Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
A Framework for Analyzing Ransomware using Machine Learning
- Subash Poudyal, Kul Prasad Subedi, D. Dasgupta
- Computer ScienceIEEE Symposium Series on Computational…
- 1 November 2018
A reverse engineering framework incorporating feature generation engines and machine learning (ML) to efficiently detect ransomware is developed and it is demonstrated that the combination of static level analysis at the ASM-level and DLL-level can better distinguish ransomware from normal binaries.
Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station
- M. Basnet, Subash Poudyal, M. Ali, D. Dasgupta
- Computer ScienceIEEE PES Innovative Smart Grid Technologies…
- 15 April 2021
This paper proposes the deep learning-based novel ransomware detection framework in the SCADA controlled electric vehicle charging station (EVCS) with the performance analysis of three deep learning algorithms, namely DNN, 1D convolution neural network (CNN), and long short-term memory (LSTM) recurrent neural network.
AI-Powered Ransomware Detection Framework
An AI-based ransomware detection framework and designing a detection tool (AIRaD) using a combination of both static and dynamic malware analysis techniques are proposed.
Stylometry as a Reliable Method for Fallback Authentication
- Nafiz Sadman, Kishor Datta Gupta, Md Ariful Haque, Sajib Sen, Subash Poudyal
- Computer Science17th International Conference on Electrical…
- 1 June 2020
This paper proposed to detect differences between writings on the same topic provided by a set of users and tested whether these differences are enough to use for an authentication system and observed that the combination of textual features can support authenticity of the user.
Detect Review Manipulation by Leveraging Reviewer Historical Stylometrics in Amazon, Yelp, Facebook and Google Reviews
This paper provides a historical stylometry based methodology to detect review manipulations and supported that with results from Amazon, Yelp, Google, and Facebook.
Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review
- M. Ahsan, Kishor Datta Gupta, A. Nag, Subash Poudyal, A. Kouzani, M. P. Mahmud
- Computer ScienceIEEE Access
An overview of bio-inspired algorithms application and evaluations, taking into account cloud security challenges, such as Identity and Authentication, Access Control Systems, Protocol and Network Security, Trust Management, Intrusion Detection, Virtualization, and Forensic are provided.
A Genetic Algorithm Approach to Optimize Dispatching for A Microgrid Energy System with Renewable Energy Sources
A genetic algorithm approach is applied in this project to find the optimal solution of energy scheduling throughout a day, simultaneously using the concept of network reconfiguration, and shows that, it is possible to get 1MW less line lose compared to general condition.
PEFile Analysis: A Static Approach To Ransomware Analysis
The experiment reveals that the static behaviors of the ransomware can be compiled to build a feature database for further analysis such as machine learning classification techniques to detect ransomware.
Shamir's Secret Sharing for Authentication without Reconstructing Password
- Kishor Datta Gupta, Md Lutfar Rahman, D. Dasgupta, Subash Poudyal
- Computer Science, Mathematics10th Annual Computing and Communication Workshop…
- 1 January 2020
This paper proposes an authentication protocol which will use Shamir's secret sharing method to authenticate with server, and will be able to solve the problem that complete data exposure from server will not reveal the actual password provided by the user.
A Hybrid POW-POS Implementation Against 51 percent Attack in Cryptocurrency System
- Kishor Datta Gupta, Abdur Rahman, Subash Poudyal, M. N. Huda, M. Mahmud
- Computer ScienceIEEE International Conference on Cloud Computing…
- 1 December 2019
A step by step process to implement a Hybrid PoW-PoS based consensus protocol which provides a uniform distribution of mining reward to the stake holders and investors by maintaining a precise block generation interval with difficulty adjustment in PoW mining and probability calculation for stake holders according to their matured staking balance.