus.

 2022

Workshop Speaker in the Workshop on IoT Security

organized by iHub and HCI Foundation, IIT Mandi, Dec 9-10, 2022. 
 
1. S Rasagna Vakkalanka, G Geethakumari and Jay Patel, "Securing Fog Nodes against On-Off Attacks using Subjective Logic", Proceedings of the IEEE ANTS 2022 Workshop on Fog Computing, Dec 18-21, 2022, India.
 
Tutorial Chair: IEEE ANTS 2021 
 
Workshop Speaker in IEEE ANTS 2021
Title: Routing Security in RPL - based Internet of Things Environment
Speakers: Dr Rashmi Sahay and Prof. G Geethakumari 
 
Research Publications

 2021 

1. Rashmi Sahay, G. Geethakumari and Barsha Mitra, "Mitigating the Worst Parent Attack in RPL based Internet of Things”, Springer Cluster Computing Journal, December 2021, Impact Factor: 2.04, SCI-indexed.

2. Rashmi Sahay, G. Geethakumari and Barsha Mitra, "IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs", Proceedings of the the IEEE ANTS 2021 International  Conference, Dec 13 - 16, 2021, Hyderabad, India.

3.Rashmi Sahay, G. Geethakumari and Barsha Mitra, "A  Novel   Network  Partitioning  Attack  against  Routing Protocol in Internet of Things”, Elsevier Ad Hoc Networks Journal, June   2021. SCIE- Indexed, Impact Factor: 3.64, H-Index 94, SJR-0.78.

4. Rashmi Sahay, G. Geethakumari and Barsha Mitra, “A Holistic Framework for Prediction of Routing Attacks in IoT”, The Journal of Supercomputing, Springer, June 2021, SCI Indexed, Impact Factor: 2.6, H-Index 61, SJR-0.45 

 
5. D Radha Rani and G Geethakumari, “A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment”, Springer Peer-to-Peer Networking and Applications Journal, SCI indexed, Vol 14, 2385–2398 (2021). Impact Factor: 3.6, DOI: https://doi.org/10.1007/s12083-020-00975-6
 
2020 
1. Rashmi Sahay, G. Geethakumari and Barsha Mitra, “Partitioning Attacks against RPL in the Internet of Things Environment”, Proceedings of the 26th (Virtual) Annual International Conference on Advanced Computing and Communications (ADCOM 2020), Dec 16-18, 2020, India. CORE Ranking: B
2. Rashmi Sahay, G. Geethakumari and Barsha Mitra, “Blockchain based Framework to Secure IoT - LLNs against Routing Attacks”, Springer Computing Journal, 2020, SCI Indexed, Impact Factor: 2.06, H-Index 51, SJR-0.42; Computing, 102(11), 2445-2470; DOI: 10.1007/s00607-020-00823-8

3. Rashmi Sahay, G Geethakumari and Barsha Mitra"A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs", Proceedings of the 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGrid 2020) Conference, May 2020, Melbourne, AustraliaCORE Ranking: A

4. Prajwal Ravishankar and G Geethakumari, “Classification of IoT Binaries in Resource Constrained Environments”, Proceedings of the IEEE International Conference on Convergence to Digital World (IEEE ICCDW 2020), February 18 – 20, 2020, India.

5. D Radha Rani and G Geethakumari, “Secure Data Transmission and Detection of Anti-Forensic Attack in Cloud Environment  using MECC and DLMNN”, Elsevier Computer Communications Journal, SCI-E indexed, Impact Factor: 2.766, Elsevier, Vol(150), pp 799 - 810, January, 2020.

 

 2019 

 Invited Talk:  
Prof.G Geethakumari gave an invited talk on “Cloud Computing Security” at the Workshop on “Virtualization and Cloud Computing” organized by the UGC – Human Resource Development Centre (UGC – HRDC), JNTUH on February 14, 2019.
 

1. Ramnath Kumar and G Geethakumari, “Temporal Dynamics and Spatial Content in  IoT Malware Detection”, Proceedings of the IEEE TENCON 2019, the flagship premier international technical conference of IEEE Region 10, October 17 – 20, 2019, India: Ranking: Core-C; DOI: https://ieeexplore.ieee.org/document/8929496

 

2. BKSP Kumar Raju and G Geethakumari, “SNAPS: Towards Building Snapshot based Provenance System for Virtual Machines in the Cloud Environment”, Elsevier Computers and Security Journal, June, 2019. (Impact Factor: 2.65; SCI-E indexed); https://doi.org/10.1016/j.cose.2019.05.020

 

3. Rashmi Sahay, G Geethakumari, Barsha Mitra and Naman Goyal, “Investigating Packet Dropping Attacks in RPL-DODAG in IoT", Proceedings of the 5th IEEE International Conference for Convergence in Technology, 2019 (IEEE I2CT 2019), IEEE Explore (Scopus-indexed), March 29 - 31, 2019, India. 

