Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
Published:
As Summer holiday’s come to an end and school start date creeps closer, I thought it would be a good idea to reminisces on my 3-month summer internship at Yammer, Microsoft. This might possibly be my last internship per se and I wanted to do it justice with a proper blog post.
Published:
Published:
Published:
Big data analytics solutions, backed by machine learning and artificial intelligence, can help tackle the problems of cybersecurity breach and hacking. By employing the power of big data and machine learning, we can significantly improve cyber threat detection mechanisms. Predictive Threat Intelligence is one of the emerging focus of information security. In short, Predictive Threat Intelligence is based on understanding attacker behaviour and attack pattern to better predict his/her future actions. The foresight of attackers next actions, intentions and targets can help industries and organizations to take better precautionary decisions beforehand. Moreover, the foresight can expose major vulnerabilities or leaks in the existing system. This will help the industries and organizations fix unauthorized access points in their system before they can be used for intrusion.
Published:
Published:
Published:
Published:
In my junior year of engineering, I wanted to make a scalable product that people would love to use. I also had a secondary motive of obtaining some side cash from it (This kind of idea had provided me side cash in high school by creating software tutorials on YouTube). Knowing myself, it didn’t surprise me when I choose to build a software application, specifically an Android Application. The aim of the project was three-fold:
Short description of portfolio item number 1
Short description of portfolio item number 2
S. Deshmukh and R. Rade, "Tackling Toxic Online Communication with Recurrent Capsule Networks," 2018 Conference on Information and Communication Technology (CICT), Jabalpur, India, 2018, pp. 1-7, doi: 10.1109/INFOCOMTECH.2018.8722433.
Rade R., Deshmukh S., Nene R., Wadekar A.S., Unny A. (2019) Temporal and Stochastic Modelling of Attacker Behaviour. In: Akoglu L., Ferrara E., Deivamani M., Baeza-Yates R., Yogesh P. (eds) Advances in Data Science. ICIIT 2018. Communications in Computer and Information Science, vol 941. Springer, Singapore
Deshmukh, S., Rade, R., & Kazi, F. (2019). Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models. ArXiv, abs/1905.11824.
Mahmoud Al Ismail, Soham Deshmukh, Rita Singh (accepted at ICASSP 2021)
Soham Deshmukh, Mahmoud Al Ismail, Rita Singh (accepted at ICASSP 2021)
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.