Research Guidance

Research Guidance

Research Guidance Page

Doctoral Research Guidance

Appreciation is a wonderful thing. Our goal is to respond to the call of creating the emerging leaders of tomorrow

Dr. Sisira Kumar Kapat

An Intelligent Spyware Detection System based on Association Mining

Dr. Sisira Kumar Kapat

( PhD Awarded )

Dr. Binayak Panda

Designing an Optimizing Strategy for Malware Analysis using Innovative Techniques from Data Mining

Dr. Binayak Panda

( PhD Awarded )

Dr. Om Prakash Samantray

A Study to Develop a Knowledge Domain Analyzer using Data Mining Concepts for Malware Analysis

Dr. Om Prakash Samantray

( PhD Awarded )

Dibas Kumar Hembram

Stages of Heart Disease Prediction Applying Explainable Artificial Intelligence Techniques

Dibas Kumar Hembram

( PhD Research Pursuing )

Lalit Kumar Behera

Enhancing Diagnostic Accuracy and Explainability in Medical Imaging with Deep Learning and XAI

Lalit Kumar Behera

( PhD Research Pursuing )

Pragnya Das

Hybrid Ensemble Deep Learning Approach for Detection of Cancer

Pragnya Das

( PhD Research Pursuing )

Rashmi Rani Panda

Android Malware Detection using Deep Learning Approach

Rashmi Rani Panda

( PhD Research Pursuing )

Diptimayee Sahu

Neurodegenerative Disease Prediction using XAI with Counterfactual Explanation

Diptimayee Sahu

( PhD Research Pursuing )

Master Degree Research Guidance

Manoswini Mohanty
Manoswini Mohanty

2015

Title: An Adware Detection System using Classification Mining

Reg. No: 30047/2015

Roll No: MTC316

Giribala Sahu
Giribala Sahu

2014

Title: A Study and Analysis of Trojan Horse using Classification

Reg. No: 49/2014

Roll No: MTC1015

M. Soujanya
M. Soujanya

2014

Title: A Study and Classification of Spyware using Detection Tree Analysis

Reg. No: 51/2014

Roll No: MTC215

Sasmita Kumari Choudhury
Sasmita Kumari Choudhury

1995

Title: A Comparative Study on Botnet using Classification Mining

Reg. No: 70/1995

Roll No: MTC915

Debasish Pradhan
Debasish Pradhan

2014

Title: A Study and Classification of ROOTKITs Using Decision Tree Analysis

Reg. No: 46/2014

Roll No: MTC315

Sisira Kumar Kapat
Sisira Kumar Kapat

2013

Title: A Spyware Detection System with a Comparative Study of Spywares using Classification Rule Mining

Reg. No: 47/2013

Roll No: MTC614

Shasanka Sekhar Panda
Shasanka Sekhar Panda

2006

Title: A Comparative Study and Performance Analysis of Adware Detection Technique using Classification Rule Mining

Reg. No: 3552/2006

Roll No: MTC1214

Ramakrushna Dash
Ramakrushna Dash

2013

Title: A Comparative Study of Worm Detection Techniques using Classification Rule Mining

Reg. No: 45/2013

Roll No: MTC0114

Mamarani Sahu
Mamarani Sahu

2013

Title: A Key Logger Detection Architecture with Analysis of some classification algorithms using Key Logger data

Reg. No: 42/2013

Roll No: MTC1514

M. Soujanya
M. Soujanya

2014

Title: A Study and Classification of Spyware using Detection Tree Analysis

Reg. No: 51/2014

Roll No: MTC215

Total Profiles: 45

Doctoral Awarded

  • Sisira Kumar Kapat — “An Intelligent Spyware Detection System based on Association Mining”
    Reg. No: 21/2016-17
    Notification: 3530/EC-II (M.Phil./Ph.D.)/2022 dated 30/09/2022
  • Binayak Panda — “Designing an Optimizing Strategy for Malware Analysis using Innovative Techniques from Data Mining”
    Reg. No: 65/2015-16
    Notification: 2994/EC-II (M.Phil./Ph.D.)/2022 dated 30/08/2022
  • Om Prakash Samantray — “A Study to Develop a Knowledge Domain Analyzer using Data Mining Concepts for Malware Analysis”
    Reg. No: 67/2015-16
    Notification: 1669/EC-II (M.Phil./Ph.D.)/2022 dated 31/05/2022

Doctoral Ongoing

  • Diptimayee Sahu — “Android Malware Detection using Deep Learning Approach”
    Reg. No: 11/U-2019
  • Dibas Kumar Hembram — “Stages of Heart Disease Prediction Applying Explainable Artificial Intelligence Techniques”
    Reg. No: 41/U-2020
  • Pragnya Das — “Hybrid Ensemble Deep Learning Approach for Detection of Cancer”
    Reg. No: 43/U-2020
  • Lalit Kumar Behera — “Enhancing Diagnostic Accuracy and Explainability in Medical Imaging with Deep Learning and XAI”
    Reg. No: 20/U-2020

