
Publication
Faculty and students in the Department of Cyber Forensics and Information Security are actively engaged in impactful research, contributing significantly to the body of knowledge in the field. Our publications span a wide range of topics, including novel approaches to digital evidence analysis, advancements in network security protocols, ethical hacking methodologies, and studies on emerging cyber threats. We regularly publish in peer-reviewed journals, present at international conferences, and contribute to books, showcasing our commitment to advancing cyber security and digital forensics practices.
The following are some of the research publications :
Many publications have arisen out of the faculty and student researches. Some of them are given below:
NAME | TITLE | ARTICLE NAME |
---|---|---|
AKSHAYA LEKSHMI S S | Network Traffic Cyber Attack Analyzer Tool | https://ijsrem.com/pay-online/ |
PRADHIKSHA S | Designing Dynamic Honeypots for Cyber Threat detection Tool | https://www.ijcstjournal.org/author-instruction.html |
PRANAV R PILLAI | Implementation of Dynamic ARP Inspection (DAI) for Enhanced Network Security | https://ijcsmc.com/index.php/downloads/ |
VISHWA S | Zero Trust Network Access Management Tool for Remote Workforces | https://www.ijcseonline.org/subscription_fee.php |
KALLURI AKHILESHWAR REDDY | LSTM - Based Phishing Detection for Big Email Data | https://ijirt.org/ |
ARAVINDHAN K | Detection and Identification of Malwares using Random Forest Algorithm | https://www.ijcseonline.org/subscription_fee.php |
BATHULA VENUGOPAL | Automated metadata analyzer for digital evidence | https://ijirt.org/ |
PAVITHRA B | Empowering Cyber Network malware attacks using classification model | https://www.ijraset.com/ |
VIJAY E | SpectreStrike: Advanced WHID Exploitation and Defense | https://www.irjet.net/index.php |
GANESH P | Intelligence Technique for fixing Vulnerabilities in Mobile Applications | https://ijsrem.com/pay-online/ |
HARINI KUMARI B | Proxy Re- Encryption approach to secure File Sharing based on Block Chain | https://www.ijcstjournal.org/author-instruction.html |
SAI SANDEEP N | Blockchain-Based Secure File Transfer | https://ijcsmc.com/index.php/downloads/ |
SURESH BALAJI V | Detecting EMail Spam with Harris Hawk's Optimizer(HHO) Algorithm | https://www.ijcseonline.org/subscription_fee.php |
VISHWA V | Penetration testing using LLM in data security | https://ijirt.org/ |
VRINDHA V P | Incident Response Simulator with Post Event Analysis | https://www.ijraset.com/ |
CHANDRU R | Blockchain Security framework for Ransomeware in IoT HealthCare | https://ijsrem.com/pay-online/ |
GOKULNATH D | ML DJANGO Framework Integration For IOT Attacks | https://www.ijcstjournal.org/author-instruction.html |
GOWTHAMARJUN | Secure Algorithm for Web Authentication using Block Chain | https://ijcsmc.com/index.php/downloads/ |
NAGOORHUSSAIN M | ML based Prediction and Prevention techniques for DDoS attacks | https://www.ijcseonline.org/subscription_fee.php |
VISHAL V | AI powered threat detection using raspberry pi | https://ijirt.org/ |
SHANE SHIBU BAI | Tool for Recovering and Analysing the data from the Encrypted Devices | https://ijsrem.com/pay-online/ |
HINDUJA J | Intelligence Forensics: AI- powered classification of cyber attacks | https://www.ijcstjournal.org/author-instruction.html |
MATCHA DEEPAK | Classifying Swahili Smishing Attacks for Mobile Money Users: A Machine-Learning Approach | https://ijcsmc.com/index.php/downloads/ |
NATHIN V | Spam Detection using NLP for Social Media Platforms and EMail | https://www.ijcseonline.org/subscription_fee.php |
SANTHOSHKUMAR R | Enhancement of security in public wifi with browser extension | https://ijirt.org/ |
BALA KRISHNAN V | Advanced Digital Signature Verification Tool | https://www.ijraset.com/ |
