Areas of Interest/Previous Research: Network Security, Security Configuration Synthesis, Access Control Models, Formal Property Verification
|
|
|
- April Hubbard
- 10 years ago
- Views:
Transcription
1 Dr. Padmalochan Bera Assistant Professor, School of Electrical Science and Computer Engineering Indian Institute of Technology Bhubaneswar Orissa Tel: (O), (M) Qualification: PhD (Doctor of Philosophy, 2011) O in Indian Institute of Technology, Kharagpur. O Thesis:Formal Analysis of Security Policy Implementations in Enterprise Networks. O Supervisor(s): Dr. S. K. Ghosh and Dr. PallabDasgupta, IIT Kharagpur. ME (Masters in Engineering, 2006) O in Computer Science in Engineering from West Bengal University of Technology, Kolkata, India. O Specialization: Embedded Systems, Distributed Systems O Marks: 74.5% BE (Bachelor in Engineering, 2001) O in Computer Science in Engineering from Jadavpur University, Kolkata, India. O Specialization: Databases, Graph Theory, Operating Systems, Data Structure and Algorithms O Marks: 71.9% H. Sc (10+2, 1995) O in Science from Ramkrishna Mission Vidyamandir Belure Math, Howrah, India. O Marks: 83.5% Secondary (10, 1993) O in Science from Ramkrishna Mission Vidyabhawan, Midnapore, India. O Marks: 85% Current Research Area: Network Security Automation, Cyber Physical Systems Security, Software Security Testing, Internet of Things, Formal Modeling and Optimization. Areas of Interest/Previous Research: Network Security, Security Configuration Synthesis, Access Control Models, Formal Property Verification Page 1 of 6
2 Work Experiences: Working as Assistant Professor in School of Electrical Sciences, Indian Institute of Technology Bhubaneswar, India from September 2013 to till date. Worked as a Senior Research Scientist in Infosys Labs (Software Test Automation and Optimization Group), Bangalore, India from July 2012 to till date. Worked as a Researcher at General Motors India Science Lab (Control Software Validation Group), Bangalore, India from September 2011 to June Worked as a Post-Doctoral Research Associate in CyberDNA Research Center, University of North Carolina at Charlotte, NC, USA from October 2010 to September 2011 Worked as a Senior Research Fellow in a Research Project titled Design &Development of Models and Tools for Vulnerability Assessment of Embedded Systems sponsored by Ministry of Defense, New Delhi in Indian Institute of Technology Kharagpur, India from July 2007 to September Research Projects (at Infosys Labs): Quantification of Preventive Maintenance Metric for Enterprise Software Test Case Generation and Optimization for System of Systems Testing Fault Injection based Software Security Testing in Cloud Infrastructure Research Projects (at General Motors, India Science Lab): Modern Technology Cars consist of a large number of Electronic Control Units (ECU) which are automatically managed by different embedded control software. These software essentially take inputs from different sensors at different time and accordingly triggers necessary actions to ensure consistent functionality and higher security and safety in different scenarios. My research at General Motors India Science Lab was focused on developing methodologies for automatic verification and validation of these control software in integration based on several safety-critical requirements and functional invariants/constraints. I was leading the following projects: RemoteGen: Requirement based Test Case Generation for Automotive Control software End Applications: CSAV 2 Features (Supercruise, ACC) Modeling and Optimization of AUTOSAR based Control Design Model based Software Integration Testing Previous Research (PhD and Post-Doc): The major area of my research is Network Security and Formal Methods. I have more than 4 years of applied research experience in this domain. My work essentially focused on formal (mathematical) modeling of largescale network configurations and verifying different safety and security constraints in the configuration model. The major challenges in this verification problem lies in (i) modeling distributed network configurations in a scalable manner; (ii) correct and conflict-free representations of security constraints or policies based on various standards and organizational requirements; and (iii) providing automated and proof-based methodology to ensure the satisfaction of the security constraints in the network configuration. Page 2 of 6
