BRAINWARE UNIVERSITY
398, Ramkrishnapur Road, near Jagadighata Market, Barasat, Kolkata, West Bengal 700125
BSC Honours from Lady Brabourne College in 2000
MCA FROM NIELIT in 2005
MTech from Maulana Abul Kalam Azad University of Thcenology in 2007
PhD from University of Calcutta in 2014
“GOLD MEDAL” in MTech in Software Engineering from Maulana Abul Kalam Azad University of Technology.
Received Appreciation Certificate from Narula Institute Of Technology for webinar on "Internet of Things-Idea to Innovation" on 19/6/2021
Internet Of Things
Network Security
Adhoc Networking
Block Chain
MACHINE LEARNING BASED SMART GRID POWER SYSTEM INTEGRATED WITH WIRELESS
COMMUNICATION NETWORKS, Publication Date : 16/07/2021
DEEP LEARNING AND WIRELESS BASED ENERGY EFFICIENT AUTONOMOUS SYSTEM FOR
POLLUTION CONTROL IN E-CITIES, Publication Date : 26/11/2021
IoT enabled automatic EB billing system, Publication Date : 05/08/2022
International Conference
“Remote Authentication of Fingerprints using Meaningful Visual Cryptography”, Surajit Goon, Debdutta Pal and Souvik Dihidar (2022),, 3rd International Conference on Emerging technologies in Data Mining and Information Security, Lecture Notes in Networks and Systems, Springer, vol 491, PP 637-646
.“Distribution of Internet Banking Credentials Using Visual Cryptography and Watermarking Techniques”. Goon, S., Pal, D., Dihidar, S. (2022). In: Tavares, J.M.R.S., Dutta, P., Dutta, S., Samanta, D. (eds) Cyber Intelligence and Information Retrieval. Lecture Notes in Networks and Systems, vol 291, pp 59–67. Springer, Singapore. https://doi.org/10.1007/978-981-16-4284-5_6
"Distribution of Internet Banking Credentials using Visual Cryptography and Watermarking Techniques ",Mr. Surojit Goon, Dr. Debdutta Pal ,CIIR,2020
"A Survey on Covid19 Case Analysis using Machine Learning"-Shalini Roy Chowdhury and Dr. Debdutta Pal ,published in 2020 International Conference on Application of Network ,Sensors and Autonomous Systems Analytics
"Congestion Control for IoT Using Channel Trust Based Approach”, Moumita Poddar, Rituparna Chaki, Debdutta Pal, Published 2018 in CISIM,DOI:10.1007/978-3-319-99954-8_33
“A Channel Trust Based Approach for Congestion Control in IoT”, Moumita Poddar, Debdutta Pal International Conference on Computational Science and Engineering [ICCSE2016]
"State of the Art Analysis of Congestion Control Mechanisms in IoT'”, Moumita Poddar, Debdutta pal 9th International Conference on Application of Information and Communication Technologies (AICT), 2015
“State of the Art Analysis of Network Traffic Anomaly Detection”, Debdutta Barman Roy and Rituparna Chaki, AIMOC, 2014
“MCBHIDS: Modified Layered Cluster Based Algorithm for Black Hole IDS”, Debdutta Barman Roy and Rituparna Chaki, INDICON, 2013
“MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System” , Debdutta Barman Roy and Rituparna Chaki,CISIM,2011
“Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent ”Debdutta Barman Roy, Rituparna Chaki,WIMO,2011
"Prevention of sleep deprivation attacks using Clustering" Manasi Sarkar , Debdutta Pal ,ICNCS -2011 , IEEE Conference
"State of the art Analysis of service attacks in mobile adhoc network" Manasi Sarakar , Debdutta Pal ICNCS-2011- IEEE conference
“Review on TBRPF Routing and Detecting the Possible Attacks in TBRPF Routing Protocol in Mobile Adhoc Network,” Debdutta Pal, Proceedings of 4th Innovative Conference on Embedded Mobile Communication and Computing, ICEMC2 2009.
