Professional Experience:21 years in N.S.E.C.
Professional Society Membership:Lifetime Membership of Institute of Researchers
Awards & Honors Received:1. C V Raman Prize 2024 (Certificate ID: CVP012403), InRes 27-02-2024
2. Research Excellence Award 2024 (Certificate ID: REA012401), InRes, 27-02-2024
3. International Research Excellence 2024 (Certificate ID: I2OR/2024/IA/R-002), I2OR, 2024
4. Vigyan Bhushan Puraskar (Certificate ID: 003736700448), Edwin Corp., 2024
5. Academic Excellence Award 2024 (Certificate ID: IRSD/2024/A-46), IRSD, 2024
No of Journal Paper Published: 10
No Conference Paper Published: 11
Research Areas:Cloud Computing, Intrusion Detection, Machine Learning
Journal Reviewer:I. The Journal of Supercomputing (Electronic ISSN: 1573-0484, Print ISSN: 0920-8542).
II. Journal of Big Data (Electronic ISSN: 2196-1115).
III. Journal of Intelligent and Fuzzy Systems (Online ISSN: 1875-8967).
IV. International Journal of Computer Networks & Communications (Online ISSN: 0974-9322).
V. Journal of Knowledge in Data Science and Information Management
VI. Journal of Intelligent Data Analysis and Computational Statistics
No. of B.Tech/BBA/BCA/B.Sc. Final Year Projects Handled: 2
No of Conferences/Invited Talks/Seminars/ Attended: 3
FDP Attended:1. 6 days FDP on Advance Machine Learning and its Applications, NSEC, Kolkata ,10-12th,15th,17-18th January, 2024, Techno India Group, Kolkata.
2. 10-Days FDP on Data Science and Machine Learning with Python, NSEC, Kolkata, 3 – 12 July, 2019, Techno India Group, Kolkata
3. 1-Week ISEA Project Phase II FDP on Cyber Security, MAKAUT, West Bengal, 28 January – 1 February, 2019, Dept. of Electronics and Information Technology, GOI.
4. 8-Week course on Introduction to Machine Learning, IIT-KGP, August – October, 2018 MHRD, GOI.
5. 1-Week ISEA Project Phase II FDP on Network Security, MAKAUT, West Bengal, 15 – 19 January, 2018, Dept. of Electronics and Information Technology, GOI.
6. 2-Days Workshop on Big Data Hadoop & Hive NSEC, Kolkata 3 – 4 August, 2017 Netaji Subhash Engineering College, Kolkata.
7. 1-Week ISEA Project Phase II FDP on Selected Topics on Security Issues in Internet of Things, MAKAUT, West Bengal, 20 - 24, February, 2017, Dept. of Electronics and Information Technology, GOI.
8. 1-Week FDP on Computational Intelligence for Optimization Problems Calcutta Business School, Kolkata, 28 March – 1 April, 2016, Calcutta Business School.
9. 2-Weeks ISTE Workshop on Computer Networking, NSEC, Kolkata, 28 May – 5 July, 2014, NME-ICT, MHRD.
10. 1-Day Seminar on Cloud Computing & Cryptography, TICT, Kolkata 29 April, 2014, Techno India Group & IEEE Gold, Kolkata Section.
11. Train The Trainer Workshop on Mobile Application Development using Android, NSEC, Kolkata, 21 – 23 April, 2014, Infosys limited, Bhubaneswar.
12. 1-Day Workshop on Cloud Computing and the Aneka Platform, University of Calcutta, Kolkata, 16 April, 2014, Dept. of CSE & A.K.Choudhury School of Information Technology, University of Calcutta.
COURSES UNDERTAKEN:
Undergraduate: Computer Networking , Cyber Law and Security Policies
Administrative Responsibilities: Departmental NBA Coordinator, Member of Anti-Ragging Committee
Name of Final Year Projects (Currently Handling): Optimization Techniques for Intrusion Detection System
Role as a Mentor: 1st year student mentor
List of Publication of Journals Papers: 1. Ghosh, Partha & Sharma, Joy & Pandey, Nilesh. (2024). Feature Selection using the Concept of Peafowl Mating in IDS. International journal of Computer Networks & Communications. 16. 51-69. doi:10.5121/ijcnc.2024.16104. [Indexing: SCOPUS]
2. P. Kumar, S. Shakti, N. Datta, S. Sinha and P. Ghosh, “Feature selection using PRACO method for IDS in cloud environment,” Journal of Intelligent and Fuzzy Systems, issn. 1875-8967, vol. 43, no. 5, pp. 5487-5500, 2022, doi: 10.3233/JIFS-212196. [Indexing: SCIE, DBLP, Inspec etc.; Impact Factor: 1.737]
3. P. Ghosh, S. Sinha, R. R. Sharma, and S. Phadikar, “An efficient IDS in cloud environment using feature selection based on DM algorithm,” Springer, Journal of Computer Virology and Hacking Techniques, issn. 2263-8733, vol. 18, pp. 243-258, 2022, doi: 10.1007/s11416-021-00410-1.
[Indexing: ESCI, SCOPUS, Google Scholar, DBLP, UGC-CARE List etc.]
4. P. Ghosh, Z. Alam, R. R. Sharma and S. Phadikar, “An efficient SGM based IDS in cloud environment,” Springer, Computing, issn. 1436-5057, vol. 104, pp. 553-576, 2022, doi: 10.1007/s00607-022-01059-4. [Indexing: SCI, SCIE, SCOPUS, Google Scholar, DBLP, UGC CARE List etc.; Impact Factor: 2.420]
5. P. Ghosh, D. Sarkar, J. Sharma, and S. Phadikar, “An intrusion detection system using Modified firefly algorithm in cloud environment,” Int. J. Digit. Crime Forensics, issn. 1941-6210, vol.13, no. 2, pp. 77–93, 2021, doi: 10.4018/IJDCF.2021030105. [Indexing: ESCI, SCOPUS, Google
Scholar, DBLP, UGC-CARE List etc.]