 

4. Mohit Goyal, Ipsit Sahoo and G Geethakumari, “HTTP Botnet Detection in IOT Devices using Network Traffic Analysis”,  Proceedings of the IEEE International Conference on Recent Advances on Energy Efficient Computing and Communication (ICRAECC -2019), IEEE Explore (Scopus-indexed), March 7 - 8, 2019, India. DOI: https://ieeexplore.ieee.org/document/8995160

 
 2018:
Invited Talk 1: Prof. Geetha gave an invited talk on "Embedded System Security" at the Defense Electronics Research Lab (DLRL), DRDO, Hyderabad, on December 12th, 2018.
 
Invited Talk2: Prof. G Geethakumari gave an invited talk on “Introduction to Cloud Forensics and its Challenges”, at the Training Programme for experts from BIMSTEC Countries (Bangladesh, India, Myanmar, Sri Lanka, Thailand , Nepal and Bhutan), on November 16th, 2018 at the Central Forensic Science Laboratory (CFSL), Hyderabad. The event was jointly organized by National Investigation Agency (NIA), Ministry of Home Affairs, Govt. of India and CFSL, Ministry of Home Affairs, Govt. of India. 
 
Research Papers: 
 
1.Rashmi Sahay, G Geethakumari, Barsha Mitra and Ipsit Sahoo, “Efficient Framework for Detection of Version Number Attack in Internet of Things", Proceedings of  the 18th International  Conference  on Intelligent Systems Design  and Applications, (ISDA 2018), Springer  (SCI-indexed), Dec 6 - 8, 2018, India. 
 

2.Rashmi Sahay, G Geethakumari, Barsha Mitra and V Thejas, “Exponential Smoothing Based Approach for Detection of Blackhole Attacks in IoT", Proceedings of the 12th IEEE International Conference on Advanced Networks and Telecommunications Systems (IEEE ANTS 2018), IEEE Explore (Scopus-indexed), December 16 - 19, 2018, India. 

 

3.Rashmi Sahay, G Geethakumari, Koushik Modugu and Barsha Mitra, “Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism", Proceedings of the 9th IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2018), IEEE Explore (Scopus - indexed), November 18 - 21, 2018, India. 

 

4.Rashmi Sahay, G Geethakumari and Koushik Modugu, “Attack Graph-Based Vulnerability Assessment of Rank Property in RPL-6LOWPAN in IoT”, Proceedings of the IEEE 4th World Forum on Internet of Things (WF- IoT 2018), 05-08, February, 2018, Singapore. DOI: 10.1109/WF-IoT.2018.8355171., Scopus-indexed.

2017:

Tutorial Speaker:
Dr G Geethakumari presented a Tutorial Session on “Cloud Based Malware Mitigation Techniques for Securing Internet of Things Environment”at the 11th IEEE International Conference on Advanced Networks and Telecommunications Systems (IEEE ANTS) 2017, on December 17, 2017 at Bhubaneswar, Odisha, India. 
 
1. Agrima Srivastava and G Geethakumari, "Privacy Preserving solution to prevent Inference Attacks in Online Social Networks", International Journal of Data Sciences, Inderscience Publishers, 2017. (Indexed in cnpLINKer (CNPIEC), Google Scholar and RePEc).
 
2. BKSP Kumar Raju, Nikhil Bharadwaj Gosala and G Geethakumari, "CLOSER: Applying Aggregation for Effective Event Reconstruction of Cloud Service Logs”, Proceedings of the 11th ACM International Conference on Ubiquitous Information Management and Communication, (ACM IMCOM 2017), Beppu, Japan, January 5-7, 2017. 
 

2016:

1. BKSP Kumar Raju, and G Geethakumari, "'Timeline based Cloud Event Reconstruction Framework for Virtual Machine Artifacts”, Special issue of Digital Communications and Networks, Elsevier Journal, 2016

2. BKSP Kumar Raju, Bhupendra Moharil and G Geethakumari, "FaaSeC: Enabling Forensics-as-a-Service for Cloud Computing Systems”, Proceedings of the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Dec 6-9, 2016.

3. BKSP Kumar Raju and G Geethakumari, "Event Correlation in Cloud: A Forensic perspective", Springer Computing Journal, November 2016, Volume 98, Issue 11, pp 1203–1224.

