Dipankar Dasgupta

According to our database1, Dipankar Dasgupta authored at least 148 papers between 1992 and 2022.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to immunological computation and bio-inspired cyber security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Negative Selection Algorithm Research and Applications in the Last Decade: A Review.
IEEE Trans. Artif. Intell., 2022

2021
Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks.
SN Comput. Sci., 2021

Who is Responsible for Adversarial Defense?
CoRR, 2021

Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station.
CoRR, 2021

Analysis of Crypto-Ransomware Using ML-Based Multi-Level Profiling.
IEEE Access, 2021

Social Engineering Attacks in Healthcare Systems: A Survey.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
J. Medical Syst., 2020

Weighted quasi-arithmetic mean based score level fusion for multi-biometric systems.
IET Biom., 2020

Adversarial Input Detection Using Image Processing Techniques (IPT).
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

AI-Powered Ransomware Detection Framework.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Machine Learning and Feature Selection Based Ransomware Detection Using Hexacodes.
Proceedings of the Evolution in Computational Intelligence, 2020

An Empirical Study on Algorithmic Bias.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Shamir's Secret Sharing for Authentication without Reconstructing Password.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Handling Big Data Using a Data-Aware HDFS and Evolutionary Clustering Technique.
IEEE Trans. Big Data, 2019

A survey of blockchain from security perspective.
J. Bank. Financial Technol., 2019

Design and implementation of Negative Authentication System.
Int. J. Inf. Sec., 2019

Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Low Dose Abdominal CT Image Reconstruction: An Unsupervised Learning Based Approach.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

2018
A fuzzy decision support system for multifactor authentication.
Soft Comput., 2018

Multi-user permission strategy to access sensitive information.
Inf. Sci., 2018

Thermal Vein Signatures, DNA and EEG Brainprint in Biometric User Authentication.
Proceedings of the Applied Computer Sciences in Engineering, 2018

A Framework for Analyzing Ransomware using Machine Learning.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Forensic Analysis of Ransomware Families Using Static and Dynamic Analysis.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

Big Data Framework for Finding Patterns in Multi-market Trading Data.
Proceedings of the Big Data - BigData 2018, 2018

2017
RDS3: Ransomware defense strategy by using stealthily spare space.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control.
Proceedings of the Information Systems Security - 13th International Conference, 2017

2016
Toward the design of adaptive selection strategies for multi-factor authentication.
Comput. Secur., 2016

Apache Hama: An Emerging Bulk Synchronous Parallel Computing Framework for Big Data Applications.
IEEE Access, 2016

Security analysis on InfiniBand protocol implementations.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Distributed genetic algorithm to big data clustering.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Classification of Insider Threat Detection Techniques.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Human-Cognition-Based CAPTCHAs.
IT Prof., 2015

Co-Simulation Platform for Characterizing Cyber Attacks in Cyber Physical Systems.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

An Adaptive Approach Towards the Selection of Multi-Factor Authentication.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Information assurance: a cyber security storm map.
Int. J. Inf. Priv. Secur. Integr., 2014

Steps toward Developing an Artificial Cell Signaling Model Applied to Distributed Fault Detection.
Proceedings of the Unconventional Computation and Natural Computation, 2014

An adaptive approach for continuous multi-factor authentication in an identity eco-system.
Proceedings of the Cyber and Information Security Research Conference, 2014

Distributed evolutionary approach to data clustering and modeling.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence and Data Mining, 2014

G-NAS: A grid-based approach for negative authentication.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

2013
Consequences of Diminishing Trust in Cyberspace.
Int. J. Cyber Warf. Terror., 2013

Clustering online social network communities using genetic algorithms.
CoRR, 2013

Artificial Immune Systems (INTROS 2).
CoRR, 2013

Applying Puzzle-Based Learning to Cyber-Security Education.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

Deriving behavior primitives from aggregate network features using support vector machines.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

A prediction model for anomalies in smart grid with sensor network.
Proceedings of the Cyber Security and Information Intelligence, 2013

Resilient hybrid overlay model for smart grid: RHM for smart grid.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013

2012
On a multi-objective evolutionary algorithm for optimizing end-to-end performance of scientific workflows in distributed environments.
Proceedings of the 2012 Spring Simulation Multiconference, 2012

