Graduate Research Assistant Teaching Assistant Lab Assistant

I investigate how digital traces emerge in systems designed to leave none—advancing forensic science for anonymous networks, intelligent devices, and next-generation cyber threats.

I am Madhab Chandra Das, working at the intersection of digital forensics, cybersecurity, ethical hacking, penetration testing, and machine learning — analyzing anonymous search engines and onion-based networks, cyber-physical systems (CPS), and developing AI-driven tools to detect phishing, malicious activity, and ransomware.

Graduate Research Assistant
Teaching Assistant
Lab Assistant

Focused on demonstrating that “anonymous” and “low-visibility” systems are not fully anonymous from a forensic perspective, and on building tools that help investigators extract scientifically grounded evidence.

About

Profile

Researcher, educator, and practitioner in cybersecurity, digital forensics, ethical hacking, penetration testing, IoT/CPS, and AI-driven threat analysis.

I serve as a Graduate Research Assistant, Teaching Assistant, and Lab Assistant, contributing to both research and instruction in cybersecurity and digital forensics. My training spans electrical and electronic engineering, business, and cybersecurity, enabling me to connect low-level systems, organizational risk, and advanced analytics.

My work centers on forensic analysis of anonymous search engines, onion-based networks and browsers, and cyber-physical systems (CPS). I design and apply machine learning and deep learning models for phishing, malicious traffic, and ransomware, and I am actively exploring forensic tool development using LLMs and Generative AI. In parallel, I investigate digital evidence in e-commerce platforms such as Temu, AliExpress, and Shein, and study how accident detection can be automated from CCTV streams using YOLO-based models.

Research experience (highlights)
  • Diminishing error in real-time data for malware and ransomware detection using machine learning models.
  • Machine learning approaches to detect human diseases using multi-disease datasets.
Honors & awards
  • WUST Presidential Honor Certificate (Jan 2025)
  • WUST Academic Honor Certificate for 2024 Summer
  • Scholarship for Outstanding Result in MSCS – WUST (2024)
  • Scholarship for Outstanding Result in BSc – UITS (2009 & 2010)
  • Innovative Idea Award – UITS Scientific Fair, Dhaka
Education
Degrees & academic training
  • PhD in Digital and Cyber Forensics, Sam Houston State University · Graduate Assistant
  • Master’s in Cybersecurity, WUST · CGPA 3.92 / 4.00
  • MBA, Jahangirnagar University · CGPA 3.13 / 4.00
  • BSc in Electrical and Electronic Engineering (EEE), UITS · CGPA 3.83 / 4.00
Training & certifications
  • Cybersecurity and Risk Management Specialist – People Teach Institute of IT, USA
  • Artificial Intelligence for Cybersecurity – LinkedIn Learning
  • Oracle Cloud Infrastructure Foundations – LinkedIn Learning
  • AWS Cloud Essentials – LinkedIn Learning
  • Peer review training (Introduction to Peer Review; Typical Peer Review Process)
  • PRINCE2 Fundamentals – Global Skill Development
  • Renewable Energy & Its Application – University of Dhaka
Top skills & languages
  • Cybersecurity / DFIR: digital forensic investigation, ethical hacking, penetration testing, ML for digital forensics
  • Core skills: peer reviews, risk management, Active Directory
  • Soft skills: team management, mentoring, motivational speaking
  • Languages: Bangla (native), English (professional), Hindi (elementary)
News

News & Announcements

Latest updates from my research, teaching, and professional activities. You can share this section link (#news) directly in posts or emails.

📢 In-progress: E-commerce Forensics on Temu, AliExpress, and Shein

I am currently analyzing how popular e-commerce platforms leave forensic traces across devices and network traffic, with a focus on privacy, tracking, and evidence collection.

Updated: January 2025

📢 YOLO-11 Live Accident Detection on CCTV Streams

Ongoing work on real-time detection of accidents and hazardous events from CCTV using YOLO-11, focusing on reliable detection, bounding boxes, and potential alerting strategies.

Updated: January 2025

📢 Comparative Analysis of Digital Forensic Tools

I am benchmarking multiple forensic tools (e.g., Autopsy, FTK Imager, CAINE) to compare efficiency, artefact coverage, and practical usability for investigators.

Updated: January 2025

To share a specific update on LinkedIn or elsewhere, you can include a link such as: https://YOUR-DOMAIN/#news so visitors land directly on this section and can explore your full profile.

Research

Research areas & interests

Unifying forensic science, cybersecurity, and intelligent modeling to analyze complex “anonymous” and resource-constrained environments.

Digital forensics of anonymous services
Anonymous search engines & onion-based networks

Forensic analysis of anonymous search engines, onion-based networks (e.g., Tor), and privacy-oriented browsers to understand what evidence can be collected and how anonymity degrades in practice.

Tor & onion routing Anonymous search Browser artefacts
E-commerce forensics
Temu, AliExpress, Shein

Studying evidence sources and trace patterns in cross-border e-commerce platforms to support investigations into fraud, abuse, and privacy violations.

Temu AliExpress Shein Platform forensics
IoT & CPS forensics
Evidence in constrained systems

Evidence acquisition and analysis in IoT and cyber-physical systems, with emphasis on embedded memory, distributed telemetry, and multi-device event reconstruction.

IoT CPS Embedded forensics
ML & DL for cyber threats
Phishing, malicious traffic, ransomware

Machine learning and deep learning models for detecting phishing, malicious network traffic, malware, and ransomware, focusing on robustness and interpretability.

Threat detection Phishing Ransomware
Ethical hacking & penetration testing
Offensive security for better defense

Exploring offensive techniques to evaluate network, web application, and system vulnerabilities through controlled penetration testing and red-team style exercises.