4.BKSP Kumar Raju and G Geethakumari, "Timeline based Cloud Event Reconstruction Framework for Virtual Machine Artifacts", Proceedings of the 4th Springer International Conference on Advanced Computing, Networking, and Informatics (ICACNI 2016), 22-24 September 2016, India. Springer Proceedings.

5. Meera G and G Geethakumari, "VMI-driven Forensic Aware Memory Monitoring System in the Cloud: A Concept Map", 4th IEEE International Conference on Advanced Computing, Networking, and Informatics (ICACNI 2016), 22-24 September 2016, India.

6.D Radha Rani and G Geethakumari, "A Framework for Detecting Anti-forensics in Cloud Environment", Proceedings of the IEEE ICCCA- 2016 International Conference,     29-30 April 2016, India, Proceedings in IEEE Explore.

7. BKSP Kumar Raju and G Geethakumari, "An advanced forensic readiness model for the cloud environment", Proceedings of the IEEE ICCCA- 2016 International Conference, 29-30 April 2016, India, Proceedings in IEEE Explore.

8. Sagi Sai Sruthi and G Geethakumari, "An Efficient Secure Data Aggregation Technique for Internet of Things Network: An Integrated Approach using DB-MAC and Multi-Path Topology" Proceedings of the 6th IEEE International Advance Computing Conference (IACC - 2016), 27-28 February 2016, India.

9. Meera G and G Geethakumari, "Event Correlation for Log Analysis in the Cloud" Proceedings of the 6th IEEE International Advance Computing Conference (IACC - 2016), 27-28 February 2016, India.

2015: 

Tutorial Speaker:

Presented a tutorial on “Data Protection and Privacy Preservation in the Internet of Things", at the IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI-2015), August 10 - 13, 2015, India. 

 

1. B K S P Kumar Raju, Meera G and G Geethakumari, “Cloud Forensic Investigation: A sneak peak into acquisition", Proceedings of the Symposium on Emerging Topics in Computing and Communications (SETCAC'2015), December 16 - 19, 2015, India.
 

2. Agrima Srivastava and G Geethakumari, “A framework for improving privacy strength of Online Social Network user profile", Proceedings of the Grace Hopper Celebration India (GHCI) 2015 conference, December 2 – 4, 2015.

3. Agrima Srivastava and G Geethakumari, “Determining privacy utility trade-off for Online Social Network data publishing”, Proceedings of the IEEE INDICON 2015, December 17 – 20, 2015, India. Proceedings to appear in the IEEE Explore. (Received the best paper award).

4. Digambar Powar and G Geethakumari, “Digital Forensic Architecture for Cloud Computing Systems: Methods of Evidence Identification, Segregation, Collection and Partial Analysis”, Proceedings of the Third International Conference on INformation systems Design and Intelligent Applications-INDIA-2016, 8-9, January 2016. Proceedings in the “Advances in Intelligent Systems and Computing (AISC) series” Springer.

5. D Radha Rani and G Geethakumari, “A meta-analysis of cloud forensic frameworks and tools”, Proceedings of the IEEE International Conference on Power, Control, Communication and Computational Technologies for Sustainable Growth (IEEE PCCCTSG 2015), December 11 – 12, 2015, India, Proceedings in IEEE Explore.

6. K.P Krishna Kumar and G Geethakumari, “Information Diffusion Modelling to Counter Semantic Attacks in Online Social Networks”, Proceedings of the Ph.D. Forum of IEEE ADCOM 2015 International Conference, September 18 – 20, 2015, India. Proceedings to appear in the IEEE Explore.

7. BKSP Kumar Raju and G Geethakumari, “A Trigger based Introspection Approach for Cloud Incident Handling”, International Journal of Big Data Intelligence (IJBDI), Inderscience Publishers, 2015.

8. S. Saibharath and G Geethakumari, “Pre processing of Evidences from Cloud components for effective forensic analysis”, Proceedings of the Fourth IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI-2015, August 10-13, 2015, India. (Received the Best Paper Award)

9. S. Saibharath and G Geethakumari, “Cloud Forensics: Evidence Collection and Preliminary Analysis”, Proceedings of the IEEE International Advanced Computing Conference, IEEE IACC 2015, June 12-13, 2015, India.

10. Meera G, B K S P Kumar Raju and G Geethakumari, “A strategy for enabling forensic investigation in cloud IaaS”, Proceedings of the 2015 IEEE International Conference on Electrical, Computer and Communication Technologies,– IEEE ICECCT 2015, March 05-07, 2015, India, Proceedings in IEEE Explore.

