Latest Updates :

Publication

Faculty and students in the Department of Cyber Forensics and Information Security are actively engaged in impactful research, contributing significantly to the body of knowledge in the field. Our publications span a wide range of topics, including novel approaches to digital evidence analysis, advancements in network security protocols, ethical hacking methodologies, and studies on emerging cyber threats. We regularly publish in peer-reviewed journals, present at international conferences, and contribute to books, showcasing our commitment to advancing cyber security and digital forensics practices.

The following are some of the research publications :

Many publications have arisen out of the faculty and student researches. Some of them are given below:

NAME TITLE ARTICLE NAME
AKSHAYA LEKSHMI S S Network Traffic Cyber Attack Analyzer Tool https://ijsrem.com/pay-online/
PRADHIKSHA S Designing Dynamic Honeypots for Cyber Threat detection Tool https://www.ijcstjournal.org/author-instruction.html
PRANAV R PILLAI Implementation of Dynamic ARP Inspection (DAI) for Enhanced Network Security https://ijcsmc.com/index.php/downloads/
VISHWA S Zero Trust Network Access Management Tool for Remote Workforces https://www.ijcseonline.org/subscription_fee.php
KALLURI AKHILESHWAR REDDY LSTM - Based Phishing Detection for Big Email Data https://ijirt.org/
ARAVINDHAN K Detection and Identification of Malwares using Random Forest Algorithm https://www.ijcseonline.org/subscription_fee.php
BATHULA VENUGOPAL Automated metadata analyzer for digital evidence https://ijirt.org/
PAVITHRA B Empowering Cyber Network malware attacks using classification model https://www.ijraset.com/
VIJAY E SpectreStrike: Advanced WHID Exploitation and Defense https://www.irjet.net/index.php
GANESH P Intelligence Technique for fixing Vulnerabilities in Mobile Applications https://ijsrem.com/pay-online/
HARINI KUMARI B Proxy Re- Encryption approach to secure File Sharing based on Block Chain https://www.ijcstjournal.org/author-instruction.html
SAI SANDEEP N Blockchain-Based Secure File Transfer https://ijcsmc.com/index.php/downloads/
SURESH BALAJI V Detecting EMail Spam with Harris Hawk's Optimizer(HHO) Algorithm https://www.ijcseonline.org/subscription_fee.php
VISHWA V Penetration testing using LLM in data security https://ijirt.org/
VRINDHA V P Incident Response Simulator with Post Event Analysis https://www.ijraset.com/
CHANDRU R Blockchain Security framework for Ransomeware in IoT HealthCare https://ijsrem.com/pay-online/
GOKULNATH D ML DJANGO Framework Integration For IOT Attacks https://www.ijcstjournal.org/author-instruction.html
GOWTHAMARJUN Secure Algorithm for Web Authentication using Block Chain https://ijcsmc.com/index.php/downloads/
NAGOORHUSSAIN M ML based Prediction and Prevention techniques for DDoS attacks https://www.ijcseonline.org/subscription_fee.php
VISHAL V AI powered threat detection using raspberry pi https://ijirt.org/
SHANE SHIBU BAI Tool for Recovering and Analysing the data from the Encrypted Devices https://ijsrem.com/pay-online/
HINDUJA J Intelligence Forensics: AI- powered classification of cyber attacks https://www.ijcstjournal.org/author-instruction.html
MATCHA DEEPAK Classifying Swahili Smishing Attacks for Mobile Money Users: A Machine-Learning Approach https://ijcsmc.com/index.php/downloads/
NATHIN V Spam Detection using NLP for Social Media Platforms and EMail https://www.ijcseonline.org/subscription_fee.php
SANTHOSHKUMAR R Enhancement of security in public wifi with browser extension https://ijirt.org/
BALA KRISHNAN V Advanced Digital Signature Verification Tool https://www.ijraset.com/