3 My PhD thesis is on Formal Analysis of Security Policy Implementations in Enterprise Networks. It primarily concentrates on formalizing organizational security policy and distributed ACL implementations in an enterprise network and verifying whether the implementation conforms to the policy under static and dynamic topology environments. Through this research, I have developed a Formal Integrated Network Security Analysis Tool, namely, FINSAT, for systematic analysis of security policy implementations in enterprise networks. The tool allows users/network administrators querying about various service access paths in the networks with different security constraints towards hardening the security perimeter over the networks. I have also worked on policy based security management in wireless networks (WLAN) supported by spatiotemporal role based access control models (STRBAC). I was actively involved in the following research activities throughout my PhD and Post-Doc tenure: Formal Verification of Access Control Models in IP Networks Fault Tolerant Policy based Security Implementations in IP Networks Formal Analysis of Security Threats in Smart-Grid Networks Lead Research Projects (at UNC, Charlotte, USA): SmartAnalyzer: Framework for Analyzing Threats in Smart Grid Network Infrastructure sponsored by Duke Energy Systems, USA. ConfigLego: An Imperative approach of Security Configuration Analysis in Enterprise Networks sponsored by NSF, USA. ConfigSlider: Synthesizing Optimal and Usable Network Security Configuration using Constraint Satisfaction Checking sponsored by NSF, USA Programming Skills and Verification/Testing Tools used Modeling and Test Tools: Simulink/Stateflow, Reactis, SDV toolset (Mathworks) SAT/BDD based verification Tools: zchaff, minisat, Cudd Model Checking Tools: SPIN, Z3 (SMT based), NuSMV, Bounded Model Checker Declarative Logic Programming: Prolog, Alloy Programming Languages: C, Java, C++ Hardware Programming Language: VHDL, Verilog, systemc Research Publications: Journals: Soumya Maity, Padmalochan Bera, S. K. Ghosh, Ehab Al-Shaer, FINSAT: Formal Query based Network Security Configuration Analysis. In IET Networks, February 2014 (To appear). M. Ashiqur Rahaman, Ehab Al-Shaer, P. Bera, A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid In IEEE Transaction on Smart Gridvol 4(1), pp , March 2013 Page 3 of 6
4 P. Bera, Pallab Dasgupta, S. K. Ghosh, Policy based Security Analysis in Enterprise Networks- A formalapproach, In IEEE Transaction on Network and Service Management (IEEE TNSM), vol. 7(4), pp , December P. Bera, Pallab Dasgupta, S. K. Ghosh, Integrated Security Analysis Framework for an Enterprise Network-A Formal Approach, In IET Information Security Journal, vol. 4(4), pp , December P. Bera, S. K. Ghosh and Pallab Dasgupta, A WLAN Security Management Framework based on Formal Spatio-Temporal RBAC Model, Journal of Security and Communication Networks, Wiley InterScience, vol 4(9), pp , August P. Bera, Pallab Dasgupta, S. K. Ghosh, Formal Analysis of Security Policy Implementations in EnterpriseNetworks. International Journal of Computer Network and Communications (IJCNC), Vol. 1(2), pp , July Selected Conferences: S. Majhi, P. Bera, S. Kumar, E. Al-Shaer, M. Satpathy, Synthesizing Optimal Network Security Configurations in Enterprise Networks a formal approach. In 9 th IET System Safety and Cyber Security Conference, Manchester, UK, October 2014 (Accepted) P. Bera and S. K. Ghosh, A Query Driven Security Testing Framework for Enterprise Network, In IEEE SECTEST with IEEE ICST Conference, Luxembourg, March 2013 M. Ashiqur Rahaman, P. Bera and E. Al-Shaer, A Non-invasive Security Threat Analyzer for AMI Smart Grid, IEEE INFOCOM 2012, pp , Florida, USA, March 2012 P. Bera and A. Pasala, A Framework for optimizing effort in Testing System-of-Systems, In IEEE ICSEM 2012, December , Mysore, India Saeed Al-Haj, P. Bera and Ehab Al-Shaer, Build andtest Your Own Network Configuration, 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September 2011 P. Bera, SoumyaMaity, S. K. Ghosh and Pallab Dasgupta, Generating Policy based Security Implementations in Enterprise Networks. In ACM SafeConfig Workshop, ACM CCS 2010, Chicago, USA, October P. Bera, Pallab Dasgupta, S. K. Ghosh, A Spatio-temporal Role-based Access Control Model for Wireless LAN Security Policy Management, In 4th International Conference on Information Systems, Technologyand Management (ICISTM-10), LNCS, Springer pp 76-88, Bangkok, March P. Bera, Soumya Maity, S. K. Ghosh and Pallab Dasgupta, A Query based Formal Security Analysis Framework for Enterprise LAN, In 10 th IEEE International Conference on Computer and InformationTechnology 2010 (CIT 2010), Bradford, UK, pp , IEEE Computer Society, June 2010 Page 4 of 6
