Academic Profile of Prof. Partha Ghosh
Academic Profile of Prof. Partha Ghosh
Partha Ghosh
Associate Professor,
Information Technology Department

ACADEMIC QUALIFICATION:
Ph.D.: 2023, Ph.D. in Technology(Computer Science & Engineering), MAKAUT
Post Graduate: 2003, M.Tech in Computer Science & Engineering, M.SC in Computer & Information Science, CU
Under Graduate: 1999, B.Sc (Hons) in Computer Science, CU

TOTAL EXPERIENCE: 22 Years

Official eMail Id: partha.ghosh@nsec.ac.in
Professional Experience:
21 years in N.S.E.C.


Professional Society Membership:
Lifetime Membership of Institute of Researchers


Awards & Honors Received:
1. C V Raman Prize 2024 (Certificate ID: CVP012403), InRes 27-02-2024

2. Research Excellence Award 2024 (Certificate ID: REA012401), InRes, 27-02-2024

3. International Research Excellence 2024 (Certificate ID: I2OR/2024/IA/R-002), I2OR, 2024

4. Vigyan Bhushan Puraskar (Certificate ID: 003736700448), Edwin Corp., 2024

5. Academic Excellence Award 2024 (Certificate ID: IRSD/2024/A-46), IRSD, 2024



No of Journal Paper Published: 10

No Conference Paper Published: 11

Research Areas:
Cloud Computing, Intrusion Detection, Machine Learning


Journal Reviewer:
I. The Journal of Supercomputing (Electronic ISSN: 1573-0484, Print ISSN: 0920-8542).

II. Journal of Big Data (Electronic ISSN: 2196-1115).

III. Journal of Intelligent and Fuzzy Systems (Online ISSN: 1875-8967).

IV. International Journal of Computer Networks & Communications (Online ISSN: 0974-9322).

V. Journal of Knowledge in Data Science and Information Management

VI. Journal of Intelligent Data Analysis and Computational Statistics


No. of B.Tech/BBA/BCA/B.Sc. Final Year Projects Handled: 2

No of Conferences/Invited Talks/Seminars/ Attended: 3

FDP Attended:
1. 6 days FDP on Advance Machine Learning and its Applications, NSEC, Kolkata ,10-12th,15th,17-18th January, 2024, Techno India Group, Kolkata.

2. 10-Days FDP on Data Science and Machine Learning with Python, NSEC, Kolkata, 3 – 12 July, 2019, Techno India Group, Kolkata

3. 1-Week ISEA Project Phase II FDP on Cyber Security, MAKAUT, West Bengal, 28 January – 1 February, 2019, Dept. of Electronics and Information Technology, GOI.

4. 8-Week course on Introduction to Machine Learning, IIT-KGP, August – October, 2018 MHRD, GOI.

5. 1-Week ISEA Project Phase II FDP on Network Security, MAKAUT, West Bengal, 15 – 19 January, 2018, Dept. of Electronics and Information Technology, GOI.

6. 2-Days Workshop on Big Data Hadoop & Hive NSEC, Kolkata 3 – 4 August, 2017 Netaji Subhash Engineering College, Kolkata.

7. 1-Week ISEA Project Phase II FDP on Selected Topics on Security Issues in Internet of Things, MAKAUT, West Bengal, 20 - 24, February, 2017, Dept. of Electronics and Information Technology, GOI.

8. 1-Week FDP on Computational Intelligence for Optimization Problems Calcutta Business School, Kolkata, 28 March – 1 April, 2016, Calcutta Business School.

9. 2-Weeks ISTE Workshop on Computer Networking, NSEC, Kolkata, 28 May – 5 July, 2014, NME-ICT, MHRD.

10. 1-Day Seminar on Cloud Computing & Cryptography, TICT, Kolkata 29 April, 2014, Techno India Group & IEEE Gold, Kolkata Section.

11. Train The Trainer Workshop on Mobile Application Development using Android, NSEC, Kolkata, 21 – 23 April, 2014, Infosys limited, Bhubaneswar.

