Post Job Free
Sign in

Web Developer Security

Location:
Nashville, TN
Posted:
January 23, 2021

Contact this candidate

Resume:

SATYAKI NAN

Nashville, TN ***** *************@*****.*** 646-***-**** https://github.com/SatyakiNan Google Scholar: https://scholar.google.com/citations?user=XSIeWqgAAAAJ&hl=en SUMMARY OF CAPABILITIES

Software Engineer • Network Security • Optimization • Cyber-Security First year PhD student and MS computer Science graduate with 4 published papers at top conferences. PROJECTS

• Machine Learning project on the virtual self-driving car: Used Q-learning to train the neural network and created an virtual environment, tools used anaconda, IDE: Spider.

• Pattern Recognition in MATLAB - Stored patterns from 0 to 9 and showed the difference between 20% and 80% training.

• Subspace Clustering Project: Equipped with the clustering techniques such k-means, spectral clustering to minimize data set input.

• Data Science Project: Used libraries from Scikit-learn, tensor-flow, PCA to show the prediction of the model with multiple features. Also worked with multi-arm bandit problems to make correct prediction of the best advertisement of 88% for customers in the dataset of 10000.

EXPERIENCE

Graduate Research Assistant, Advisor: Dr Swastik Brahma January 2018 – Present Tennessee State University Cyber Security Lab, Nashville, TN

• On Development of a Game Theoretic Model for Deception Based Security: Used deception techniques to deceive the attacker and with the increase in the number of devices the utility of the system increases from 15% to 60%.

• Behavioral Cyber Deception: A Game and Prospect Theoretic Approach Used game and prospect theory to model interaction between attacker and defender, showing impact of different parameters. Found closed-form best strategies for attacker and defender.

• Redundancy-based Mitigation of Jamming Attacks: Used redundancy-based techniques to transfer information through the channel successfully which guarantees transmissions of the information almost 95% with the increase in channels.

• Mitigation of Jamming Attacks via Deception: The research uses deception to protect the communication between the channels deceiving the jammer and improved the optimum power allocation between the channels from 50% to 85.7%.

• Strategic Hardware Trojan Testing with Hierarchical Trojan Types: The research considers the testing of multiple classes of trojans under hierarchical class and achieved the close form best strategies of the attacker and defender.

• Equilibrium Strategies for Hardware Trojan Insertion-Testing Games: The research considers the testing of types of trojans under budget consideration achieved the close form best strategies of the attacker and defender. Pod Leader, Google, TSU, Under: Dr Adam Leeper August 2020 – Present

• Taught undergraduate students java, helped and managed a team of 10 students in the projects using java to build a game. Designation: Web Developer May 2019 – September 2019 Location: Soumit World Foundation, Nashville, Tennessee

• Worked in the application deployment, database and server administration.

• Recreated the website using Php, Html, CSS, JavaScript (link: http://www.soumitsworld.org/). PROGRAMMING LANGUAGES & TOOLS

Python, C, Html, CSS, JavaScript, Java, C++, Packet-tracer, shell-scripting, No-SQL, MongoDB, Node JS, R, MATLAB, RESTful API, JIRA, Unreal Engine. IDE tools: Eclipse, Jupiter Notebook, Google Colab. Hands on experience in Data Structure and algorithms, experience with agile and waterfall process, in depth knowledge about quantum computing and cryptography and worked with modern machine learning frameworks such SVM, regressions etc. and coding experience with distributed systems consisting of multiple processors. EDUCATION

PhD in Computational Science, Tennessee State University, GPA: 3.75 Excepted graduation: August 2022 MS in Computer Science, Tennessee State University, GPA: 3.75 August 2020 Courses taken: Data Structure and Algorithms, Distributed Algorithms, Advanced Applied Math, AI, Software Engineering, OS. BS in Electronics & Communication Engineering, West Bengal University of Technology, GPA: 3.44 May 2017 PUBLICATIONS

• Satyaki Nan, Swastik Brahma, Charles Kamhoua, and Laurent Njilla, “On Development of a Game Theoretic Model for Deception Based Security”, Book Title: Modeling and Design of Secure Internet of Things, Wiley-IEEE Press (Book Chapter).

• Satyaki Nan, Swastik Brahma, Charles Kamhoua, Nandi O. Leslie, “Behavioral Cyber Deception: A Game and Prospect Theoretic Approach”, 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, pp. 1-6.

• Satyaki Nan and Swastik Brahma, “Redundancy-based Mitigation of Jamming Attacks”, 2020 54th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 2020, pp. 1-6.



Contact this candidate