5 P. Bera, Pallab Dasgupta, S. K. Ghosh, Formal Verification of Security Policy Implementations inenterprise Networks, In International Conference on Information Systems and Security (ICISS 2009), LNCS 5905, pp , Kolkata, India, December P. Bera, Pallab Dasgupta, S. K. Ghosh, Fault Analysis of Security Implementations in EnterpriseNetworks, In IEEE International Conference on Network and Communication Systems (NetCom 2009),DOI: /Netcom , pp , Chennai, India, December Book Chapter: E. Al-Shaer, S.K.Ghosh, P. Bera, Formal Analysis of Policy based Security Configurations in Enterprise Network, In Handbook on Securing Cyber-Physical Critical Infrastructure, ISBN: , Morgan Kaufmann Publication, USA, June 2012 Technology Patents (filed): 4294/CHE/2013: A. Pasala, P. Bera, Tom Nedumgad. Methods, Systems and Computer Readable Media for Quantifying Bug Detection Efficiency of bug prediction technique, 1330/CHE/2014: P. Bera, A. Pasala. Method and System for Generating Stateflow Models from Software Requirements Professional Activities (Seminars, Workshops & Courses): Attended IBM Faculty Residency Program on Cyber-Security at IBM Bangalore, India during June INSTEP Award for Thought and Leadership and , Infosys Technologies Ltd., Bangalore Postdoctoral Fellow, CyberDNA Research Center, University of North Carolina Charlotte, USA ACM Travel Award for presenting paper in ACM Safeconfig, CCS 2010 Delivered Talk on Security and Safety Challenges in Smart Grid Advanced Metering Infrastructure in IEEE CSS Symposium on Cyber Physical Systems at IISC Bangalore, India during November Delivered Lectures on Cyber Security Challenges and Scope of Formal Methods under Advanced Network Security Course in University of North Carolina Charlotte, USA, Fall Semester 2011 Delivered Lecture on Formal Analysis of Security Configurations in Enterprise Networks at CyberDNA Research Seminar in University of North Carolina at Charlotte, USA, March Presented papers in conferences: ICISS 2009, IACC 2009, NetCom 2009, 1CISTM 2010, ICDCN 2010 (Poster), Safeconfig ACM CCS 2010, IEEE INFOCOM 2012, IEEE SECTEST 2013 Page 5 of 6
6 Attended Microsoft Research (MSRI) summer school on Programming Languages, Analysis and Verification in IISC, Bangalore during June Attended 3 week UGC Refresher s Course on Natural Language Processing in Jadavpur University, Kolkata during November 25-December 16, National Scholarship for results in Secondary Examination National Scholarship for results in Higher Secondary Examination References: Dr. S. K. Ghosh, Associate Professor, School of Information Technology, IIT Kharagpur , India. Phone No: , Fax: , [email protected]. Dr. Pallab Dasgupta, Professor, Dept of Computer Sc&Engg, IIT Kharagpur , India. Phone No: , Fax: , [email protected]. Dr. S Ramesh, Technical Fellow, General Motors, India Science Lab, Tech Center, Warren, MI, USA, Tel.: , [email protected]. Dr. Ehab Al-Shaer, Professor& Director CyberDNA Research Center, University of North Carolina Charlotte, NC 28223, USA, Tel: , [email protected]. Dr. Indranil Sengupta, Professor, Dept of Computer Sc&Engg, IIT Kharagpur , India. Phone No: , Fax: , [email protected] Page 6 of 6
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
Name : Dr. Anjan Chakravarty. Qualification : M.A (Economics), M.B.A (Marketing), Ph.D (Marketing) Designation : Assistant Professor
Name : Dr. Anjan Chakravarty Qualification : M.A (Economics), M.B.A (Marketing), Ph.D (Marketing) Designation : Assistant Professor Email ID : [email protected] Biographical sketch :Passed the ISC (12)Examination
Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University
RESUME. Name : Pinaki Mitra. Date of birth : 1 st January, 1966
RESUME Name : Pinaki Mitra Date of birth : 1 st January, 1966 Address: Department of Computer Sc. & Engg. IIT Guwahati North Guwahati Guwahati 781039. Phone # (011-91-361) 258-4352 (Res) (011-91-361) 258-2352
Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions
Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance
Dr. Shashank Srivastava. Contact. E-mail: [email protected]. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses:
Dr. Shashank Srivastava Assistant Professor Department of Computer Science & Engineering Image Processing Department Building-First Floor Motilal Nehru National Institute of Technology Allahabad-211004,
How To Understand And Understand The Science Of Engineering In India
RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 [email protected].
