Pre-loader

Journal

# List of Publication by Prof. Malay Kule
1 B Bhunia, M Kule, H Rahaman, A New Hardware Trojan Detection Approach using Skip Connection based Multilayer Perceptron Network, (Accepted), SN Computer Science, Springer, 2026
2 S Sikdar, M Kule, Hybrid intelligence: integrating machine learning and nature-inspired algorithms for malware detection, 21(1), Journal of Computer Virology and Hacking Techniques (Springer), 2025
3 S Basu, R Ghoshal, M Kule, A Machine Learning Attack Immune Design of PUF using Symmetric Functions, 17(2), 421–431, International Journal of Communication Networks and Information Security (IJCNIS), 2025
4 T Adhikari, A K Khan and M Kule, SRDCP: A Secure and Resilient Distributed Control Plane Architecture for Large-Scale SDN Deployments, (Accepted), Journal of Cyber Security Technology (Taylor & Francis), 2025
5 T Adhikari, A K Khan, M Kule, An analytical review of security issues in centralized and distributed SDN environments, (Published Online First), 1–34, Information Security Journal: A Global Perspective, 2025
6 S Dutta, P Ghosh, M Kule, S Chakraborty, UNICON-LSGDM: A UNIform Consensus Framework with Community Detection and Weighted Similarity for Large-Scale Group Decision-Making, (Accepted), Sadhana, Indian Academy of Sciences, Springer, 2025
7 S Sikdar, S Dutta, M Kule, On Cryptanalysis of 3-DES using Nature-Inspired Algorithms, 17(3), 54-71, International Journal of Computer Network and Information Security (IJCNIS), 2025
8 T Adhikari, A K Khan, M Kule, S Das, An Efficient Approach for Detection of Compromised SDN Switches and Restoration of Network Flow, 16 (5), 46-56, International Journal of Computer Network and Information Security (IJCNIS), 2024
9 S Sikdar, M Kule, Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques, 16 (6), 20-39, International Journal of Intelligent Systems and Applications, 2024
10 T Adhikari, A K Khan, M Kule, ProDetect: A Proactive Detection Approach of the TCP SYN Flooding Attack in the SDN Controller, 1–12., IETE Journal of Education, 2024
11 S Sikdar, J Biswas, M Kule, Cryptanalysis of Markle-Hellman Knapsack Cipher using Nature Inspired Algorithms, 5(1), 41-56, International Journal of Applied Cryptography, 2024
12 M Kule, H Rahaman, H Rahaman, B B Bhattacharya, Bio-Inspired Methods for Defect-Tolerant Function-Mapping in Nano-Crossbar Arrays, 70(2), 1861–1870, IETE Journal of Research, 2022
13 S Basu, M Kule, H Rahaman, Implementation of Symmetric Functions Using Memristive Nanocrossbar Arrays and their Application in Cryptography, 30(12), 2150223, Journal of Circuits, Systems, and Computers, 2021
14 R Kamal, M Bag, M Kule, On The Cryptanalysis of S-DES using Nature Inspired Optimization Algorithms, 14, 163-173, Evolutionary Intelligence(2020), Springer, 2021
15 M Kule, H Rahaman, BB Bhattacharya, Function-Mapping on Defective Nano-Crossbar with Enhanced Reliability, 19(2), 555-564, Journal of Computational Electronics, Springer, 2020
16 M Kule, H Rahaman, BB Bhattacharya, Maximal Defect-Free Component in Nanoscale Crossbar Circuits Amidst Stuck-Open and Stuck-Closed Faults, 28(11), 1950180:1 – 1950180:22, Journal of Circuits, Systems, and Computers, 2019
17 T Mandal, M Kule, An Improved Cryptanalysis Technique Based on Tabu Search for Knapsack Cryptosystem, 9(16), 8295-8302, International Journal of Control Theory and Applications, 2016

Created: 23 November 2019