12. 1-Day Workshop on Cloud Computing and the Aneka Platform, University of Calcutta, Kolkata, 16 April, 2014, Dept. of CSE & A.K.Choudhury School of Information Technology, University of Calcutta.



COURSES UNDERTAKEN:
Undergraduate: Computer Networking , Cyber Law and Security Policies

Administrative Responsibilities:
Departmental NBA Coordinator, Member of Anti-Ragging Committee


Name of Final Year Projects (Currently Handling):
Optimization Techniques for Intrusion Detection System


Role as a Mentor:
1st year student mentor


List of Publication of Journals Papers:
1. Ghosh, Partha & Sharma, Joy & Pandey, Nilesh. (2024). Feature Selection using the Concept of Peafowl Mating in IDS. International journal of Computer Networks & Communications. 16. 51-69. doi:10.5121/ijcnc.2024.16104. [Indexing: SCOPUS]

2. P. Kumar, S. Shakti, N. Datta, S. Sinha and P. Ghosh, “Feature selection using PRACO method for IDS in cloud environment,” Journal of Intelligent and Fuzzy Systems, issn. 1875-8967, vol. 43, no. 5, pp. 5487-5500, 2022, doi: 10.3233/JIFS-212196. [Indexing: SCIE, DBLP, Inspec etc.; Impact Factor: 1.737]

3. P. Ghosh, S. Sinha, R. R. Sharma, and S. Phadikar, “An efficient IDS in cloud environment using feature selection based on DM algorithm,” Springer, Journal of Computer Virology and Hacking Techniques, issn. 2263-8733, vol. 18, pp. 243-258, 2022, doi: 10.1007/s11416-021-00410-1. [Indexing: ESCI, SCOPUS, Google Scholar, DBLP, UGC-CARE List etc.]

4. P. Ghosh, Z. Alam, R. R. Sharma and S. Phadikar, “An efficient SGM based IDS in cloud environment,” Springer, Computing, issn. 1436-5057, vol. 104, pp. 553-576, 2022, doi: 10.1007/s00607-022-01059-4. [Indexing: SCI, SCIE, SCOPUS, Google Scholar, DBLP, UGC CARE List etc.; Impact Factor: 2.420]

5. P. Ghosh, D. Sarkar, J. Sharma, and S. Phadikar, “An intrusion detection system using Modified firefly algorithm in cloud environment,” Int. J. Digit. Crime Forensics, issn. 1941-6210, vol.13, no. 2, pp. 77–93, 2021, doi: 10.4018/IJDCF.2021030105. [Indexing: ESCI, SCOPUS, Google Scholar, DBLP, UGC-CARE List etc.]

6. P. Ghosh, S. Biswas, S. Shakti, and S. Phadikar, “An improved intrusion detection system to preserve security in cloud environment,” Int. J. Inf. Secur. Priv., issn. 1930-1650, vol. 14, no. 1, pp. 67–80, 2020, doi: 10.4018/IJISP.2020010105. [Indexing: ESCI, SCOPUS, Google Scholar, DBLP, UGC-CARE List etc.]

7. S. Shakti, P. Ghosh, R. Kumar and S. Phadikar, “Feature Selection using Modified Charged System Search for Intrusion Detection Systems in Cloud Environment,” International Journal of Control Theory and Applications, issn. 0974-5572, vol. 9, no. 41, pp. 1012-1021, 2016. [Indexing: SCOPUS]

8. P. Ghosh, S. Shakti, and S. Phadikar, “A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule,” Int. J. Cloud Appl. Comput., issn. 2156-1834, vol. 6, no. 4, pp. 18–35, 2016, doi: 10.4018/ijcac.2016100102. [Indexing: SCOPUS, Inspec, Google Scholar, DBLP, UGC-CARE List etc.]

9. P. Ghosh, C. Debnath, D. Metia, and D. R. Dutta, “An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment,” IOSR J. Comput. Eng., issn. 2278-0661, vol. 16, no. 4, pp. 16–26, 2014, doi: 10.9790/0661-16471626. [Indexing: Google Scholar, Semantic Scholar, ResearchGate etc.]