Automated Firewall Analytics
Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9
Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH
Review of Computer Engineering Research ISSN(e): 2410-9142/ISSN(p): 2412-4281 journal homepage: http://www.pakinsight.com/?ic=journal&journal=76 CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Gayatri
Formal Configuration Analytics for Provable & Measurable Security
Formal Configuration Analytics for Provable & Measurable Security Ehab Al-Shaer Cyber Defense & Network Assurability (CyberDNA) Center Department of SIS, College of Computing and Informatics University
Department of Computer Science & Engineering. Indian Institute of Technology Kharagpur, India
Department of Computer Science & Engineering Indian Institute of Technology Kharagpur, India DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR The Department of Computer
BRIEF BIO-DATA. Degree University Year Remarks PhD (Physics) Indian Institute of 2008 First Technology Delhi to
BRIEF BIO-DATA Dr. RINA SINGH Scientist, Environmental Science Division CSIR-CRRI, New Delhi Mobile: +91-9999768407 Email: [email protected], [email protected] Qualifications : Degree University
ACM Survey on PhD Production in India in Computer Science
ACM Survey on PhD Production in India in Computer Science Pankaj Jalote Director and Professor, IIIT Delhi PhD production in India in computer science has been an issue of concern over the last many years.
AICTE SPONSORED SHORT TERM COURSE ON. Planning and Managing Human Resources: Tools & Techniques. (Under the Scheme of QIP, Min of HRD, Govt.
AICTE SPONSORED SHORT TERM COURSE ON Planning and Managing Human Resources: Tools & Techniques (Under the Scheme of QIP, Min of HRD, Govt. of India) Organised by Department of Humanities and Social Sciences
Cyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders Northrop Grumman Information Systems Donald Steiner,
Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class.
Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class. He obtained his M.Tech. (Information Technology) degree from
FORMAL ANALYSIS OF SECURITY POLICY IMPLEMENTATIONS IN ENTERPRISE NETWORKS
FORMAL ANALYSIS OF SECURITY POLICY IMPLEMENTATIONS IN ENTERPRISE NETWORKS P Bera 1, Pallab Dasgupta 2 and S K Ghosh 1 1 School of Information Technology 2 Department of Computer Science & Engineering Indian
Minimum Qualifications for appointment of Teaching faculty in University and Colleges-Engineering and Technology Discipline.
