Distinguished ACM Speaker:
Based in TN, USA
Prof. Dipankar Dasgupta is a professor of Computer Science at the University of Memphis. His research interests are broadly in the area of scientific computing, design, and development of intelligent cyber security solutions inspired by biological processes. He contributed remarkably in applying bio-inspired approaches to various problems in cyber security. He is one of the founding fathers of the field of artificial immune systems, in which he has established himself. His latest book, “Immunological Computation”, is a graduate level textbook, was published by CRC press in 2009. He also edited two books: one on Evolutionary Algorithms in Engineering Applications and the other is entitled "Artificial Immune Systems and Their Applications", published by Springer-Verlag. The first AIS book is widely used as a reference book, and it was translated into Russian.
Dr. Dasgupta is at the forefront of research in applying bio-inspired approaches to cyber defense, served as a program co-chair at the National Cyber Leap Year Summit was organized at the request of the White House Office of Science and Technology Directorate. Some of his groundbreaking works, like digital immunity, negative authentication, and cloud insurance model put his name in Computer World Magazine, and other News media. Prof. Dasgupta is an Advisory Board member of Geospatial Data Center (GDC), Massachusetts Institute of Technology since 2010, and worked on joint research projects with MIT.
Dr. Dasgupta has received Four Best Paper Awards at international conferences (1996, 2006, 2009, and 2012) and Two Best Runner-Up paper Awards (2013 and 2014) one from ACM Information Security Curriculum Development in October 2013 and the other from ACM Cyber and Information Security Research (CISR-9) Conference at Oak Ridge, TN, April 2014. He is the recipient of 2012 Willard R. Sparks Eminent Faculty Award, the highest distinction and most prestigious honor given to a faculty member by the University of Memphis. Prof. Dasgupta received the 2014 ACM SIGEVO Impact Award.
Due to his reputation as a top scholar, Dr. Dasgupta is frequently invited to speak (given more than 200 talks) at leading conferences and at other universities; he has been involved in the program organization and review structure of more than 150 international academic conferences, also serving as a speaker, panelist at many. Dr. Dasgupta is a Life Member of ACM, and published regularly in ACM conferences and professional activities. He is currently the Associate Editor-in-Chief of Immune Computation Journal and the editorial board of 4 other journals.
In addition to Prof. Dasgupta’s research and creative activities, he also spearheads the University of Memphis’s education, training and outreach activities on Information Assurance (IA). He is the founding Director of the Center for Information Assurance (CfIA) (http://cfia.memphis.edu) which is a National Center for Academic Excellence in Information Assurance Education (CAE-IAE) and in Research (CAE-R). Under his leadership, the center developed (during 2006-2010) a comprehensive Cyber Security Online Training program (ACT Online) with 10 courses in three discipline-specific tracks General, Technical & Business), which was funded by DHS/FEMA, and is continually being updated and offered through FEMA website.
To request a single lecture/event, click on the desired lecture and complete the Request this Lecture Form.
- Adaptive Multi-Factor Authentication (A-MFA) Methodology: Multi-factor Authentication (MFA) is the current trend to genuinely identify authorized users (in multiple ways) through an authentication process via passwords, security tokens, biometrics, cognitive behavior metrics, software/hardware sensors, etc....
- Cloud Services: Security, Compliance and an Insurance model:
As cloud services move to the mainstream to meet major computing needs, the issues of ownership and chain of custody of customer data are becoming primary responsibilities of providers. The 3 fundamental cloud service models form a hierarchy, ...
- Online Social Networks and Privacy issues:
Blogging, tweeting and social networking become important part of our daily life. Studies have shown that people spend a lot of their time online such as Facebook, LinkedIn, Twitter, You Tube and in other blogosphere. These web-based applicati...
- Puzzle-based learning in Cyber Security Education: Different forms of puzzles are in existence for people to think, expand knowledge and stimulate their cognitive ability. Puzzle-based learning has proven to result in a better STEM learning environment in mathematics, physics, and computer scie...
- Where the Immunological Computation Research is heading? :
The biological immune system exhibits some remarkable properties, including distributed processing, pathogenic pattern recognition, decentralized control, adaptability, diversity, signaling, etc. These properties allow to distinguish self and ...
To request a tour with this speaker, please complete this online form.
If you are not requesting a tour, click on the desired lecture and complete the Request this Lecture form.
All requests will be sent to ACM headquarters for review.