60 Years of Excellence
Home | Contact Us | Webmail
Quick Links

Dr. Suvasini Panigrahi  [Computer Science & Engineering]

Suvasini Panigrahi
Name : Dr. Suvasini Panigrahi
Designation : Associate Professor
Phone No. :
Email Id : spanigrahi_cse@vssut.ac.in
Date of Birth : 1 st July 1980
Date of Joining : 01-07-2013
  • Qualification

    B.Tech. (CSE, Utkal University, 2002), M. Tech. (Comp. Sc., Utkal University, 2004) Ph.D., (Engg., IIT Kharagpur, 2010)
  • Specialization

    Database and Information Security
  • Experience

    Teaching : 08 Years completed and continuing
    Research : 03 Years
    Industry : Nil
    Others : Worked for 4 months as project trainee at TCS, Kolkata
  • Subject Teaching

    Graduate Level

    : Computer Programming, Operating System, Database Engineering, Computer Graphics & Multimedia, Computer Architecture

    Post Graduate Level

    : Intrusion Detection Systems, Advanced Database Management Systems
  • Research Area

    Database and Information Security, Wireless Sensor Networks
  • Research Guidance

    Ph. D. Candidates

    : 01 (Awarded), 03 (Continuing)

    M. Tech. Candidates

    : 04 (Completed) and 02 (Continuing)
  • Awards & Honours

    DATA TO BE UPDATED...
  • Members of Professional Bodies

    Lifetime member of Odisha Information Technology Society (OITS)
  • Sponsored Projects & Consultancy

    1.Project Title - Survivable Information System Architecture with Intrusion tolerance, Containment and Recovery in Distributed Environment (RDE).
    Sponsor - Department of Information Technology (DIT), Ministry of Communications and Information Technology, Government of India.Value - Rs. 5,500,000, Duration - 3.5 Years.
    PRINCIPAL INVESTIGATOR (SUPERVISOR) - Prof. Shamik Sural, Professor, School of Information Technology, IIT Kharagpur, India.
    CO-PRINCIPAL INVESTIGATOR - Prof. A. K. Majumdar, Professor, Department of CSE, IIT Kharagpur, India
    Undertaken at - School of Information Technology, IIT Kharagpur, India.
  • Publications

    International Publications

    1.D. Kar, S. Panigrahi, and S. Sundararajan, “SQLiGoT: Detecting SQL Injection Attacks using Graph of Tokens and SVM,” Computers & Security, Elsevier, vol. 60, pp. 206-225, 2016, doi:10.1016/j.cose.2016.04.005.
    2.D. Kar, S. Panigrahi and S. Sundararajan, “SQLiDDS: SQL Injection Detection using Document Similarity Measure”, Journal of Computer Security, IOS Press, pp. 1-33, doi: 10.3233/JCS-160554, 2016.
    3.Sushree Bibhuprada B. Priyadarshini, S. Panigrahi, “Redundant Data Minimization Using Hexagonal Scalar Premier Neighbourhood for Optimum Camera Actuation Scheme”, IET Journal of Engineering, IET, pp. 1-11, 2016, doi: 10.1049/joe.2016.0011.
    4.Sushree Bibhuprada B. Priyadarshini, S. Panigrahi, “A Novel Approach Using Optimum Camera Actuation in Event Boundary Detection Method for Redundant Data Minimization”, Ain Shams Engineering Journal, Elsevier, Available online 14 June 2016, doi:10.1016/j.asej.2016.04.013.
    5.Sharmila Subudhi, S. Panigrahi, “Use of Fuzzy Clustering and Support Vector Machine for Detecting Fraud in Mobile Telecommunication Networks”, International Journal of Security and Networks (IJSN), Inderscience Publishers, vol. 11, no. 1-2, pp. 3-11, 2016 (Accepted May 2015), doi: 10.1504/IJSN.2016.075069.
    6.Sushree Bibhuprada B. Priyadarshini, S. Panigrahi, “A Centralized cum Sub-Centralized Scheme for Multi-Event Coverage and Optimum Camera Activation in Wireless Multimedia Sensor Networks”, IET Networks, IET, vol. 4, no. 6, pp. 314–328, 2015, doi: 10.1049/iet-net.2015.0017.
    7.Anitarani Brahma, S. Panigrahi, “A New Approach to Intrusion Detection in Databases by using Artificial Neuro Fuzzy Inference System”, International Journal of Reasoning-based Intelligent Systems, Inderscience Publishers, vol. 7, nos. 3/4, pp. 254-260, 2015, doi: 10.1504/IJRIS.2015.072952.
    8.S. Panigrahi, S. Sural and A. K. Majumdar, “Two-Stage Database Intrusion Detection by Combining Multiple Evidence and Belief Update”, Information Systems Frontiers (Special Issue on Security Management and Technologies for Protecting Against Internal Data Leakages), Springer, vol. 15, no. 1, pp. 35-53, 2013, doi: 10.1007/s10796-010-9252-2.
    9.S. Panigrahi, A. Kundu, S. Sural and A. K. Majumdar, “Credit Card Fraud Detection: A Fusion Approach using Dempster-Shafer Theory and Bayesian Learning”, Information Fusion (Special Issue on Information Fusion in Computer Security), Elsevier, Vol. 10, No. 4, pp. 354-363, 2009, doi:10.1016/j.inffus.2008.04.001.
    10.A. Kundu, S. Panigrahi, S. Sural and A. K. Majumdar, “BLAST-SSAHA Hybridization for Credit Card Fraud Detection”, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol. 6, No. 4, pp. 309-315, October-December 2009, doi: 10.1109/TDSC.2009.11.