Minimum Qualifications for appointment of Teaching faculty in University and Colleges-Engineering and Technology Discipline. 1. Assistant Professor First Class Master's Degree in the appropriate branch
Service Component Architecture for Building Cloud Services
Service Component Architecture for Building Cloud Services by Dr. Muthu Ramachandran, Principal Lecturer in the Computing and Creative Technologies School Abstract: The emergence of cloud computing has
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Cyberspace Security Econometrics System (CSES) Portfolio. Robert K. Abercrombie Organized by FY Updated October 20, 2014
Cyberspace Security Econometrics System (CSES) Portfolio Robert K. Abercrombie Organized by FY Updated October 20, 2014 4 Patents (Issued or Pending) 6 ORNL Intellectual Property Invention Disclosures
WORKSHOP ON SUPPLY CHAIN MANAGEMENT 4 th February 2015 to 8 th February 2015 at IIT Kanpur, INDIA CONDUCTED BY
WORKSHOP ON SUPPLY CHAIN MANAGEMENT 4 th February 2015 to 8 th February 2015 at IIT Kanpur, INDIA CONDUCTED BY Industrial and Management Engineering (IME) Department, Indian Institute of Technology Kanpur,
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Software Engineering. Program Description. Admissions Requirements. Certificate. Master of Software Engineering. Master of Science
North Dakota State University 1 Software Engineering Program and Application Information Department Head: Graduate Coordinator: Department Location: Dr. Brian M. Slator Dr. Kenneth Magel 258 QBB (formerly
Curriculum Vitae of. Vicky G. Papadopoulou
Curriculum Vitae of Vicky G. Papadopoulou Personal Information Full Name: Vicky G. Papadopoulou Home Address: Odysseos 23, Strovolos, PO Box 2040, Nicosia, Cyprus Phones: Office: +357 22 713046 Email:
ADVANCED LOCAL PREDICTORS FOR SHORT TERM ELECTRIC LOAD
RESUME Ehab E. Elattar Assistant Professor Department of Electrical Engineering, college of Engineering Taif University, Taif, Kingdom of Saudi Arabia Phone: (+966) 549394587 (Mobile) E-mail: [email protected]
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
UNIVERSITY OF ZULULAND FACULTY OF SCIENCE AND AGRICULTURE DEPARTMENT OF COMPUTER SCIENCE POSTGRADUATES
STAFF POST STAFF MEMBER QUALIFICATION Professor and HOD MO Adigun PhD, MSc, BSc (Combined Hons) (IFE), MIEEE, PMACM, MSAICSIT Associate Professor SS Xulu PhD (UZ), MSc (UCT), Dip Data (UNISA), PhD (UZ)
UML BASED MODELING OF ECDSA FOR SECURED AND SMART E-GOVERNANCE SYSTEM
UML BASED MODELING OF ECDSA FOR SECURED AND SMART E-GOVERNANCE SYSTEM Abhishek Roy [1] and Sunil Karforma [2] [1] Department of Computer Science, The University of Burdwan, W.B, INDIA. Department of Computer
ST ALOYSIUS COLLEGE (AUTONOMOUS)
ST ALOYSIUS COLLEGE (AUTONOMOUS) ALOYSIUS INSTITUTE OF MANAGEMENT & INFORMATION TECHNOLOGY MANGALORE, KARNATAKA Phone : 0824-2286890 6490299 e-mail : [email protected] SCHOOL OF INFORMATION TECHNOLOGY
RESUME ---------------------------------------------------------------------------------------------------------------------
RESUME 1. Name : Dr. Vijay Kumar Gupta 2. Academic Qualifications (Post Graduation Onwards) ---------------------------------------------------------------------------------------------------------------------
Dr. (CA) Sanjib Kumar Basu
Dr. (CA) Sanjib Kumar Basu Qualification: M. Com, FCA, Ph. D Designation: Associate Professor Department: Commerce ( and Finance) Phone: 91-33-22551248 E-mail address: [email protected] Profile: Dr. Sanjib
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
Ali Ebnenasir. Department of Computer Science, Michigan Technological University.
Ali Ebnenasir 221 Rekhi Hall E-Mail: [email protected] Department of Computer Science Phone: 906-487-4372 Michigan Technological University Fax: 906-487-2283 Houghton MI 49931 http://www.cs.mtu.edu/~aebnenas
Cybersecurity Risk Assessment in Smart Grids
Cybersecurity Risk Assessment in Smart Grids Lucie Langer, Paul Smith, Thomas Hecht [email protected] AIT Austrian Institute of Technology ComForEn Symposium 2014 Sept 30, 2014 1 Risk Assessment:
A Methodology for Safety Critical Software Systems Planning
A Methodology for Safety Critical Software Systems Planning EHAB SHAFEI 1, IBRAHIM F. MOAWAD 2, HANY SALLAM 1, ZAKI TAHA 3, MOSTAFA AREF 3 1 Operation Safety and Human Factors Department, 2 Information
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
Utkal University B.Sc. Physics and Education, 1991-1995, Regional College of Education, Utkal University, Bhubaneswar, India.
