Cognitive Radio Networks
Mobile Ad-Hoc Networks
Network Security
Machine Learning
From | To | Designation | Organisation |
---|---|---|---|
11th December 2009 | Present | Assistant Professor | NERIST |
Degree | Subject | University | Year |
---|---|---|---|
Ph. D. | Computer Sc. & Engineering | NERIST | 2021 |
M. E. | Computer Sc. & Engineering | Jadavpur University | 2009 |
B. E. | Computer Sc. & Engineering | VTU | 2006 |
AISSCE | Science | CBSE | 1999 |
AISSE | -- | CBSE | 1997 |
From | To | Designation | Organisation |
---|---|---|---|
2011 | 2015 | Deputy Incharge | ET Cell |
2015 | 2019 | Head | ET Cell |
Topic | Funding Agency | Year |
---|---|---|
ITRA-Mobile: “Mobile Broadband Service Support over Cognitive Radio Networks” | ITRA (DEITY) | 2018 |
Network Analytics for User Performance Management using Machine Learning and Data Analytics | AICTE | 2023 |
Title | Course Code | Module | Semester | |
---|---|---|---|---|
Object Oriented programming in C/C++ | CS-3102/CS-4301 | Diploma/Degree | ||
Computer Architecture | CS-4202 | Degree | ||
Data Structures | CS-4203/4404 | Degree | ||
Computer Networks | CS-5203 | Degree | ||
Mobile Computing | CS-6004 | Degree | ||
Computer Network Security | CS-6102 | Degree | ||
Compiler Design | CS-6101 | Degree | ||
Advanced Computer Communication and Networking | IT-7104 | M Tech | ||
Networking and Internetworking Technology Lab | IT-7201 | M Tech | ||
Algorithm Design and Analysis | CS-7101 | M Tech |
Title of Project | Names of Students | ||
---|---|---|---|
Defense against Spectrum Sensing Data Falsification Attacks using Cluster Network Channeling with Distance-based Detection in Cognitive Radio Ad-hoc Networks (M. Tech) [2022-2023] | Mr. Bryan Kharsohnoh | ||
An Adaptive Threshold Based Colluding SSDF Attacker Detection in Cognitive Radio Network (M. Tech) [2021-2022] | Ms. Iginia B Marbaniang | ||
User Profiling for Network Management using Machine Learning (B.Tech) [2020-2021] | Ms. Adella R Lyngskor and Mr. Sanjit Akoijam | ||
Malicious User Mitigation in Cognitive Radio Networks using Trust Based Scheme (M. Tech) [2020-2021] | Ms. Jolly Valour Syiemiong | ||
Network Anomaly Detection using Machine Learning (M.Tech) [2020-2021] | Ms. Eter Basar | ||
A Machine Learning Approach to User Profiling in Computer Networks (B.Tech) [ 2019-2020] | Mr. K. Simanta Singh and Mr. Subham Gupta | ||
Detection of Distributed Denial of Service (DDoS) Attack using Machine Learning (M.Tech) [2019-2020] | Mr. Premson Singh Samom | ||
Mitigation of SSDF attack in CRN using Trust-based Technique(M.Tech) | Mr. Samuel Wangno | ||
Securing CRN using HMM and Machine Learning (M.Tech) | Ms. Manmi Nath | ||
Smart Wearable Security Device using IoT | Mr. Manjit Kumar and Ms. Jyosmita Das | ||
Encryption-based PUEA Mitigation in CRN (B.Tech) | Mr. Hirak Jyoti Sarmah and Mr. Gaisingam Pamei | ||
A study on TVWS in Nirjuli (MTech) | Ms. Khoda Yasina | ||
Game Theory Based Jamming Attack Countermeasure in CRN (BTech) | Ms. Manmi Nath, Ms. Poulami Banik, Ms. Clareen and Ms. Khumjila | ||
PUEA Detection in Cognitive Radio Networks (BTech) | Mr. T. Baite and Mr. C. Lalrinawma | ||
PUEA Detection using localisation of Primary Tx in CRN (MTech) | Ms. D. Salam | ||
A Fusion Centre Based SSDF Attacks Detection Mechanism for CRN (BTech) | Mr. H. Das and Mr. F. Zonunmawia | ||
Collaborative Detection Strategy for SSDF Attacks in Cognitive Radio Network (M Tech) | Ms. C. Chunka | ||
Dynamic Spectrum Access in Cognitive Radio Networks (MTech) | Ms. L. Chom | ||
A mechanism for wormhole detection in MANETs (BTech) | Mr. Albert Mundu and Mr. Abhijit Das | ||
Application Layer Detection of DoS attacks in MANET using TraceGray (BTech) | Mr. Abhishek Mungoli and Mr. K. Kipgen | ||