    Conferences

    1.Sushree Bibhuprada B. Priyadarshini and S. Panigrahi, “A Distributed Approach based on Hierarchical Scalar Leader Selection for Enhanced Event Coverage in Wireless Multimedia Sensor Networks”, In Proceedings of the 13th International Conference on Distributed Computing and Internet Technology (ICDCIT-2017), Bhubaneswar, India, January 2017 (Accepted, to be published by Springer in the series of Lecture Notes in Computer Science).
    2.Sharmila Subudhi, S. Panigrahi, T. K. Behera, “Use of OPTICS and Supervised Learning Methods for Database Intrusion Detection”, In Proceedings of theIEEE Sponsored 2nd International Conference for Convergence in Technology (I2CT) 2017 (Accepted, to be published by IEEE Xplore).
    3.Sushree Bibhuprada B. Priyadarshini and S. Panigrahi, “Redundant Data Minimization Using Minimal Mean Distant Scalar Leader Selection for Event Driven Camera Actuation”, In Proceedings of the 15th International Conference on Information Technology (ICIT 2016), Bhubaneswar, India, December 2016 (Received Best Paper Award in ICIT 2016).
    4.D. Kar, K. Agarwal, A. K. Sahoo, and S. Panigrahi, M.N Das, “Learning to Detect SQLIA Using Node Centrality with Feature Selection”, In Proceedings of the IEEE International Conference on Computing, Analytics and Security Trends (CAST 2016), IEEE, 2016 (Received Best Paper Award in CAST 2016).
    5.D. Kar, K. Agarwal, A. K. Sahoo, and S. Panigrahi, “Detection of SQL Injection Attacks using Hidden Markov Model,” In Proceedings of the 2nd IEEE International Conference on Engineering and Technology (ICETECH’ 16), IEEE, pp. 1–7, 2016 (Accepted).
    6.T. K. Behera and S. Panigrahi, “Credit  Card  Fraud  Detection  using  a Neuro-Fuzzy Expert System”, In Proceedings of the International Conference on Computational Intelligence in Data Mining (ICCIDM-2016), Bhubaneswar, India, December 2016 (Accepted, published by Springer in the series of Lecture Notes in Computer Science).
    7.Sharmila Subudhi, S. Panigrahi, “Use  of  Possibilistic  Fuzzy  C-Means Clustering for Telecom Fraud Detection”, In Proceedings of the International Conference on Computational Intelligence in Data Mining (ICCIDM-2016), Bhubaneswar, India, December 2016 (Accepted, published by Springer in the series of Lecture Notes in Computer Science).
    8.Sushree Bibhuprada B. Priyadarshini and S. Panigrahi, “A Distributed Scheme based on Minimum Camera Actuation employing Concentric Hexagonal Scalar Premier Selection for Data Redundancy Minimization”, In Proceedings of the 15th International Conference on Information Technology (ICIT 2016), Bhubaneswar, India, December 2016 (Accepted, indexed and included in IEEE Xplore).
    9.Sushree Bibhuprada B. Priyadarshini and S. Panigrahi, “A Distributed Approach based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation”, In Proceedings of the 12th International Conference on Distributed Computing and Internet Technology (ICDCIT-2016), Vol. 9581 of the series Lecture Notes in Computer Science, pp. 87-91, Bhubaneswar, India, January 2016, doi: 10.1007/978-3-319-28034-9_10.
    10.Sushree Bibhuprada B. Priyadarshini and S. Panigrahi, “A Non-Heuristic Approach for Minimizing the Energy and Power Consumption in Wireless Multimedia Sensor Networks”, In Proceedings of the First International Conference on Computational Intelligence and Networks (CINE 2015), Bhubaneswar, India, pp. 104-109,2015 (Published byIEEE CPS in the proceedings of CINE 2015), doi: 10.1109/CINE.2015.29.
    11.D. Kar, S. Panigrahi and S. Sundararajan, “SQLiDDS: SQL Injection Detection using Query Transformation and Document Similarity”, In Proceedings of the 11th International Conference on Distributed Computing and Internet Technology (ICDCIT-2015), LNCS 8956, Springer, pp. 377–390, Bhubaneswar, India, February 2015, doi: 10. 1007/978-3-319-14977-6_41.
    12.T. K. Behera and S. Panigrahi, “Credit Card Fraud Detection: A Hybrid Approach Using Fuzzy Clustering and Neural Network”, In Proceedings of the 2nd IEEE International Conference on Advances in Computing & Communication Engineering (ICACCE-2015), pp. 494 – 499, IEEE, Dehradun, India, May 2015 (Published by the IEEE CPS), doi: 10.1109/ICACCE.2015.33.
    13.Sharmila Subudhi, S. Panigrahi, “Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks”, In Proceedings of the International Conference on Intelligent Computing, Communication & Convergence (ICCC 2014), Procedia Computer Science, vol. 48, pp. 353 - 359 Bhubaneswar, India, 2015, doi:10.1016/j.procs.2015.04.193.
    14.D. Kar and S. Panigrahi, “Prevention of SQL Injection Attack Using Query Transformation and Hashing”, In Proceedings of the IEEE 3rd International Advance Computing Conference (IACC-2013), Ghaziabad, India, pp. 1317-1323, 2013, doi:  10.1109/iadcc.2013.6514419.
    15.S. Panigrahi, S. Sural and A. K. Majumdar, “Detection of Intrusive Activity in Databases by Combining Multiple Evidences and Belief Update”, In Proceedings of the IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009), Nashville, Tennessee, USA, pp. 83-90, 2009, doi: 10.1109/CICYBS.2009.4925094.
    16.S. Panigrahi and S. Sural, “Detection of Database Intrusion using a Two-Stage Fuzzy System”, Lecture Notes in Computer Science, Springer Verlag, In Proceedings of the Information Security Conference (ISC 2009), Pisa, Italy, pp. 107-120, 2009, doi: 10.1007/978-3-642-04474-8_9.
    17.S. Panigrahi, A. Kundu, S. Sural and A. K. Majumdar, “Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks”, Lecture Notes in Computer Science (LNCS-4586), Springer Verlag, In Proceedings of the Australasian Conference on Information Security and Privacy (ACISP), Townsville, Queensland, Australia, pp. 446-460, 2007, doi: 10.1007/978-3-540-73458-1_32.
  • Books/ Chapter Published