Page 1 EDUCATION PALASH BERA Assistant Professor, John Cook School of Business, Saint Louis University 9545 Fredricksburg Court, Saint Louis, 63126, Mo Ph: 314-977-3867, E-mail: [email protected] University
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
Debasis Karmakar. Postdoctoral Scholar (October 2009 Present) UC Irvine (Department of Civil and Environmental Engineering), Irvine, CA
Research Interests Debasis Karmakar Postdoctoral Scholar Phone: (949) 824 3880 (Work), (949) 307 0214 (Cell) Email: [email protected], [email protected] Web: https://webfiles.uci.edu/dkarmaka/www/index.htm
CLOUD PLATFORM AND THE VIRTUALISED WORLD: TAKE A LOOK
CLOUD PLATFORM AND THE VIRTUALISED WORLD: TAKE A LOOK Prantosh Kumar Paul FBAS, Bengal Engineering & Science University, Howrah, West Bengal, India Email: [email protected] ABSTRACT Cloud Computing
A Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Languages Arabic and English (First language mastery) Persian (moderate comprehension) French and Spanish (took courses out of interest in languages)
Ahmed M. A. Oteafy, Ph.D. Assistant Professor of Electrical Engineering ESE Department College of Engineering Alfaisal University PO Box 50927 Riyadh 11533 Kingdom of Saudi Arabia E-mail: [email protected]
Bachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
The Masters of Science in Information Systems & Technology
The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 1-59-561; FAX: 1-59-692;
Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: [email protected]
HA THU LE. Biography EDUCATION
HA THU LE Electrical and Computer Engineering California State Polytechnic University Pomona 3801 West Temple Ave, Pomona, CA 91768, USA Office: 9-413, Tel: (909) 869 2523, Email: [email protected] Biography
2008 2010 NSERC Alexander Graham Bell Canada Graduate Scholarship, Funding from the Canadian federal government to support graduate studies.
Nikolai Matni, MC 305-16 (626) 787-5914 [email protected] http://www.cds.caltech.edu/ nmatni Education 2010 2015 Ph.D. in Control and Dynamical Systems,, Pasadena, CA. Thesis: Distributed Optimal Control
Centre for Advanced Management Research in Plantation (CARP) Fellow Programme in Management: Agri-Business & Plantation Management (FPM: ABPM)
Centre for Advanced Management Research in Plantation (CARP) i) Introduction Fellow Programme in Management: Agri-Business & Plantation Management (FPM: ABPM) Fellow Programme in Management: Agri-Business
B.Sc. in Computer Engineering, School of Electrical and Computer Engineering,
Narges Khakpour Postdoctoral Researcher Theoretical Computer Science School of Computer Science and Communication Royal Institute of Technology (KTH) Stockholm E-mail: [email protected] Leiden Institute
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
Tailoring MBA (Software Enterprise Management) Curriculum: To Meet India s Growing IT Challenges
: To Meet India s Growing IT Challenges Rakesh K. Singh, Centre for Development of Advanced Computing, [email protected] Abhijit Sen, Kwantlen University College, [email protected] ABSTRACT With
INTRODUCTION. IoT AND IP STRATEGIES
INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic
Model-based Testing of Automotive Systems
Model-based Testing of Automotive Systems Eckard Bringmann and Andreas Krämer ICST 08 Presented by Julia Rubin on November 21, 2012 Multidisciplinary Business 2 Supply Chain of Components 3 Innovation
Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.
Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions
Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar
Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control
ABHINAV NATIONAL MONTHLY REFEREED JOURNAL OF RESEARCH IN ARTS & EDUCATION www.abhinavjournal.com
WEB ENGINEERING: EMERGING DOMAIN EMPHASIZING ITS ROLE AND POSSIBILITIES IN MSC-INFORMATION SCIENCE SPECIALISATION Prantosh Kumar Paul FBAS, Bengal Engineering & Science University, Howrah, West Bengal,
Information Technology Degree Programs
Information Technology Degree Programs Undergraduate Prospectus 2014/2015 Faculty of Information Technology HORIZON COLLEGE OF BUSINESS AND TECHNOLOGY Ministry of Higher Education and University Grants
Going beyond Conventional Software Testing: Cloud Testing
Going beyond Conventional Software : Cloud Deepak Dagar Research Scholar, Singhania University, Rajasthan (INDIA)/ Assistant Professor, Maharaja Agrasen Institute of Management Studies, Delhi (INDIA) Amit
Systems on Chip Design
Systems on Chip Design College: Engineering Department: Electrical First: Course Definition, a Summary: 1 Course Code: EE 19 Units: 3 credit hrs 3 Level: 3 rd 4 Prerequisite: Basic knowledge of microprocessor/microcontroller
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Applied and Integrated Security. C. Eckert
Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass
Library and Information Networks in India
Library Philosophy and (libr.unl.edu:2000/lpp/lppv6n2.htm) ISSN 1522-0222 Library and Information Networks in India Franklin David Jebaraj Fredrick Robin Devadoss Dept. of Library & Information Science
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Real Time Test Bed Development for Power System Operation, Control and Cyber Security
1 Real Time Test Bed Development for Power System Operation, Control and Cyber Security Ram Mohan Reddi, Student Member, IEEE, and Anurag K Srivastava, Senior Member, IEEE Abstract--With ongoing smart
Post : Assistant Professor (Engineering and Technology) Post : Assistant Professor (Management / Business Administration)
Post : Assistant Professor (Engineering and Technology) Rs. 15,600 39,100/ (Pay Band) + A.G.P. Rs. 6,000/ Essential : First Class Master's Degree in the appropriate branch of Engineering (Engg.) & Technology
Department of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
Comparative Study of Automated testing techniques for Mobile Apps
Comparative Study of Automated testing techniques for Mobile Apps Anureet Kaur, Dr.Kulwant Kaur, Amritpal Singh Ph.D., Research Scholar, PTU, Jalandhar(India), Dean and Asst Prof, Apeejay Institute of
Gerald Roth. Department of Electrical Engineering and Computer Science School of Engineering Vanderbilt University Nashville, TN j.roth@vanderbilt.
Gerald Roth Department of Electrical Engineering and Computer Science School of Engineering Vanderbilt University Nashville, TN [email protected] Education Ph.D., Computer Science, Rice University,
Software Testing Strategies and Techniques
Software Testing Strategies and Techniques Sheetal Thakare 1, Savita Chavan 2, Prof. P. M. Chawan 3 1,2 MTech, Computer Engineering VJTI, Mumbai 3 Associate Professor, Computer Technology Department, VJTI,
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
CAD-CAM Application in CNC Machining with Solid & Surface Modelling
Short Term Course On CAD-CAM Application in CNC Machining with Solid & Surface Modelling ( February 22 26, 2016) Venue: CNC Room, CWISS Organized by Central Workshop & Instruments Service Section Indian
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
End-to-end Secure Data Aggregation in Wireless Sensor Networks
End-to-end Secure Data Aggregation in Wireless Sensor Networks Keyur Parmar 1 Devesh Jinwala 2 1 Ph.D Scholar & Senior Research Fellow Department of Computer Engineering SVNIT, Surat, India 2 Professor
Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions
CREATE FY2016 Statement of Work Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions In this project, we develop and apply a model for estimating
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Information Security Management System for Cloud Computing
ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University
RESUME. Dr. Rudra Prakash Maheshwari. Indian Institute of Technology Roorkee 247 667, India. 25th June, 1960
RESUME DR. R. P. MAHESHWARI Department of Electrical Engineering Indian Institute of Technology Roorkee 247 667, India Phone: +91-1332-285596 (Off.) +91-1332-272611, 285116 (Res.) FAX: +91-1332-273560
Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department
Center for Information Security and Assurance (CISA) Charter Mathematical, Computing, and Information Sciences (MCIS) Department This charter establishes the Center for Information Assurance within the
Review of Mobile Applications Testing with Automated Techniques
Review of Mobile Testing with Automated Techniques Anureet Kaur Asst Prof, Guru Nanak Dev University, Amritsar, Punjab Abstract: As the mobile applications and mobile consumers are rising swiftly, it is
Fluvial hydraulics: sediment transport, local scour around hydraulic structures
CURRICULUM VITAE Arindam Sarkar Assistant Professor School of Infrastrusture Indian Institute of Technology Bhubaneswar 751013 Odisha E-mail: [email protected] Phone: +91 674 230 6356 (Off) Mobile:
An Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
