Shanto Roy

Shanto Roy
University of Houston | U of H, UH · Department of Computer Science

MS (2022) and PhD (Exp: 2023) in Computer Science (University of Houston)
Teaching Assistant and Ph.D. student at the Dept of Computer Science, Uni of Houston (concentration: Cyber Security)

About

37
Publications
37,855
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
709
Citations
Introduction
I have been working as a Research Assistant of Dr. Aron Laszka at RNS Lab since Fall-2019 and have enrolled as a Ph.D. student at the Department of Computer Science, the University of Houston. My primary research interest is in Cyber Security, Data Science and ML, SDN, Cloud-IoT ecosystem, etc. Currently, I am working on Cyber Deception. Visit the following sites to discover more about me: * http://shantoroy.me * http://shantoroy.com
Additional affiliations
September 2019 - present
University of Houston
Position
  • Research Assistant
May 2016 - present
Green University of Bangladesh
Position
  • Lecturer
April 2016 - present
Jahangirnagar University
Position
  • Researcher
Education
June 2016 - September 2017
Jahangirnagar University
Field of study
  • Information Technology
December 2011 - February 2016
Jahangirnagar University
Field of study
  • Information Technology
June 2009 - March 2011
Notre Dame College, Dhaka
Field of study
  • Science

Publications

Publications (37)
Chapter
Full-text available
One of the most fundamental tasks for an AICA agent will be to manipulate information that an adversary can observe, either about a network or the AICA agent itself. This includes taking actions to conceal or camouflage the agent or specific network assets and taking actions to deceive or otherwise affect the beliefs of an adversary conducting reco...
Conference Paper
Full-text available
Cyber attackers often use passive reconnaissance to collect information about target networks. This technique can be used to identify systems and plan attacks, making it an increasingly challenging task for security analysts to detect. Adversaries can recover statistical information from the information collected from compromised nodes, revealing t...
Article
Full-text available
Smart cities can be complemented by fusing various components and incorporating recent emerging technologies. IoT communications are crucial to smart city operations, which are designed to support the concept of a “Smart City” by utilising the most cutting-edge communication technologies to enhance city administration and resident services. Smart c...
Article
Full-text available
Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain. We summarize and analyze the methods, tactics, and tools that adversaries use to conduct reconnais...
Chapter
Full-text available
Internet of Things (IoT) devices and applications can have significant vulnerabilities, which may be exploited by adversaries to cause considerable harm. An important approach for mitigating this threat is remote attestation, which enables the defender to remotely verify the integrity of devices and their software. There are a number of approaches...
Article
Fog computing complemented cloud computing integration services in the Internet of Things (IoT) and the web of real-time interactivity. Fog offers faster computing and other services facilities sitting close to user applications. However, secure data transfer in the fog is still a challenging issue requiring attention and efficient deployment of a...
Preprint
Full-text available
Internet of Things (IoT) devices and applications can have significant vulnerabilities, which may be exploited by adversaries to cause considerable harm. An important approach for mitigating this threat is remote attestation, which enables the defender to remotely verify the integrity of devices and their software. There are a number of approaches...
Preprint
Full-text available
Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain. We summarize and analyze the methods, tactics, and tools that adversaries use to conduct reconnais...
Article
Fog computing is one of the most important emerging paradigms in recent technological development. It alleviates several limitations of cloud computing by bringing computation, communication, storage, and real-time services near to the end-users. However, with the rapid development of automation in smart cities, the number of task executions by fog...
Conference Paper
The paper presents a power-efficient approach for the IoT ecosystem in a software-defined network (SDN) using machine learning. At present, SDN prevails in networking in-frastructures, intending to lead towards a more feasible and convenient way to manage with greater control. However, the resource constraint IoT ecosystems still lack promising pow...
Chapter
The article presents an efficient energy optimization framework based on dynamic resource scheduling for VM migration in cloud data centers. This increasing number of cloud data centers all over the world are consuming a vast amount of power and thus, exhaling a huge amount of CO2 that has a strong negative impact on the environment. Therefore, imp...
Article
Full-text available
To slow down the spread of COVID-19, governments around the world are trying to identify infected people and to contain the virus by enforcing isolation and quarantine. However, it is difficult to trace people who came into contact with an infected person, which causes widespread community transmission and mass infection. To address this problem, w...
Chapter
Full-text available
Blockchain-based platforms are emerging as a transformative technology that can provide reliability, integrity, and auditability without trusted entities. One of the key features of these platforms is the trustworthy decentralized execution of general-purpose computation in the form of smart contracts, which are envisioned to have a wide range of a...
Preprint
Full-text available
To slow down the spread of COVID-19, governments around the world are trying to identify infected people and to contain the virus by enforcing isolation and quarantine. However, it is difficult to trace people who came into contact with an infected person, which causes widespread community transmission and mass infection. To address this problem, w...
Conference Paper
Full-text available
