73364187_2421807831271573_5793679117278773248_n.jpg

INTRODUCTION

I’m a Ph.D. student in the Department of Computer Science, Tennessee State University. Currently, I am a research assistant working with my research advisor Dr. Swastik Brahma. In addition, I am also working closely with Dr. Charles Kamhoua, Dr. Laurent Njilla, and Dr. Nandi O. Leslie from ARL. 

Research interest :

  • Network Security

  • Behavioral Decision Theory

  • Human-in-the-Loop Networks​

  • Game Theory and Network Economics

 

EDUCATIONAL HISTORY

2020 - Present

DOCTOR OF PHILOSOPHY, TENNESSEE STATE UNIVERSITY

Major: Computional Science

2018 - 2020

MASTER OF SCIENCE, TENNESSEE STATE UNIVERSITY

Major: Computer Science

2013- 2017

B.TECH, WEST BENGAL UNIVERSITY OF TECHNOLOGY

Major: Electronics and Communication Engineering

 

TEACHING EXPERIENCES

COMP 5750 (GRADUATE, INSTRUCTOR: DR. SWASTIK BRAHMA)

Computer management and network security class. Taught some classes and covered areas under security, network management, and game theory.

COMP 5700 (GRADUATE, INSTRUCTOR: DR. SWASTIK BRAHMA) 

Fundamental of network class. Taught some classes and covered areas under security, authentication, and types of attacks.

PROGRAMMING II (COLLABORATION WITH GOOGLE, INSTRUCTOR: DR. ADAM LEEPER)

Taught undergrad students java, and lead a group of 10 students to build the final project.

 

EXPERIENCE

What I’ve Done

2018-Present

RESEARCH ASSISTANT, TENNESSEE STATE UNIVERSITY

  • Worked with various cybersecurity problems.

  • Worked on the research problem of Hardware Trojan.

  • Worked on the research problem of crowsensing.

May 2019 - September 2019

WEB DEVELOPER, SOUMITS WORLD FOUNDATION

  • Worked in the application deployment, database, and server administration.

  • Recreated the website using Php, Html, CSS, JavaScript (link: http://www.soumitsworld.org/).

2017 - 2018

SOFTWARE ENGINEER, SEAMLESS DISTRIBUTION AB

  • Designed and developed customization module using Java J2EE, Restful Web Services, Apache Axis2, JSON, JSP, and XML.

  • Involved in designing and developing J2EE components Like Java Beans, collection framework, JMS, and JDMC and deployed on Web logic server. Hibernate was also used as an ORM tool.

  • Used ANT to build, run, and create JARS and WAR files. Also worked in development, production environment, and communicate with QA.

 

PUBLICATIONS

  • Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie: Behavioral Cyber Deception: A Game and Prospect Theoretic Approach. GLOBECOM 2019: 1-6.

  • Satyaki Nan, Swastik Brahma: Redundancy-based Mitigation of Jamming Attacks. CISS 2020: 1-6.

  • Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie: Mitigation of Jamming Attacks via Deception. PIMRC 2020: 1-6.

  • Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, & L. L Njilla, (2020). On Development of a Game‐Theoretic Model for Deception‐Based Security. Modeling and Design of Secure Internet of Things, 123-140.

  • Satyaki Nan, et.al: Optimal Cyber-Deception under Strategic and Behavioral Considerations, in progress for the journal.

  • Swastik Brahma, Satyaki Nan, Laurent Njilla: Strategic Hardware Trojan Testing with Hierarchical Trojan Types. CISS 2021: 1-6.

  • Swastik Brahma, Laurent Njilla, and Satyaki Nan. "Game-Theoretic Hardware Trojan Testing Under Cost Considerations." In International Conference on Decision and Game Theory for Security (GAMESEC), pp. 251-270. Springer, Cham, 2021.

  • Swastik Brahma, Laurent Njilla, and Satyaki Nan. "Optimal Auction Design with Malicious Sellers.” IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 661-666. IEEE, 2022.

  • Swastik Brahma, Laurent Njilla, Satyaki Nan: Hardware Trojan Testing under Cost Considerations, in progress for a journal.

 
S1.PNG
S1.PNG

press to zoom
S3.PNG
S3.PNG

press to zoom
S2.PNG
S2.PNG

press to zoom
S1.PNG
S1.PNG

press to zoom
 
 

CONTACT

6430 Charlotte Pike, Nashville, TN 37209

6462385647

Thanks for submitting!