Skip to content

Dr. Gyana Ranjana Panigrahi

Qualifications
M.Phil., Ph.D., and Certified MS, MCP, MCSA, MCITP, MCTS, ECSA, CHFI, AZURE AZ-500/900

What subject you teach at SSU?
Cyber Security and Digital Forensics

Awards
“Best Dressed man” – 2013, HVET.
“Silent Achiever Award” – 2015, HVET.
“Dynamic Personality Award of the Year” – 2016, HVET.
“Trustees Special Award” – 2018, HVET.
“Award of Excellence” – 2019, HVET.
“Award of Excellence” – 2022, HVET.

Journals

  1. Sethy, P. K., Jena, D., Barpanda, N. K., & Panigrahi, G. R. A Smart CAN-Bus Model for In-Vehicle Message Passing Channel, International Journal of Research in Advent Technology, Vol.7, No.5, May 2019, E-ISSN: 2321-9637
  2. Sethy, P. K., Panigrahi, G. R., Barpanda, N. K., Behera, S. K., & Rath, A. K. (2018). Application of Soft Computing in Crop Management. In Intelligent Engineering Informatics: Proceedings of the 6th International Conference on FICTA (pp. 633-646). Springer Singapore.
  3. Sethy, P. K., Bisoi, A., Panigrahi, G. R., & Behera, S. K. (2019). Detection and Identification of Downy Mildew Diseased Leaf of Cucurbita Pepo (Pumpkin) Using Digital Image Processing. In Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3 (pp. 353-363). Springer Singapore.
  4. Panigrahi, G. R., Barpanda, N. K., & Panda, M. (2020, March). A Virtual & Pragmatic Analysis on Networked Security Incident, its Handling & Reporting Measures. In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (pp. 1-4). IEEE.
  5. Panigrahi, G. R., Barpanda, N. K., & Panda, M. (2021). Machine automation making cyber-policy violator more resilient: A proportionate study. In Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science (pp. 329-345). IGI Global.
  6. Gyana Ranjana Panigrahi, Nalini Kanta Barpanda, Prabira Kumar Sethy, Navigating the cyber forensics landscape review of recent innovations, International Journal of Informatics and Communication Technology (IJ-ICT)Vol. 13, No. 1, April2024, pp. 27~33ISSN: 2252-8776, DOI: 10.11591/ijict.v13i1.pp27-33.
  7. Panigrahi, G. R., Barpanda, N. K., Biswal, R., & Samantaray, D. (2021, December). A Machine Automated Big Data Modular Framework for Finding Network Security Vulnerabilities. In 2021 19th OITS International Conference on Information Technology (OCIT) (pp. 161-166). IEEE.
  8. Panigrahi, G. R., Barpanda, N. K., Chandra Mohanty, S., & Das, A. (2022). AI-Powered Smart Routers. In Smart and Sustainable Technologies: Rural and Tribal Development Using IoT and Cloud Computing: Proceedings of ICSST 2021 (pp. 113-126). Singapore: Springer Nature Singapore.
  9. Gyana Ranjana Panigrahi, Nalini Kanta Barpanda, Komma Anitha, Shanti Rathore, Preesat Biswas, Prabira Kumar Sethy, Indonesian Journal of Electrical Engineering and Computer ScienceVol.29, No.3, March2023, pp. 1802~1808ISSN: 2502-4752, DOI: 10.11591/ijeecs.v29.i3.pp1802-1808.
  10. Panigrahi, G. R., Sethy, P. K., Borra, S. P. R., Barpanda, N. K., & Behera, S. K. (2023). Deep Ensemble Learning for Fake Digital Image Detection: A Convolutional Neural Network-Based Approach. Revue d’Intelligence Artificielle, 37(3), 703.
  11. Panigrahi, G. R., Barpanda, N. K., Sethy, P. K., & Samantaray, D. (2023). A Comparison of Capability Measurement between Various Incident Handling and Reporting Schemas. In Social Media and Crowdsourcing (pp. 93-124). Auerbach Publications.
  12. Panigrahi, G. R., Sethy, P. K., Behera, S. K., Gupta, M., Alenizi, F. A., Suanpang, P., & Nanthaamornphong, A. (2024). Analytical Validation and Integration of CIC-Bell-DNS-EXF-2021 Dataset on Security Information & Event Management. IEEE Access.
  13. Panigrahi, G. R., Sethy, P. K., Behera, S. K., Gupta, M., Alenizi, F. A., & Nanthaamornphong, A. (2024). Enhancing Security in Real-Time Video Surveillance: A Deep Learning-Based Remedial Approach for Adversarial Attack Mitigation. IEEE Access.
  14. Naik, N. K., Subbarao, M. V., Sethy, P. K., Behera, S. K., & Panigrahi, G. R. (2024). Machine learning with analysis-of-variance-based method for identifying rice varieties. Journal of Agriculture and Food Research, 18, 101397.


Interests
Biking, Listening Music, Socializing


Other Accomplishments
Academic Reviewer: Served as a reviewer for leading journals such as:
The Journal of Cybersecurity (ISSN 2057-2093),
IEEE Access (ISSN 2169-3536), and
Oxford and so on.

International Memberships:
IEEE
Microsoft
EC-Council and
NASSCOM FutureSkills Prime.

As an invited speaker, I delivered a talk on Cybersecurity and Digital Forensics at EC-Council University, New Mexico, USA:
AI in Cyber Warfare: AI-Powered Attacks and Defense.
Mobile Device Forensics: A Beginner’s Guide.
Decentralized Security: Role of Blockchain in Cybersecurity.
Exploring the Intersection of Digital Forensics and Identity Management.
Blockchain and Identity Management: Building Trust in a Digital World.
A Guide to Incident Response Framework: Data Mining and Managed Review.