HARSHINI A | Wireless Network Security Enhancement with ZITA | https://ijsrem.com/pay-online/ |
ANUMANTRAA RAMAR ATHENA | Advanced IIDS using Hybrid Algorithms | https://www.ijcstjournal.org/author-instruction.html |
PERAM CHANDRA SEKHAR REDDY | Hybrid Worm Detection - Signature Analysis Method | https://ijcsmc.com/index.php/downloads/ |
PRATHAP R | Creating a secured web server environment on Arch Linux | https://www.ijcseonline.org/subscription_fee.php |
SANGEETHA S | Drone Net Scout - Threat Detection and Mitigation for UAV Security | https://ijirt.org/ |
SUDHARSON K | Privacy-Preserving Data Analytics using Homomorphic encryption for HealthCare Systems | https://www.ijraset.com/ |
JEYAPRAKASH S | Cyber Threat Intelligence for Industrial Control Systems (ICS) | https://ijsrem.com/pay-online/ |
KALAIVANI R | File Integration Monitoring Using Powershell | https://www.ijcstjournal.org/author-instruction.html |
KAMALESHWARAN M | Secure Data Transmission in MANET's against Blackhole Attacks | https://ijcsmc.com/index.php/downloads/ |
POOJA V | Decentralized BlockChain authentication for Edge-IoT | https://www.ijcseonline.org/subscription_fee.php |
YOVELKISHORE K | Behavioural Biometrics for Continuous Authentication | https://ijirt.org/ |
AKSHAYA C | Enforcing DAC in Cloud using Cryptography | https://www.ijraset.com/ |
VISWESH V | Detect & Classify Wi-Fi jamming packets with NODE - MCU | https://ijsrem.com/pay-online/ |
VEDA SWETHA S | Hybrid IDS System with Flask Frame work | https://www.ijcstjournal.org/author-instruction.html |
RAHUL S | Threat Intelligence System using Suricata by Dynamic method | https://ijcsmc.com/index.php/downloads/ |
ANANDH S | Token Attacks vs Cookie-Based Vulnerabilities in API Security | https://www.ijcseonline.org/subscription_fee.php |
POORNASHREE S | Privacy Preserving public complaint reporting platform | https://ijirt.org/ |
ARUNADITHIAN C K | Implementation of AI in Enhancing Cyber Network Security | https://www.ijraset.com/ |
KANAGAM D | IoT based smart- city infrastructure with cyberprotocols using AWS Cloud for secure communications and data integrity | https://ijirt.org/ |
RAZEEN BUKHARY MOHAMED | Spysense - Mobile Application to prevent device tapping | https://www.ijraset.com/ |
SAMUEL BLESSO PAUL W | Obsidian Gate - Web Application Firewall (WAF) Mod Security with Fail2ban | https://www.irjet.net/index.php |
YOGESH P | Multi owner data sharing with fully homophic encryption for cloud storage security. | https://www.irjet.net/index.php |
AKSHAY SEKHAR | Integration of forensic tools with AI for Cyber Crime Detection | https://ijsrem.com/pay-online/ |
BUJUNURU SUDHEER KUMAR | Hybrid Deep Learning Approach for Cyberbullying Detection in Social Media Platform | https://www.ijcstjournal.org/author-instruction.html |
CHINTHA SARATH KUMAR | Identifying phishing domains using AI/ML | https://ijcsmc.com/index.php/downloads/ |
MUGAMMADHU SATE M | Integrated platform for phishing detection and URL threat analysis | https://www.irjet.net/index.php |
LATHIKA M | Ransomeware Shield Detection and Prevention System | https://ijcsmc.com/index.php/downloads/ |
MADDULA VENKATA SANDEEP | Probe for the Web - VA Tool | https://www.ijcseonline.org/subscription_fee.php |
MOHAMED SUHAIL M | Hardware Based Secure Storage File Storage Using Blockchain | https://ijirt.org/ |
MRIDULA R | Integration of Machine Learning to Enhance IOT Security | https://www.ijraset.com/ |
PONPREETH P | Deep learning ensemble with data resampling for credit card fraud detection | https://www.irjet.net/index.php |
SANTHOSH M | Integration of Advanced ML for Client Side Defence against Web Spoofing Attack | https://www.irjet.net/index.php |
SETHULAKSHMI P G | RootKit Detector - Application based Software | https://www.ijcseonline.org/subscription_fee.php |