    DATA TO BE UPDATED...
  • Seminar/ Symposia/ Short term Course organized

    DATA TO BE UPDATED...
  • Extra Responsibility

    1. Warden (2014 – 2016, Visakha Hall of Residence)
    2. Vice President (2013 – 2014, Art & Photography Club)
    3. Member of Committee for Central Computer Facility
    4. Member of Board of Studies
    5. Member of Conducting Board
    6. Member of Departmental Academic Committee (DAC)
    7. Member of Doctoral Scrutiny Committee (DSC) of Ph.D. Scholars
    8. Departmental Laboratory In-Charge
  • Other Informations

    • Academic Staff College Orientation Course Attended
      Name of the Course / School Place Duration Sponsoring Agency
      Annual Faculty Development Programme KIIT University 26.06.2012 To 28.06.2012 KIIT University
      One day Workshop on Information Security Awareness for College Students & Teachers KIIT University 16.03.2013 KIIT University
  • Address for Communication

    Present Address : 
    F-3R/39, Professor Colony, Veer Surendra Sai University of Technology (Formerly UCE Burla) Burla- 768 018, Sambalpur, Odisha, India
      Permanent Address : 
    Plot No. 155-A, Saila Niwas, Near Mangala Temple, Rasulgarh, Bhubaneswar- 751 010, Odisha, India
Important Links
 
Our Contacts
VSS University of Technology
Burla, Sambalpur, Odisha, India-768018
PH: (0663)2430211
Fax: (0663)2430204
UPDATE command denied to user 'vssutac_burla'@'localhost' for table 'vssut_hits'
Join Us on Facebook