Follow Udaybhaskar’s Progress
Kennesaw State University is one of the 50 largest public universities in the country. Located just north of Atlanta, Ga., the University combines a suburban setting on two campuses in Kennesaw and Marietta, with access to one of the country’s most dyn...
Awards & Recognition
Students in Kennesaw State's College of Computing and Software Engineering recently demonstrated their talent, creativity and ability to put what they've learned in the classroom into practice during the biannual Computing Showcase, also called C-Day. The culminating event, presented at the end of the fall semester, attracted dozens of student projects which were then judged by 18 industry professionals in five categories. Graduating students displayed their posters, video games and prototypes that highlighted their experiences within internships, team projects, research endeavors, and capstone and thesis work. More than 40 undergraduate and graduate students were honored with first, second and third place honors in five categories. A full list of award recipients can be found at http://ccse.kennesaw.edu/computing-showcase/computing-showcase.phpFall 2017Verified by Kennesaw State University
Kennesaw State University
Graduate Research Assistant In Security Privacy and Advanced Computing Laboratory (SPACL)August 2016 - PresentGraduate research assistant working on classification and analysis of Malware/Malicious software. Detecting Malware Using Encrypted SSL/TLS Traffic: Collection of malware with different encryptions and evaluation of cryptographic standards in SSL by capturing malware packets with RC4 encryption by attacking systems connected in a lab environment. Created a data set with the packets which are used for evaluation of algorithm. Submitted a paper on Fast and Accurate Machine Learning based Malware Detection via RC4 Cipher Text Analysis. Defending Attacks on SCADA Systems with Raspberry PI: Created survey on SCADA system cyber-attacks and constructed a model of a power grid with Raspberry PI to find vulnerability with different malicious attack and build a defending system. Types of attacks include RAT's, DDOS, HTTPS Spoofing. Privacy-aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication (In Progress) : Simulating cryptographies in Mobile Sensing environment using PyCrypto. Research Interests: Cyber Security, Encryption, Cryptography, SCADA Systems and Smart Grid network.
Added by Udaybhaskar