QuickTrace: An Application based on Mobile Agents to trace routes in MANET. (MTech) | Mr. Sibesh Lodh |
Course Name | Sponsored By | Date |
---|---|---|
FDP on Advance in Integrated Manufacturing Robotic | TEQIP and NERIST | 26th June-30th June, 2012 |
FDP on Advances in Networking Technplogies | TEQIP and NERIST | 29th April to 3rd May, 2013 |
FDP on " Advances in Electronics & Communication (AEC)" | TEQIP and NERIST | 22nd -26th, July , 2013 |
FDP on " Advances in Computer Science and Information Technology " | TEQIP and NERIST | August 26th -30th , 2013 |
FDP on " Optical Technique and Devices in Scientific and Engineering System Application" | TEQIP and NERIST | 28th Oct. - 1st Nov. 2013 |
FDP on "Emerging Research Issues in Speech and Natural language Processing" | TEQIP and NERIST | 30th Sept. to 4th Oct. 2013 |
FDP on " Prospects of Cloud Computing in Education" | TEQIP and NERIST | 3rd-7th February, 2014 |
Orientation Programme on Pedagogy (2-weeks) | TEQIP, NERIST and NITTTR, Kolkata | 8th September to 17th September 2014 |
ISTE STTP on Introduction to Design of Algorithms (2-weeks) | IIT Kharagpur | 27th April to 24th May 2015 (Online) 25th May to 30th May 2015 (Remote Center, NERIST) |
Orientation Programme on Pedagogy (2-weeks) | TEQIP, NERIST and NITTTR, Kolkata | 11th September to 20th September 2015 |
Short-course on Cognitive Radio and Wireless Communication - Theory, Practice and Security (2-weeks) | IIT Kanpur | 1st September to 10th September 2016 |
1-week FDP on Machine Intelligence and IoT | Tezpur University | 19th February to 23rd February 2018 |
3-months Online Professional Training Program on Applied Machine Learning and Data Science | IIT Kanpur | 1st April 2020 to 29th June 2020 |
1-week FDP on Artificial Intelligence | SMIT, Sikkim | 22nd February 2021 to 26th February 2021 |
1-week FDP on Applied Machine Learning and Deep Learning | Assam Science and Technology University | 24th February 2021 to 1st March 2021 |
FDP on Cyber Attacks and Defences | CDAC, NOIDA | 12th June 2023 to 16th June 2023 |
1-week Industrial Training on Deep Learning | IIT, Roorkee | 26th June 2023 to 30th June 2023 |
Conference Name | Sponsored By | Date | |
FDP on Advances in Networking Technologies | TEQIP | 29th April – 3rd May 2013 | |
Orientation Programme on Pedagogy | TEQIP | 8th September – 17th September 2014 | |
National Conference on Computing, Communication and Information Processing | AICTE and NEQIP | 2nd May – 3rd May 2015 | |
Winter School on Cognitive Radio and Internet of Things | Media Lab Asia | 9th-10th December 2018 |
1. Taggu A. and Marchang N., "Detecting Byzantine attacks in Cognitive Radio Networks: A Two-Layered approach using Hidden Markov Model and Machine Learning", Pervasive Mobile Computing, August 2021, DOI: https://doi.org/10.1016/j.pmcj.2021.101461 |
2. Taggu A. and Marchang N., "To Attack or Not To: An Evolutionary Game Model to Study the Dynamics of Selfish PUEA Attackers in Cognitive Radio Networks" ,International Journal of Ad Hoc and Ubiquitous Computing, 35(1):38, DOI: 10.1504/IJAHUC.2020.100312453. Sarmah R., Taggu A. and Marchang N., "Detecting Byzantine Attack in Cognitive Radio Networks using Machine Learning", Wireless Networks, Vol:26, Issue:6, Published on 9th July 2020, DOI: https://doi.org/10.1007/s11276-020-02398-w4. W. Singh N., Marchang N. and Taggu A.", "Mitigating SSDF Attack using Distance-based Outlier approach in Cognitive Radio Networks", Published on 25th September 2019, International Journal of Ad Hoc and Ubiquitous Computing, 2019 Vol.32 No.2, pp.119 - 132, DOI: 10.1504/IJAHUC.2019.1024525. Marchang N., Taggu A, Patra K. A., "Detecting Byzantine Attack in Cognitive Radio Networks by Exploiting Frequency and Ordering Properties", Published on December 2018, IEEE Transactions on Cognitive Communications and Networking, Volume: 4, Issue:4, 10.1109/TCCN.2018.284538 6. Rina K, Nath S., Marchang N. and Taggu A.,"Can Clustering be Used to Detect Intrusion During Spectrum Sensing in Cognitive Radio Networks?”, IEEE Systems Journal (Vol:12, Issue:1, March 2018), DOI: 10.1109/JSYST.2016.2584098 |
