INTRODUCTION
I’m an Assistant Professor (Tenure-Track) of Computer Science at Georgia Southwestern State University. Before that, I was a visiting research scholar at the University of Cincinnati. I received my Ph.D. from Tennessee State University, in 2022. My research advisor was Dr. Swastik Brahma. In addition, I work closely with Dr. Charles Kamhoua, Dr. Laurent Njilla, and Dr. Nandi O. Leslie from ARL.
Research interest :
Network Security
Behavioral Decision Theory
Human-in-the-Loop Networks
Game Theory and Network Economics
EDUCATIONAL HISTORY
2020 - 2022
DOCTOR OF PHILOSOPHY, TENNESSEE STATE UNIVERSITY
Major: Computional Science
2018 - 2020
MASTER OF SCIENCE, TENNESSEE STATE UNIVERSITY
Major: Computer Science
2013- 2017
B.TECH, WEST BENGAL UNIVERSITY OF TECHNOLOGY
Major: Electronics and Communication Engineering
TEACHING EXPERIENCES
COMP 5750 (GRADUATE, INSTRUCTOR: DR. SWASTIK BRAHMA)
Computer management and network security class. Taught some classes and covered areas under security, network management, and game theory.
COMP 5700 (GRADUATE, INSTRUCTOR: DR. SWASTIK BRAHMA)
Fundamental of network class. Taught some classes and covered areas under security, authentication, and types of attacks.
PROGRAMMING II (COLLABORATION WITH GOOGLE, INSTRUCTOR: DR. ADAM LEEPER)
Taught undergrad students java, and lead a group of 10 students to build the final project.
EXPERIENCE
What I’ve Done
2018-Present
RESEARCH ASSISTANT, TENNESSEE STATE UNIVERSITY
Worked with various cybersecurity problems.
Worked on the research problem of Hardware Trojan.
Worked on the research problem of crowsensing.
May 2019 - September 2019
WEB DEVELOPER, SOUMITS WORLD FOUNDATION
Worked in the application deployment, database, and server administration.
Recreated the website using Php, Html, CSS, JavaScript (link: http://www.soumitsworld.org/).
2017 - 2018
SOFTWARE ENGINEER, SEAMLESS DISTRIBUTION AB
Designed and developed customization module using Java J2EE, Restful Web Services, Apache Axis2, JSON, JSP, and XML.
Involved in designing and developing J2EE components Like Java Beans, collection framework, JMS, and JDMC and deployed on Web logic server. Hibernate was also used as an ORM tool.
Used ANT to build, run, and create JARS and WAR files. Also worked in development, production environment, and communicate with QA.
PUBLICATIONS
Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie: Behavioral Cyber Deception: A Game and Prospect Theoretic Approach. GLOBECOM 2019: 1-6.
Satyaki Nan, Swastik Brahma: Redundancy-based Mitigation of Jamming Attacks. CISS 2020: 1-6.
Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie: Mitigation of Jamming Attacks via Deception. PIMRC 2020: 1-6.
Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, & L. L Njilla, (2020). On Development of a Game‐Theoretic Model for Deception‐Based Security. Modeling and Design of Secure Internet of Things, 123-140.
Satyaki Nan, et.al: Optimal Cyber-Deception under Strategic and Behavioral Considerations, in progress for the journal.
Swastik Brahma, Satyaki Nan, Laurent Njilla: Strategic Hardware Trojan Testing with Hierarchical Trojan Types. CISS 2021: 1-6.
Swastik Brahma, Laurent Njilla, and Satyaki Nan. "Game-Theoretic Hardware Trojan Testing Under Cost Considerations." In International Conference on Decision and Game Theory for Security (GAMESEC), pp. 251-270. Springer, Cham, 2021.
Swastik Brahma, Laurent Njilla, and Satyaki Nan. "Optimal Auction Design with Malicious Sellers.” IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 661-666. IEEE, 2022.
Swastik Brahma, Laurent Njilla, Satyaki Nan: Hardware Trojan Testing under Cost Considerations, in progress for a journal.