Effects of Time Delays in the Electric Power Grid.
Proceedings of the Critical Infrastructure Protection VI, 2012

A Cyber-Security Storm MAP.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

An artificial immune system for phishing detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

A Genetic-Based Solution to the Task-Based Sailor Assignment Problem.
Proceedings of the Variants of Evolutionary Algorithms for Real-World Applications, 2012

2011
A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis.
Int. J. Inf. Secur. Priv., 2011

Recent Advances in Artificial Immune Systems: Models and Applications.
Appl. Soft Comput., 2011

Estimating Security Coverage for Cloud Services.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

A framework for estimating security coverage for cloud service insurance.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Secure VM for monitoring industrial process controllers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Who Is Responsible for Security and Privacy in the Cloud?
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Security visualization: Cyber security storm map and event correlation.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Evolving Gaming Strategies for Attacker-Defender in a Simulated Network Environment.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Multi-objective Evolutionary Algorithms to Solve Coverage and Lifetime Optimization Problem in Wireless Sensor Networks.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2010

Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey.
Proceedings of the SECRYPT 2010, 2010

A Survey of Game Theory as Applied to Network Security.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Password Security through Negative Filtering.
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010

Game theory for cyber security.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

A conceptual model of self-monitoring multi-core systems.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

A parallel framework for multi-objective evolutionary optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage.
Inf. Sci., 2009

Artificial Immune Systems
CoRR, 2009

An integrated cyber security monitoring system using correlation-based techniques.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

An Empirical Study of Conserved Self Pattern Recognition Algorithm: Comparing to other One-class Classifiers and Evaluating with Random Number Generators.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

A multiobjective evolutionary algorithm for the task based sailor assignment problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Monitoring security events using integrated correlation-based techniques.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

A biologically inspired password authentication system.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

An empirical comparison of memetic algorithm strategies on the multiobjective quadratic assignment problem.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, 2009

On the use of informed initialization and extreme solutions sub-population in multi-objective evolutionary algorithms.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, 2009

Visualization of security events using an efficient correlation technique.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Tutorial: computational intelligence in cyber security.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Characterizing comment spam in the blogosphere through content analysis.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Artificial Immune Systems Tutorial
CoRR, 2008

Enhancing Computer Security with Smart Technology [Book Review].
IEEE Comput. Intell. Mag., 2008

Special issue on computational intelligence in cyber security [Preface].
IEEE Comput. Intell. Mag., 2008

Conserved Self Pattern Recognition Algorithm.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008

A comparison of multiobjective evolutionary algorithms with informed initialization and kuhn-munkres algorithm for the sailor assignment problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

2007
Applying Hybrid Multiobjective Evolutionary Algorithms to the Sailor Assignment Problem.
Proceedings of the Advances in Evolutionary Computing for System Design, 2007

Immuno-inspired autonomic system for cyber defense.
Inf. Secur. Tech. Rep., 2007

Revisiting Negative Selection Algorithms.
Evol. Comput., 2007

Multiobjective Landscape Analysis and the Generalized Assignment Problem.
Proceedings of the Learning and Intelligent Optimization, Second International Conference, 2007

A Framework for Evolving Multi-Shaped Detectors in Negative Selection.
Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, 2007

2006
Advances in artificial immune systems.
IEEE Comput. Intell. Mag., 2006

Recognition of Handwritten Indic Script Using Clonal Selection Algorithm.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

Comparative analysis of the sailor assignment problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Applicability issues of the real-valued negative selection algorithms.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Mining security events in a distributed agent society.
Proceedings of the Data Mining, 2006

Analysis of Dental Images using Artificial Immune Systems.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Analyzing the Performance of Hybrid Evolutionary Algorithms for the Multiobjective Quadratic Assignment Problem.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
MILA - multilevel immune learning algorithm and its application to anomaly detection.
Soft Comput., 2005

CIDS: An agent-based intrusion detection system.
Comput. Secur., 2005

Estimating the detector coverage in a negative selection algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Genetic algorithms for the sailor assignment problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Efficient visualization of security events in a large agent society.
Proceedings of the Data Mining, 2005

2004
Real-Valued Negative Selection Algorithm with Variable-Sized Detectors.
Proceedings of the Genetic and Evolutionary Computation, 2004