1. Amar Taggu and N. Marchang, "A Density-based Clustering Approach to detect Colluding SSDF Attackers in Cognitive Radio Networks", 37th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC), 2022, DOI: 10.1109/ITC-CSCC55581.2022.9895018 |
2. Premson Singh Samom and Amar Taggu, "Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach", Pg. 75-87, Chapter in Springer Applied Soft Computing and Communication Networks, DOI: https://doi.org/10.1007/978-981-33-6173-7_6 |
3. A. Taggu and N. Marchang, " Mitigating Smart Primary User Emulation Attackers in Cognitive Radio Networks", IEEE 4th Times-ICON, Thailand, DOI: 10.1109/TIMES-iCON47539.2019.9024553 |
4. Amar Taggu and N. Marchang, "Random-Byzantine Attack Mitigation in Cognitive Radio Networks using a Multi-Hidden Markov Model System," 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA), Ras Al Khaimah, United Arab Emirates, 2019, pp. 1-5. doi: 10.1109/ICECTA48151.2019.89597665. Amar Taggu, Abhishek Mungoli, Ani Taggu, "ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET using Mobile Agents", IEEE TIMES-iCON, Dec 12-14, 2018, Bangkok, Thailand, DOI:10.1109/TIMES-iCON.2018.8621825 |
6. Amar Taggu, Manmi Nath, Poulami Banik and Ningrinla Marchang, "A Jammer-Resilient Cognitive Radio Network using Evolutionary Game Theory", The 20th International Symposium on Wireless Personal Multimedia Applications (WPMC 2017), Dec 17-20, 2017, Yogyakarta, Indonesia |
7. Amar Taggu, Kennong Rina, Khoda Yasina, Ningrinla Marchang, " A Study on Spectral Occupancy in the North Eastern India for Rural Broadband Access", 6th International Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 13-16, 2017, Manipal University, Karnataka, India |
8. Salam D., Taggu A., Marchang N., "An Effective Emitter-Source Localisation-based PUEA Detection Mechanism in Cognitive Radio Networks", 2016 Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, 2016, Jaipur, India |
9. Marchang, N.; Rajkumari, R.; Brahmachary, S.B.; Taggu, A., “ Dynamic Decision Rule for Cooperative Spectrum Sensing in Cognitive Radio Networks”, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), ISBN: 978-1-4799-6084-2, DOI: 10.1109/ICECCT.2015.7226198 |
10. Nath, Shikhamoni; Marchang, Ningrinla; Taggu, Amar, “ Mitigating SSDF attack using k-medoids clustering in Cognitive Radio Networks”, 2015 IEEE 11th International Conference on Networking and Communications (WiMob), Abu Dhabi, ISBN: 978-1-4799-3078-4 , DOI: 10.1109/ICACCI.2014.6968561 |
11. Taggu Amar, Chunka C, Marchang N, “CODES: A COllaborative DEtection Strategy for SSDF Attacks in Cognitive Radio Networks”, 2015 ACM Third International Symposium on Women in Computing and Informatics (WCI), ISBN: 978-1-4503-3361-0, DOI: 10.1145/2791405.2791501 |
12. Das K., Taggu A., “ A comprehensive analysis of DoS attacks in Mobile Adhoc Networks”, 2014 Third IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI) ISBN: 978-1-4799-3078-4, DOI: 10.1109/ICACCI.2014.6968561 |
13. Taggu A., Taggu A., “ wTracert: An optimal timer based traceroute implementation for wireless networks”, 2012 Fifth IEEE Wireless Days (Dublin), ISBN: 978-1-4673-4402-9 , DOI: 10.1109/WD.2012.6402824 |
14. Taggu A., Taggu A., “ TraceGray : An Application Layer Scheme for Intrusion Detection in MANET using Mobile Agents ”, 2011 Third IEEE International Conference on Communication Systems and Networks (COMSNETS), ISBN: 978-1-4244-8952-7 , DOI: 10.1109/COMSNETS.2011.5716475 |