Although many solutions have been proposed for peripheral device controlled desktop applications to separate Human-Bot using CAPTCHAs, no significant work has addressed the same issue for handheld touch-sensitive devices. In this work, we propose a novel CAPTCHA system based on flicking or dragging segmented sub-images to a specific output box to r...
Conference Paper
Full-text available
Blockchain-based platforms are emerging as a transformative technology that can provide reliability, integrity, and auditability without trusted entities. One of the key features of these platforms is the trustworthy decentralized execution of general-purpose computation in the form of smart contracts, which are envisioned to have a wide range of a...
Preprint
Full-text available
With the increasing usability of smartphones, security enhancement for mobile users during surfing internet needs to be handled with topmost urgency. Although many solutions have been proposed for peripheral device controlled desktop applications to separate Human-Bot using CAPTCHAs, no significant work has addressed the same issue for handheld tou...
Conference Paper
Full-text available
Content Delivery Networks (CDN) is a standout amongst the most encouraging innovations that upgrade performance for its clients' websites by diverting web demands from browsers to topographically dispersed CDN surrogate nodes. However, due to the variable nature of CDN, it suffers from various security and resource allocation issues. The most commo...
Article
This article presents a detailed survey on different data compression and storage optimization techniques in the cloud, their implications, and discussion over future directions. The development of the smart city or smart home systems lies in the development of the Internet of Things (IoT). With the increasing number of IoT devices, the tremendous...
Preprint
Full-text available
Internet of Things (IoT) is a key emerging technology which aims to connect objects over the internet. Software Defined Networking (SDN) is another new intelligent technology within networking domain which increases the network performance and provides better security, reliability, and privacy using dynamic software programs. In this paper, we have...
Article
Full-text available
The article presents an efficient energy optimization framework based on dynamic resource scheduling for VM migration in cloud data centers. This increasing number of cloud data centers all over the world are consuming a vast amount of power and thus, exhaling a huge amount of CO2 that has a strong negative impact on the environment. Therefore, imp...
Article
Full-text available
The rapid growth of cloud and IoT has various security associated issues that can withhold its extensive acceptance. Based on this premise, this paper has presented comprehensive data security and DFI framework for the CloudIoT ecosystem. In our proposed framework we have used data security model which consists of combining various cryptographic (S...
Conference Paper
Full-text available
Education is essential things that helps a person to become good human beings. In developed countries, many research works are ongoing to enhance their education policy and techniques in education sector. For this reason, a lot of efforts are needed to enhance individual learning materials for teachers and students in the developing countries. To c...
Preprint
Full-text available
The paper presents a BlockChain based distributed framework to manage Antimalware database efficiently. With increased efficiency in computation and network connectivity, systems are delivering better performances day by day. However, the opportunities of initiating malicious activities through malwares are being increased as well. In this work, we...
Preprint
Full-text available
The paper presents an in detailed case study of integrating BlockChain (BC) in IoT ecosystems in order to achieve security and privacy. Since the use in cryptocurrency, BlockChain has gained tremendous attraction due to the versatile application prospects it raises. As internet of things (IoT) is emerging towards the smart city requirements, device...
Preprint
Full-text available
The paper presents an in detailed case study of integrating BlockChain (BC) in IoT ecosystems in order to achieve security and privacy. Since the use in cryptocurrency, BlockChain has gained tremendous attraction due to the versatile application prospects it raises. As internet of things (IoT) is emerging towards the smart city requirements, device...
Preprint
Full-text available
The paper presents a multi-layered data compression framework that reduces the amount of data before being stored in cloud. At present, Internet of Things (IoT) has gained noticeable attention due to the approaches and advancements towards smart city aspects. With increasing number of devices and sensors connected to the Internet, tremendous amount...
Chapter
Full-text available
An effective application framework design for e-governance is definitely a challenging task. The majority of the prior research has focused on designing e-governance architecture where people identity verification takes long time using manual verification system. We develop an efficient application framework that verifies peoples identity. It provi...
Conference Paper
Full-text available
The era of technology is now shifting towards the Cloud Computing and today's computation tends to be provisioned as a service rather than a product. Recently Cloud Computing has become more portable and flexible in such way so that we call it having a super computer in our pockets. Despite the potential application of cloud computing, data securit...
Poster
Full-text available
The poster (A1 size) was presented on behalf of a conference paper. To find the publication, browse my publication or click on the following link- https://ieeexplore.ieee.org/document/8288912/
Poster
Full-text available
The poster (A0 size) is associated with a conference paper. To find details visit my publications on researchgate or the following link- https://ieeexplore.ieee.org/abstract/document/7760125/
Conference Paper
Full-text available
To provide higher life quality for people in developing countries through the use of web and embedded systems, healthcare information should be online and accessible from anywhere in the world and the system should be affordable to mass people. This research examines wireless sensor network with real-time remote identification and monitoring of reg...

Network

Cited By