“Performance Analysis of a Mobile Adhoc Network in Presence of Warm Hole attack and a New Intrusion Detection Algorithm for Detecting WarmHole Attack in MANET,” Debdutta Pal, International Conf. on Computer, Communication, Control and Information Technology (C3IT-09), 2009
International Journal
"Primary Color Based Numerous Image Creation in Visual Cryptography with the Help of Grasshopper Algorithm, Artificial Neural Network and Elliptic Curve Cryptography", Goon, S., Pal, D. & Dihidar, S. Journal of Computer Science ,18(5), 322-338. https://doi.org/10.3844/jcssp.2022.322.338
“Enhanced Visual Cryptography Network (EVCN) for Secured Data Transmission Combining Des and Elliptic Curve Cryptography”, Goon, S., Pal, D. & Dihidar, S. , Indian Journal of Computer Science and Engineering, Vol. 13 No. 4, pp. 1168-1184
“Pervasive Computing and Brain Computer Interface” Debdutta Pal, Sayani Majumder, Anisha Ali, IJARCCE,vol.4, issue. 8,2015
“Baids: Detection Of Blackhole Attack In Manet By Specialized Mobile Agent”, Debdutta Barman Roy and Rituparna Chaki,IJCA,FEBRUARY,2012,ISBN: 978-93-80866-53-4
“MADSN: Mobile Agent Based Detection of Selfish Node in MANET “,Debdutta Barman Roy and Rituparna Chaki, IJWMN, 2011
"Comparative study of attacks on AODV based mobile Adhoc Network" Ipsa De , Debdutta Pal ;International Journal of Computer Science and Engineering (IJCSE)-2011
“Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme”, Rusha Nandy, Debdutta Barman Roy,IJANA “Volume 03, Issue: 01 PG.1035-1043. 2010.
“BHIDS: a new, cluster based algorithm for black hole IDS.” Security and Communication Networks 3(2-3): 278-288 (2010)
“A New Cluster Based Warm Hole Intrusion Detection Algorithm for Mobile Adhoc Network,” Debdutta Pal, International Journal of Network Security & its Application, vol. 1, no. 1, April, 2009
Principal Investigator of the sponsored project is completed successfully on “SSSM: Smart Soil Moisture Sensor” Sponsored by Institution of Engineers (India) .
Principal Investigator of the sponsored project is completed successfully on “Automated Helmet Detection” Sponsored by Institution of Engineers (India).
“Data Structure and Algorithm with C”, March, 2018 by NAROSA publication
“Intrusion Detection in Wireless Ad-Hoc Networks”, February 6, 2014 by CRC Press , Ch: 2, 3, 4 and 6.
Type Organisation Duration
Refresher course on Information Technology A.K.C.S.I.T (CU) 21 days
NBA Accreditation Workshop Engineering Staff College India collaboration with CIEM 3 days
Evaluating Students Performance
& Designing Question Papers NITTTR-Kolkata 15 weeks
Software Engineering and Testing Tools NITTTR-Kolkata 15 days
Introduction to Linux NITTTR-Kolkata 7 days
Data structure and Algorithm NITTTR-Kolkata 7 days
Object Oriented Design using UML NITTTR-Kolkata 7 days
Effective Teaching NITTTR-Kolkata 7 days
HRD Through Training and Development NITTTR-Kolkata 7 days
Artificial Intelligence NITTTR-Kolkata 7 days
Institutional Development NITTTR-Kolkata 7 days
NBA Accreditation and SAR Preparation NITTTR-Kolkata 7 days
Student Mentorship NITTTR-Kolkata 7 days
Induction Program NITTTR-Kolkata 14 days
Associate Professor and HoD, Computer Science and Engineering Department, Brainware University.
Former Associate Professor(Head Of the Department) in Computer Science and Engineering Department in Calcutta Institute Of Engineering and Management for 1 year 11months (February,17-till date)
Former Assistant Professor in Information Technology Department in Calcutta Institute Of Engineering and Management for 9 year 11months (February-08-february,2017)
Worked as Visiting Lecturer in AKCSIT, University of Calcutta for MCA in 2013 and 2014.
Worked as visiting Lecturer in Computer Science and Engineering Department ,University of Calcutta,2021
Worked as a Visiting Lecturer in George Group of Colleges for 6 months (August 2007-January-2008)
Life member of Institution of Engineers (India) -M-1599407
Member of Computer Society of India
Member of Institute of Scholars -InSc20211135