6. P. Ghosh, S. Biswas, S. Shakti, and S. Phadikar, “An improved intrusion detection system to preserve security in cloud environment,” Int. J. Inf. Secur. Priv., issn. 1930-1650, vol. 14, no. 1, pp. 67–80, 2020, doi: 10.4018/IJISP.2020010105. [Indexing: ESCI, SCOPUS, Google Scholar, DBLP, UGC-CARE List etc.]
7. S. Shakti, P. Ghosh, R. Kumar and S. Phadikar, “Feature Selection using Modified Charged System Search for Intrusion Detection Systems in Cloud Environment,” International Journal of Control Theory and Applications, issn. 0974-5572, vol. 9, no. 41, pp. 1012-1021, 2016. [Indexing:
SCOPUS]
8. P. Ghosh, S. Shakti, and S. Phadikar, “A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule,” Int. J. Cloud Appl. Comput., issn. 2156-1834, vol. 6, no. 4, pp. 18–35, 2016, doi: 10.4018/ijcac.2016100102. [Indexing: SCOPUS, Inspec, Google Scholar, DBLP, UGC-CARE List etc.]
9. P. Ghosh, C. Debnath, D. Metia, and D. R. Dutta, “An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment,” IOSR J. Comput. Eng., issn. 2278-0661, vol. 16, no. 4, pp. 16–26, 2014, doi: 10.9790/0661-16471626. [Indexing: Google Scholar, Semantic Scholar, ResearchGate etc.]
10. P. Ghosh, R. Ghosh and R. Dutta, “An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing,” International Journal of Scientific & Technology Research, issn. 2277-8616, vol. 3, no. 5, pp. 199-203, 2014. [Indexing: Google Scholar, Semantic Scholar etc.]
List of Publication of Conference Proceedings: 1. P. Ghosh, P. Kumar, S. Paul, and S. Phadikar, “An IDS in Cloud Environment by using Feature Selection based Hybrid Multilevel Classifier,” GRENZE International Journal of Engineering and Technology, vol. 8, no. 1, pp. 381-386, 2022, 01.GIJET.8.1.13_1.
2. R. R. Sharma and P. Ghosh, “A Novel Jackson’s Widowbird Mating Optimization Algorithm,” in IEEE 1st International Conference for Convergence in Engineering (ICCE), IEEE, 2020, pp. 230 -234, doi: 10.1109/ICCE50343.2020.9290672. [Indexing: Inspec]
3. D. Majumder, A. Singh, P. Ghosh and S. Phadikar, “A Novel SNN-ANN based IDS in Cloud Environment,” in International Conference on Electronics and Sustainable Communication Systems (ICESC), IEEE, 2020, pp. 913-918, doi: 10.1109/ICESC48915.2020.9155705.
4. P. Ghosh, A. Saha, and S. Phadikar, “Penalty-Reward Based Instance Selection Method in Cloud Environment Using the Concept of Nearest Neighbor,” in Procedia Computer Science, Elsevier, 2016, vol. 89, pp. 82–89, doi: 10.1016/j.procs.2016.06.012. [Indexing: SCOPUS, Inspec etc.]
5. P. Ghosh, M. Bardhan, N. R. Chowdhury, and S. Phadikar, “IDS using reinforcement learning automata for preserving security in cloud environment,” Int. J. Inf. Syst. Model. Des., issn. 1947- 8186, vol. 8, no. 4, pp. 21–37, 2017, doi: 10.4018/IJISMD.2017100102. [Indexing: ESCI, SCOPUS, Google Scholar, DBLP, UGC-CARE List etc.]
6. P. Ghosh and R. Mitra, “Proposed GA-BFSS and logistic regression based intrusion detection system,” in Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), IEEE, 2015, pp. 1–6, doi: 10.1109/C3IT.2015.7060117.
7. P. Ghosh, N. R. Chowdhury, and D. Metia, “A Hybrid SVM-NN Based Multilevel Classifier for Detecting Network Intrusions,” in Computer Science, Communication and Instrumentation Devices, 2014, doi: 10.3850/978-981-09-5247-1_031.
List Books / Book Chapters: 1. S. Paul, N. Pandey, S. Bose and P. Ghosh, “An Intrusion Detection System Using Feature Selection Based on Red Kangaroo Mating Algorithm”, in Advances in Cognitive Science and Communications, Springer, 2023, pp. 365-372, doi: 10.1007/978-981-19-8086-2_36. [Indexing: SCOPUS]
2. P. Ghosh, A. Karmakar, J. Sharma, and S. Phadikar, “CS-PSO based intrusion detection system in cloud environment,” in Emerging Technologies in Data Mining and Information Security, Springer, 2019, pp. 261–269, doi: 10.1007/978-981-13-1951-8_24. [Indexing: DBLP, Inspec etc.]
3. P. Ghosh, S. Jha, R. Dutta, and S. Phadikar, “Intrusion Detection System Based on BCS-GA in Cloud Environment,” in International Conference on Emerging Research in Computing, Information, Communication and Applications, Springer, 2017, doi: 10.1007/978-981-10-47411_35.
4. P. Ghosh, A. K. Mandal, and R. Kumar, “An Efficient Cloud Network Intrusion Detection System,” in Advances in Intelligent Systems and Computing, Springer, 2015, vol. 339, pp. 91–99, doi: 10.1007/978-81-322-2250-7. [Indexing: DBLP, Inspec etc.]