Debasish Das

ORCID: 0000-0002-2020-1497
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Welding Techniques and Residual Stresses
  • Advanced Welding Techniques Analysis
  • Climate variability and models
  • Hydrology and Drought Analysis
  • Advanced machining processes and optimization
  • Web Application Security Vulnerabilities
  • Hydrogen embrittlement and corrosion behaviors in metals
  • Non-Destructive Testing Techniques
  • Network Security and Intrusion Detection
  • Advanced Machining and Optimization Techniques
  • Advanced Malware Detection Techniques
  • Laser and Thermal Forming Techniques
  • Arctic and Antarctic ice dynamics
  • Internet Traffic Analysis and Secure E-voting
  • Statistical Methods and Inference
  • Security and Verification in Computing
  • Financial Risk and Volatility Modeling
  • Image and Video Quality Assessment
  • Spam and Phishing Detection
  • Microstructure and Mechanical Properties of Steels
  • Remote Sensing in Agriculture
  • Climate change impacts on agriculture
  • Manufacturing Process and Optimization
  • Data Management and Algorithms
  • Climate change and permafrost

Punjab Engineering College
2023

Indian Institute of Science Education and Research Mohali
2023

Indian Institute of Technology Kharagpur
1979-2022

Centurion University of Technology and Management
2020

University of Delhi
2020

Tata Consultancy Services (India)
2015-2019

Sathyabama Institute of Science and Technology
2019

Tezpur University
2008-2017

Northeastern University
2009-2015

Temple University
2008-2014

Agriculture is the most important sector in Indian economy. India occupies second highest rank farm outputs world. Its contribution to development of economy has immense potential. So agriculture products may play vital role for economic growth. But different kind diseases plant decreases production crops and growth rate farmers. To identify monitor leaf manually by farmers very difficult. This one reasons develop an automatic detection model. The proposed model helps at early stages. Thus,...

10.1109/iccsp48568.2020.9182128 article EN 2020-07-01

HTTP GET flooding attack is considered to be one of the most successful attacks Application Layer Denial Service (App-DoS). Detection such difficult due its non-intrusive nature. This paper presents an effective method for detection App-DoS three different scenarios. The proposed was tested over real-life data-sets, i.e. KDD99, LBNL and our own data-set, has been found perform satisfactorily.

10.1145/1947940.1948047 article EN 2011-01-01

In the present study, machine learning algorithms have been used to predict residual stress during electron beam welding of stainless steel using information input process parameters and natural frequency vibrations. Accelerating voltage, current speed considered as parameters. Both frequencies vibration weld obtained each set are measured experimentally. A number algorithms, namely M5 algorithm-based Model Trees Regression, Random forest, Support Vector Reduced Error Pruning Tree,...

10.1177/0954406220950343 article EN Proceedings of the Institution of Mechanical Engineers Part C Journal of Mechanical Engineering Science 2020-08-16

In welding, the concept of optimisation had been used, till date, to serve two specific purposes. To obtain any desired weld attributes, a set required optimal input parameters could be determined utilising principle optimisation. establish an input–output relationship welding process accurately, which might essential automate it, tools for used extensively. These problems were formulated as either single-objective or multi-objectives many-objectives ones. Both traditional and...

10.1080/13621718.2021.1872856 article EN Science and Technology of Welding & Joining 2021-01-22

A large number of web applications, especially those deployed by companies for e-business operations involve high reliability, efficiency and confidentiality.Such applications are often written in script languages like PHP embedded HTML, allowing establishing connection to databases, retrieving data, putting them the Web.One most common application attacks is SQL Injection.In this an attacker attempts use malicious crafted input strings so that dynamic queries generated different from...

10.5120/462-766 article EN International Journal of Computer Applications 2010-02-25

Web is one of the most popular internet services in today's world. In world, web servers and based applications are corporate become targets attackers. A Large number applications, especially those deployed for companies to e-business operation involve high reliability, efficiency confidentiality. Such written script languages like PHP embedded HTML allowing establish connection databases, retrieving data putting them WWW site. order detect known attacks, misuse detection attacks consists...

10.1109/iadcc.2009.4809172 article EN IEEE International Advance Computing Conference 2009-03-01

Predictive insights on extreme and rare events are important across multiple disciplines ranging from hydrology, climate, remote sensing to finance security. Characterizing the dependence of extremes covariates can help in identification plausible causal drivers may even inform predictive modeling. However, despite progress incorporation statistical theory sparse covariate discovery algorithms, has been limited for high-dimensional data where number is large. In this paper, we propose a...

10.1109/tgrs.2015.2445911 article EN IEEE Transactions on Geoscience and Remote Sensing 2015-07-08

Web-application attacks are considered to be one of the major security concerns a large number applications, especially those deployed in health care, banking and e-business operations. These applications must involve high addition other application requirements such as friendliness, effectiveness efficiency service provided end users. In this paper, we focus on vulnerabilities resulting from generic input validation problems that may cause cross-site scripting (XSS) attacks. We take look at...

10.1093/comjnl/bxt133 article EN The Computer Journal 2013-11-14

This paper presents an effective detection method RDUD for SQL injection attack.RDUD is enhanced version of DUD [1].The comprises a supervised machine learning approach using Support Vector Machine(SVM) to learn and classify query at runtime.Two web profiles -(i) legitimate profile (ii) attack are generated each the web-application software which consists set production rules extracted from dynamic queries.Both during training phase.At runtime matched with accordingly it based on matching...

10.5120/6210-8812 article EN International Journal of Computer Applications 2012-04-30
Coming Soon ...