Masters

  • Laxminarayan Dash — “Sensor-Based Data Acquisition for CVD System”
    Reg. No: 01479/2019
    Roll No: 23COMP010
  • Chinmaya Kumar Panda — “Designing Interface for Body Composition Analysis”
    Reg. No: 20277/2023
    Roll No: 23COMP006
  • Beadprakasha Pattnaik — “Explainable AI and Counterfactuals in CVD System”
    Reg. No: 14651/2020
    Roll No: 23COMP002
  • Mandakini Parida — “Model Development and Evaluation for CVD Prediction”
    Reg. No: 20282/2023
    Roll No: 23COMP006
  • Ranjan Gouda — “System Design of CVD Risk Prediction System”
    Reg. No: 09456/2017
    Roll No: 23COMP019
  • Nilanchala Nahak — “Database and Interface Design for CVD System”
    Reg. No: 21186/2023
    Roll No: 23COMP014
  • Sritam Pradhan — “Input Interface Designing of Online Examination System”
    Reg. No: 00540/2019
    Roll No: 23COMP025
  • Binayak Sethy — “Doctor Appointment Web APP”
    Reg. No: 20181/2020
    Roll No: 23COMP005
  • Sudhir Bishoyi — “Output Interface Designing of Examination System”
    Reg. No: 44753/2020
    Roll No: 23COMP027
  • Binayak Dash — “LingOLearn (Language Learning Web APP)”
    Reg. No: 06421/2020
    Roll No: 23COMP004
  • Nayan Mahapatra — “XX”
    Reg. No: CC
    Roll No: MTC116
  • Ankita Sabata — “Android Malware Detection using Association Mining”
  • Dipika Ratha — “Data mining methods to study malware behavior and their Specifications”
  • Sapana Kumar Padhy — “Detection of malicious android application using permission Mapping”
  • Sushree Smita Nanda — “A structural Analysis of android malware and its detection based on data mining approach”
  • Sachin Kumar Patra — “Fine grained android malware detection using data mining”
  • Mrutyunjaya Satapathy — “Applying data mining approach for threat analysis in android environment”
  • Sashmita Kumari Panda — “A Study on Performace Evaluation of Classifiers in Malware Classification”
    Reg. No: 52/2016
  • Alisha Padhy — “A Study and Analysis of Malware Security Threats and Risks Anatomy”
    Reg. No: 48/2016
  • Diptimayee Sahu — “A Malware Detection model by EULA classification using Text Mining”
    Roll No: MTC116
  • Manoswini Mohanty — “An Adware Detection System using Classification Mining”
    Reg. No: 30047/2015
    Roll No: MTC316
  • Giribala Sahu — “A Study and Analysis of Trojan Horse using Classification”
    Reg. No: 49/2014
    Roll No: MTC1015
  • M.Soujanya — “A Study and Classification of Spyware using Detection Tree Analysis”
    Reg. No: 51/2014
    Roll No: MTC215
  • Sasmita Kumari Choudhury — “A Comparative Study on Botnet using Classification Mining”
    Reg. No: 70/1995
    Roll No: MTC915
  • Debasish Pradhan — “A Study and Classification of ROOTKITs Using Decision Tree Analysis”
    Reg. No: 46/2014
    Roll No: MTC315
  • Sisira Kumar Kapat — “A Spyware Detection System with a Comparative Study of Spywares using Classification Rule Mining”
    Reg. No: 47/2013
    Roll No: MTC614
  • Shasanka Sekhar Panda — “A Comparative Study and Performance Analysis of Adware Detection Technique using Classification Rule Mining”
    Reg. No: 3552/2006
    Roll No: MTC1214
  • Ramakrushna Dash — “A Comparative Study of Worm Detection Techniques using Classification Rule Mining”
    Reg. No: 45/2013
    Roll No: MTC0114
  • Mamarani Sahu — “A Key Logger Detection Architecture with Analysis of some classification algorithms using Key Logger data”
    Reg. No: 42/2013
    Roll No: MTC1514
  • Chaitanya Patnaik — “A Study and Analysis on SQL Injection Attacking Process”
    Reg. No: 6147/1982
  • Aratibala Sahu — “A Comprehensive Study and Analysis on Browser Hijackers Attacking Process”
    Reg. No: 2182/2012
  • Sugyani Panigrahi — “A Study on Browser Hijackers Attacking Process”
    Reg. No: 2194/2012
  • Jaya Panigrahi — “A Comprehensive Study and Analysis on Phishing Attacking Process”
    Reg. No: 128/2002
  • Gayatri Kumari Panda — “A Study and Analysis on Exploit Attacking Process”
    Reg. No: 2185/2012
  • Prasanta Kumar Panda — “A Comprehensive Study and Analysis on Backdoor Attacking Process”
    Reg. No: 2190/2012
  • Sreemayee Padhi — “A Study and Analysis on Adware Attacking Process”
    Reg. No: 2193/2012
  • Deeptimayee Dash — “A Study on Machine learning approaches for Malware analysis”
    Reg. No: 2184/2012
  • M. Biswajit — “A Study on Trojan Attacking Process”
    Reg. No: 2186/2012
  • M. Venkata Laxmi Srinivas — “A Study and Analysis on Botnet Attacking Process”
    Reg. No: 2187/2012
  • Ranjeeta Kumbhar — “A Study and Analysis on Spyware Attacking Process for Malware Detection”
    Reg. No: 2191/2012
  • Swagatika Kar — “A Study on Data Mining approaches for Malware analysis”
    Reg. No: 2195/2012
  • Uma Shankar Mohanty — “An Exhaustive Study on Keylogger Attacking Process”
    Reg. No: 2196/2012