Pen-testing Web exploits OWASP
LLM & AI-driven forensic tooling
LLM-assisted DFIR workflows

Using LLMs, ML, and Generative AI to support evidence triage, artefact correlation, and report generation while keeping investigators in full control of decisions.

LLM tools Automated reports Human-in-the-loop
Publications

Selected research outputs

A sample of my published and in-progress work. For full details, please visit my Google Scholar and ResearchGate profiles.

In-progress research (2024–present)
Ongoing projects
  • Diminishing error in real-time data for malware and ransomware detection using ML models.
  • Forensic analysis of Temu, AliExpress, and Shein e-commerce platforms.
  • Deep learning leaf multiple disease detection.
  • YOLO-11 live accident object detection from CCTV.
  • Comparative analysis of digital forensic tool efficiency.
Machine learning for disease prediction
Health-related ML

Works on predicting heart disease, stroke, breast cancer, and chronic kidney disease from clinical and survey datasets, using comparative model evaluation and early detection strategies.

Deep learning for medical imaging & virology
CT scans · Nipah proteins

Contributions to transfer learning models for COVID-19 detection from CT scans, deep learning for chest cancer prognosis, and computational characterization of Nipah virus proteins.

Microgrids, renewable energy & power systems
Early engineering work

Published work on hybrid PV–wind microgrids, energy storage sizing, energy management in RES-powered DC microgrids, and advanced control strategies in power systems.

Full publication list: Google Scholar · ResearchGate

Teaching & Service

Academic responsibilities

Supporting students through teaching, labs, and mentoring, while contributing to peer review and academic communities.

Teaching & lab assistance
Programming, cybersecurity, digital forensics
  • Assisting in programming labs (e.g., Java, data structures), emphasizing clarity, performance, and problem-solving.
  • Supporting cybersecurity, ethical hacking, and digital forensics labs, including log analysis, memory forensics, and web application testing.
  • Providing feedback on lab reports, research-oriented assignments, and student projects.
Scholarly service & community
Peer review & mentoring
  • Peer reviewer for security and emerging technology articles in Springer / METoR-related initiatives.
  • Active involvement in cybersecurity clubs, cultural clubs, and music, contributing to an inclusive learning environment.
  • Mentoring students interested in IoT security, digital forensics, ML/DL threat detection, ethical hacking, penetration testing, and AI-assisted investigation tools.
Projects

Ongoing & selected projects

A snapshot of selected research and applied projects across cybersecurity, digital forensics, machine learning, ethical hacking, and engineering.

Forensic analysis of Temu, AliExpress, and Shein
Digital forensics · Platform analysis

Investigating digital trace patterns, privacy weaknesses, and potential anti-forensic behavior in major e-commerce platforms.

Temu AliExpress Shein Platform forensics
Deep learning leaf multiple disease detection
Computer vision · Agriculture

Designing and evaluating deep learning models to detect and classify multiple plant leaf diseases for agricultural decision support.

Deep learning Leaf disease Computer vision
YOLO-11 live accident object detection from CCTV
Real-time vision · Smart cities

Real-time detection of accidents and hazardous events in CCTV streams using YOLO-11, with emphasis on reliability and latency.

YOLO-11 Accident detection CCTV
Comparative analysis of forensic tools
Tool evaluation · DFIR

Benchmarking tools such as Autopsy, FTK Imager, and CAINE across acquisition reliability, efficiency, and artefact completeness.

Autopsy FTK Imager CAINE Tool benchmarking
Anonymous search engines & onion-based browsers
Digital forensics · Anonymous services

Experimental study of how anonymous search engines and onion-based browsers leave traces on client systems and networks.

Tor Anonymous search Artefact recovery
ML/DL models for phishing & ransomware detection
Machine learning · Threat detection

Designing supervised and deep learning models to detect phishing, malicious URLs, and ransomware activity using network and content features.

ML Ransomware Phishing
Offensive security labs for ethical hacking
Education · Offensive security

Developing lab scenarios using Nmap, Burp Suite, Metasploit, and OWASP methodologies to teach ethical hacking and penetration testing.

Ethical hacking Pen-testing OWASP Top-10
LLM-aided forensic tooling & report generation
LLMs · Automation

Prototyping workflows where LLMs help with log triage, artefact summarization, and structured report drafting.

LLM Forensic reports Automation
Early engineering projects
Embedded systems · Control

Automated water tank alarm system using microcontroller, digital rail gate system design, solar-powered vehicle concepts, and automatic traffic signal design.

Embedded Control systems Smart transport
Technical skills & toolchain
Platforms · Tools · Soft skills

Hands-on experience with cybersecurity, digital forensics, ethical hacking, penetration testing, data analysis, and cloud environments.

Ethical hacking Pen-testing Burp Suite Nmap Metasploit Wireshark OWASP FTK Imager CAINE AWS EC2 Python SQL Linux & PowerShell
Contact

Collaboration & supervision

I welcome research collaborations, student supervision, and industry–academia partnerships related to cybersecurity, digital forensics, IoT/CPS, ethical hacking, penetration testing, and AI-driven threat analysis.

Location
Huntsville, Texas, USA · Originally from Bangladesh
Example collaboration topics:
• Forensic analysis of anonymous services and onion-based networks
• E-commerce forensics (Temu, AliExpress, Shein)
• Ethical hacking & penetration testing labs
• ML/DL models for phishing, ransomware, and malicious traffic
• IoT/CPS forensic case studies and testbeds
• LLM-assisted tools for investigation and reporting