11. Meera G and G Geethakumari, “A Provenance Auditing Framework for Cloud Computing Systems”, Proceedings of the IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems 2015, (IEEE SPICES 2015), February 19-21, 2015, India, Proceedings in IEEE Explore.

12. B K S P Kumar Raju and G Geethakumari, “A Digital Forensic Model for Introspection of Virtual Machines in Cloud Computing”, Proceedings of the IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems 2015, (IEEE SPICES 2015), February 19-21, 2015, India, Proceedings in IEEE Explore.

13. D Radha Rani and G Geethakumari, “An Efficient Approach to Forensic Investigation in Cloud Using VM Snapshots”, Proceedings of the IEEE International Conference on Pervasive Computing (IEEE ICPC 2015), January 8 – 10, 2015, India, Proceedings in IEEE Explore.

 

 2014:

1. Agrima Srivastava and G Geethakumari, “Privacy Landscape in Online Social Networks”, International Journal of Trust Management in Computing and Communications, Inderscience Publishers, ISSN online: 2048-8386, ISSN print: 2048-8378, 2014.

 

2. Digambar Powar, Saibharath, G.Geethakumari, "Real-time digital forensic triaging for cloud data analysis using MapReduce on Hadoop framework", International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, ISSN: 1751-911X (Print), ISSN: 1751-9128 (Online), 2014.

 

3. KP Krishna Kumar, Agrima Srivastava and G Geethakumari, “A Psychometric Analysis of Information Propagation in Online Social Networks using Latent Trait Theory”, Journal of 'Computing’, Springer publishers, 2014.

 

4. B K S P Kumar Raju and G Geethakumari, “A Model for Trust Enhancement in Cloud Computing”, Proceedings of the IEEE International Conference on Computing and Communication Technologies – ICCCT2014, December 11-13, 2014, India, Proceedings in IEEE Explore.

 

5. B K S P Kumar Raju and G Geethakumari, “A Novel Approach for Incident Response in Cloud Using Forensics”, Proceedings of the ACM COMPUTE 2014, October 9-11, 2014, India; Proceedings in ACM Digital Library.

 

6. K P Krishna Kumar and G Geethakumari, "Analysis and Modeling of Semantic Attacks in Online Social Networks", International Journal of Trust Management in Computing and Communications (IJTMCC), ISSN: 2048-8378 (Print), 2048-8386 (Online), 2014, Inder Science Publishers.

 

7. Saibharath S and G Geethakumari, "Design and Implementation of a forensic framework for Cloud in Openstack cloud platform", Proceedings of the IEEE International Symposium on Cloud Computing: Architecture, Applications and Approaches (CCA-2014), September 24-27, 2014, India; IEEE Explore and A & I Databases.

 

8. Agrima Srivastava and G Geethakumari, "Quantifying direct trust for private information sharing in an Online Social Network", Proceedings of the International Symposium on Intelligent Informatics (ISI’14), September 24-27, 2014, India; Proceedings in the Journal Advances in Intelligent and Soft Computing (Springer) Series.

 

9. Digambar Powar and G Geethakumari, "A Heuristic Model for performing Digital Forensics in Cloud Computing Environment", Security in Computing and Communications: Springer, Communications in Computer and Information Science, Volume 467, 2014, pp 341-352.

 

10. K P Krishna Kumar and G Geethakumari, "Detecting Misinformation in Online Social Networks using Cognitive Psychology", Springer Journal: Human-centric Computing and Information Sciences - HCIS-D-14-00002, 2014.

 

11. Agrima Srivastava and G Geethakumari, "A Privacy Settings Recommender System for Online Social Networks", Proceedings of the IEEE International Conference on Recent Advances & Innovations in Engineering” - (ICRAIE-2014), May 09-11, 2014, India.

 

12. Agrima Srivastava, K P Krishna Kumar and G Geethakumari, "Preserving privacy in online social networks using the graph structural analysis", Proceedings of the International Conference on Advances in Computing, Communications and Information Science, ACCIS - 14, June 26 - 28, 2014, India. Proceedings in Elsevier India.

 

13. K P Krishna Kumar, G. Geetha Kumari and Agrima Srivastava, "Preventing Disinformation Cascades using Behavioural Trust in Online Social Networks", Proceedings of the International Conference on Advances in Computing, Communications and Information Science, ACCIS - 14, June 26 - 28, 2014, India. Proceedings in Elsevier India.

 

14. K P Krishna Kumar and G Geethakumari, "Identifying Sources of Misinformation in Online Social Networks", Proceedings of the International Symposium on Signal Processing and Intelligent Recognition Systems, (SIRS-2014), March 13-15, 2014 Technopark, Trivandrum, India, Proceedings in Springer Series: Advances in Intelligent and Soft Computing Journal, Special Volume, pp 417 - 428, (Received the Best paper award).