10. P. Ghosh, R. Ghosh and R. Dutta, “An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing,” International Journal of Scientific & Technology Research, issn. 2277-8616, vol. 3, no. 5, pp. 199-203, 2014. [Indexing: Google Scholar, Semantic Scholar etc.]



List of Publication of Conference Proceedings:
1. P. Ghosh, P. Kumar, S. Paul, and S. Phadikar, “An IDS in Cloud Environment by using Feature Selection based Hybrid Multilevel Classifier,” GRENZE International Journal of Engineering and Technology, vol. 8, no. 1, pp. 381-386, 2022, 01.GIJET.8.1.13_1.

2. R. R. Sharma and P. Ghosh, “A Novel Jackson’s Widowbird Mating Optimization Algorithm,” in IEEE 1st International Conference for Convergence in Engineering (ICCE), IEEE, 2020, pp. 230 -234, doi: 10.1109/ICCE50343.2020.9290672. [Indexing: Inspec]

3. D. Majumder, A. Singh, P. Ghosh and S. Phadikar, “A Novel SNN-ANN based IDS in Cloud Environment,” in International Conference on Electronics and Sustainable Communication Systems (ICESC), IEEE, 2020, pp. 913-918, doi: 10.1109/ICESC48915.2020.9155705.

4. P. Ghosh, A. Saha, and S. Phadikar, “Penalty-Reward Based Instance Selection Method in Cloud Environment Using the Concept of Nearest Neighbor,” in Procedia Computer Science, Elsevier, 2016, vol. 89, pp. 82–89, doi: 10.1016/j.procs.2016.06.012. [Indexing: SCOPUS, Inspec etc.]

5. P. Ghosh, M. Bardhan, N. R. Chowdhury, and S. Phadikar, “IDS using reinforcement learning automata for preserving security in cloud environment,” Int. J. Inf. Syst. Model. Des., issn. 1947- 8186, vol. 8, no. 4, pp. 21–37, 2017, doi: 10.4018/IJISMD.2017100102. [Indexing: ESCI, SCOPUS, Google Scholar, DBLP, UGC-CARE List etc.]

6. P. Ghosh and R. Mitra, “Proposed GA-BFSS and logistic regression based intrusion detection system,” in Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), IEEE, 2015, pp. 1–6, doi: 10.1109/C3IT.2015.7060117.

7. P. Ghosh, N. R. Chowdhury, and D. Metia, “A Hybrid SVM-NN Based Multilevel Classifier for Detecting Network Intrusions,” in Computer Science, Communication and Instrumentation Devices, 2014, doi: 10.3850/978-981-09-5247-1_031.



List Books / Book Chapters:
1. S. Paul, N. Pandey, S. Bose and P. Ghosh, “An Intrusion Detection System Using Feature Selection Based on Red Kangaroo Mating Algorithm”, in Advances in Cognitive Science and Communications, Springer, 2023, pp. 365-372, doi: 10.1007/978-981-19-8086-2_36. [Indexing: SCOPUS]

2. P. Ghosh, A. Karmakar, J. Sharma, and S. Phadikar, “CS-PSO based intrusion detection system in cloud environment,” in Emerging Technologies in Data Mining and Information Security, Springer, 2019, pp. 261–269, doi: 10.1007/978-981-13-1951-8_24. [Indexing: DBLP, Inspec etc.]

3. P. Ghosh, S. Jha, R. Dutta, and S. Phadikar, “Intrusion Detection System Based on BCS-GA in Cloud Environment,” in International Conference on Emerging Research in Computing, Information, Communication and Applications, Springer, 2017, doi: 10.1007/978-981-10-47411_35.

4. P. Ghosh, A. K. Mandal, and R. Kumar, “An Efficient Cloud Network Intrusion Detection System,” in Advances in Intelligent Systems and Computing, Springer, 2015, vol. 339, pp. 91–99, doi: 10.1007/978-81-322-2250-7. [Indexing: DBLP, Inspec etc.]

Last Updated on 2025-01-14 05:07:24