Augmented negative selection algorithm with variable-coverage detectors.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

On geometric and statistical properties of the attractors of a generic evolutionary algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Anomaly Detection Using Real-Valued Negative Selection.
Genet. Program. Evolvable Mach., 2003

A New Gravitational Clustering Algorithm.
Proceedings of the Third SIAM International Conference on Data Mining, 2003

A Randomized Real-Valued Negative Selection Algorithm.
Proceedings of the Artificial Immune Systems, Second International Conference, 2003

An Evolutionary Approach to Generate Fuzzy Anomaly Signatures.
Proceedings of the IEEE Systems, 2003

A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning.
Proceedings of the Genetic and Evolutionary Computation, 2003

The Effect of Binary Matching Rules in Negative Selection.
Proceedings of the Genetic and Evolutionary Computation, 2003

Using Adaptive Operators in Genetic Search.
Proceedings of the Genetic and Evolutionary Computation, 2003

MILA - Multilevel Immune Learning Algorithm.
Proceedings of the Genetic and Evolutionary Computation, 2003

Soft multiple expression and genetic redundancy: preliminary results for non-stationary function optimization.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

An immuno-fuzzy approach to anomaly detection.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Motif discovery in upstream sequences of coordinately expressed genes.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003

Artificial immune system (AIS) research in the last five years.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003

2002
An immunity-based technique to characterize intrusions in computer networks.
IEEE Trans. Evol. Comput., 2002

Guest editorial special issue on artificial immune systems.
IEEE Trans. Evol. Comput., 2002

An Novel Artificial Immune System Approach to Robust Data Mining.
Proceedings of the Late Breaking papers at the Genetic and Evolutionary Computation Conference (GECCO-2002), 2002

Modeling Convection Coefficients With Genetic Algorithms.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

An Imunogenetic Technique To Detect Anomalies In Network Traffic.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

Using Competitive Operators and a Local Selection Scheme in Genetic Search.
Proceedings of the Late Breaking papers at the Genetic and Evolutionary Computation Conference (GECCO-2002), 2002

The fuzzy artificial immune system: motivations, basic concepts, and application to clustering and Web profiling.
Proceedings of the 2002 IEEE International Conference on Fuzzy Systems, 2002

An Immunochip Architecture and Its Emulation.
Proceedings of the 4th NASA / DoD Workshop on Evolvable Hardware (EH 2002), 2002

Determining optimal configuration for turbine generator cooler.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

Combining negative selection and classification techniques for anomaly detection.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

Evolving PC system hardware configurations.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

Anomaly detection in multidimensional data using negative selection algorithm.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

Tool to Generate a Local Internet Weather Report.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2001
An Intelligent Decision Support System for Intrusion Detection and Response.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

2000
An evolutionary algorithm for fractal coding of binary images.
IEEE Trans. Evol. Comput., 2000

A comparison of negative and positive selection algorithms in novel pattern detection.
Proceedings of the IEEE International Conference on Systems, 2000

An Evolutionary Approach for Job Assignment.
Proceedings of the ISCA 9th International Conference on Intelligent Systems, 2000

1999
An Immunogenetic Approach to Spectra Recognition.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 1999

Evolutionary Economic Agents.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
Evolving Neuro-Controllers for a Dynamic System Using Structured Genetic Algorithms.
Appl. Intell., 1998

An artificial immune system as a multi-agent decision support system.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

Metacognition in Software Agents Using Classifier Systems.
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998

1997
Evolutionary algorithms in engineering applications.
Springer, ISBN: 978-3-540-62021-1, 1997

1994
Handling Deceptive Problems Using a Different Genetic Search.
Proceedings of the First IEEE Conference on Evolutionary Computation, 1994

1993
Short Term Unit-Commitment Using Genetic Algorithms.
Proceedings of the Fifth International Conference on Tools with Artificial Intelligence, 1993

1992
Nonstationary Function Optimization using the Structured Genetic Algorithm.
Proceedings of the Parallel Problem Solving from Nature 2, 1992

Engineering Optimizations Using the Structured Genetic Aigorithm.
Proceedings of the 10th European Conference on Artificial Intelligence, 1992


  Loading...