 

15. K P Krishna Kumar and G Geethakumari, "Analysis of Semantic Attacks in Online Social Networks", Proceedings of the International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), March 13-14, 2014 Technopark, Trivandrum, India, Proceedings in Springer Series: Communications in Computer and Information Science Series (CCIS), ISSN: 1865:0929.

 

16. K P Krishna Kumar and G Geethakumari, "A Taxonomy for Modeling and Analysis of Diffusion of (mis)information in Social Networks", International Journal of Communication Networks and Distributed Systems, Inderscience Publishers, Vol 13, No.2, 2014, pp 119 -143.

 

 

2013:

1. Agrima Srivastava and G Geethakumari, "A Framework to Customize Privacy Settings of Online Social Network Users", Proceedings of the IEEE International Conference on Recent Advances in Intelligent Computational Systems (RAICS) 2013, December 19 - 21, 2013, India.

 

2. Agrima Srivastava and G Geethakumari, "Measuring Privacy Leaks in Online Social Networks", Proceedings of the IEEE ICACCI-2013: Proceedings of the International Symposium on Women in Computing and Informatics (WCI-2013), August 22 - 25, Mysore, India, 2013, pp 1172 - 1177.

 

3. KP Krishna Kumar and G Geethakumari, "Analysing Spread of Misinformation in Online Social Networks using Cognitive Psychology", Proceedings of the International Conference on Behavioral, Cognitive and Pyschological Sciences (BCPS2013), November 18-19,2013, London, U.K, Accepted Paper.

 

4. KP Krishna Kumar and G Geethakumari, "Information Diffusion Model for Spread of Misinformation in Online Social Networks", Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI-2013), August 22-25, 2013, Mysore, India.

 

5. K P Krishna Kumar and G Geethakumari, "Modeling Semantic Attacks in Social Networks", Proceedings of the IEEE International Conference on Informatics, Electronics and Vision (ICIEV), May 17 - 18, 2013, Dhaka, Bangladesh.

Previous Publications

  • G.Geethakumari, Atul Negi and V N Sastry, "RBGDM-A Role Based Grid Delegation Model",International Journal of Computer Science and Security, Vol 2, Issue 1, pp 61-72, 2008.
  • G Geethakumari, Atul Negi and V N Sastry, "A Cross-Domain Role Mapping and Authorization Framework for RBAC in Grid Systems", International Journal of Computer Science and Applications, December 2008.
  • G Geethakumari, Srikanth Jampala, T.L.Prasanna Venkatesan, Atul Negi and V.N.Sastry, "Multi-Domain Delegation and Revocation Model for Grid Systems", IEEE TENCON 2008 Conference, Hyderabad, India, Nov 18-21, 2008.
  • G Geethakumari, Prasanna Venkatesan, Srikanth Jampala, Atul Negi and V N Sastry Role-Based Access control Architecture for Delegation in Multi Domain Grid Environments, IEEE International Conference on e-Science and Grid Computing e-Science 2007, Bangalore, India, December 2007.
  • G Geethakumari, Prasanna Venkatesan, Srikanth Jampala, Atul Negi and V N Sastry, "A Ranking Based Cross Domain Role Mapping and Authorization Architecture for Grid Computing Systems", Proceedings of the IEEE Hi-Performance Computing Conference (HiPC 2007),Goa, India, December 2007.
  • G Geethakumari, Atul Negi and V N Sastry, "Indirect Authorization Topologies for Grid Access Control", Proceedings of the International Conference on Information Technology ICIT 2006, Bhubaneswar, India, December 2006, pp 186 – 187.
  • G Geethakumari, Atul Negi and VNSastry,"A Fine-Grained Access Framework for Grids using Fuzzy Inference Systems", Proceedings of the Mexican Conference on Information Security, MCIS 2006, Mexico, November 13-17, 2006.
  • G Geethakumari, Atul Negi and V N Sastry, "Grid Security Through Delegation of Roles", Proceedings of the IEEE TENCON 2006, Hong-Kong, November 2006, pp 1 - 4.
  • G Geethakumari, Atul Negi and V N Sastry, "Dynamic Delegation Approach for Access Control in Grids", Proceedings of the IEEE International Conference on e-Science and Grid Computing (e-Science2005), Australia, Dec 2005, pp 387-394

Quick Links

    An Institution Deemed to be University estd. vide Sec.3 of the UGC Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

    © 2024 Centre for Software Development,SDET Unit, BITS-Pilani, India.

    Designed and developed by fractal | ink design studios