HARSHINI A Wireless Network Security Enhancement with ZITA https://ijsrem.com/pay-online/
ANUMANTRAA RAMAR ATHENA Advanced IIDS using Hybrid Algorithms https://www.ijcstjournal.org/author-instruction.html
PERAM CHANDRA SEKHAR REDDY Hybrid Worm Detection - Signature Analysis Method https://ijcsmc.com/index.php/downloads/
PRATHAP R Creating a secured web server environment on Arch Linux https://www.ijcseonline.org/subscription_fee.php
SANGEETHA S Drone Net Scout - Threat Detection and Mitigation for UAV Security https://ijirt.org/
SUDHARSON K Privacy-Preserving Data Analytics using Homomorphic encryption for HealthCare Systems https://www.ijraset.com/
JEYAPRAKASH S Cyber Threat Intelligence for Industrial Control Systems (ICS) https://ijsrem.com/pay-online/
KALAIVANI R File Integration Monitoring Using Powershell https://www.ijcstjournal.org/author-instruction.html
KAMALESHWARAN M Secure Data Transmission in MANET's against Blackhole Attacks https://ijcsmc.com/index.php/downloads/
POOJA V Decentralized BlockChain authentication for Edge-IoT https://www.ijcseonline.org/subscription_fee.php
YOVELKISHORE K Behavioural Biometrics for Continuous Authentication https://ijirt.org/
AKSHAYA C Enforcing DAC in Cloud using Cryptography https://www.ijraset.com/
VISWESH V Detect & Classify Wi-Fi jamming packets with NODE - MCU https://ijsrem.com/pay-online/
VEDA SWETHA S Hybrid IDS System with Flask Frame work https://www.ijcstjournal.org/author-instruction.html
RAHUL S Threat Intelligence System using Suricata by Dynamic method https://ijcsmc.com/index.php/downloads/
ANANDH S Token Attacks vs Cookie-Based Vulnerabilities in API Security https://www.ijcseonline.org/subscription_fee.php
POORNASHREE S Privacy Preserving public complaint reporting platform https://ijirt.org/
ARUNADITHIAN C K Implementation of AI in Enhancing Cyber Network Security https://www.ijraset.com/
KANAGAM D IoT based smart- city infrastructure with cyberprotocols using AWS Cloud for secure communications and data integrity https://ijirt.org/
RAZEEN BUKHARY MOHAMED Spysense - Mobile Application to prevent device tapping https://www.ijraset.com/
SAMUEL BLESSO PAUL W Obsidian Gate - Web Application Firewall (WAF) Mod Security with Fail2ban https://www.irjet.net/index.php
YOGESH P Multi owner data sharing with fully homophic encryption for cloud storage security. https://www.irjet.net/index.php
AKSHAY SEKHAR Integration of forensic tools with AI for Cyber Crime Detection https://ijsrem.com/pay-online/
BUJUNURU SUDHEER KUMAR Hybrid Deep Learning Approach for Cyberbullying Detection in Social Media Platform https://www.ijcstjournal.org/author-instruction.html
CHINTHA SARATH KUMAR Identifying phishing domains using AI/ML https://ijcsmc.com/index.php/downloads/
MUGAMMADHU SATE M Integrated platform for phishing detection and URL threat analysis https://www.irjet.net/index.php
LATHIKA M Ransomeware Shield Detection and Prevention System https://ijcsmc.com/index.php/downloads/
MADDULA VENKATA SANDEEP Probe for the Web - VA Tool https://www.ijcseonline.org/subscription_fee.php
MOHAMED SUHAIL M Hardware Based Secure Storage File Storage Using Blockchain https://ijirt.org/
MRIDULA R Integration of Machine Learning to Enhance IOT Security https://www.ijraset.com/
PONPREETH P Deep learning ensemble with data resampling for credit card fraud detection https://www.irjet.net/index.php
SANTHOSH M Integration of Advanced ML for Client Side Defence against Web Spoofing Attack https://www.irjet.net/index.php
SETHULAKSHMI P G RootKit Detector - Application based Software https://www.ijcseonline.org/subscription_fee.php