B.E – Cyber Security

B.E - Cyber Security

About the Department

The Department of Cyber Security was established in 2020 at Paavai Engineering College. This Department offers a 4 year B.E Cyber Security programme under a well-defined curriculum for budding engineers to the next edge of future technologies in safeguarding the information system. The pivotal objective of evolving students is to acquire information and knowledge by acquainting technical expertise and skills to accomplish the security essentials in the future era of the information and communication industry. The department organizes many training programs and provides best practices in cyber and information security for the students. The faculty members are well-experienced and dedicated towards the uplifting of the student community. The students are eagerly exposed to industrial aspects of the subjects through laboratory work, industrial visits and internship training regularly.

Programs Offered 

Salient Features

Vision and Mission

Vision

Vision

To provide a propitious academic and research environment to produce competent professionals to the dynamic needs of the emerging trends in the field of Computer Technology especially Cyber Security.

Mission

Mission

PEO, PO and PSO

Programmed Educational Objectives (PEOs)
PEO1Global reputation: To create value added, disciplined, high profile Cyber Security professionals for successful careers in their related Industry that makes them globally reputed.
PEO2Fundamental Knowledge: To develop the students with a sound foundation in mathematical, scientific and engineering fundamentals necessary to synthesize the technical core concepts focusing on skill development and knowledge up gradation which will lead to technical innovations.
PEO3Continuous learning: To practice and demonstrate the ability to use the domain knowledge and expertise through periodic assignments , performances and projects to continuously prove the functionality of Cyber Security learning in social and environmental aspects and to make allowances for further improvements.
Program Outcome (POs)
PO1Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization to the solution of complex engineering problems.
PO2Problem analysis: Identify, formulate, review research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences.
PO3Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations.
PO4Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.
PO5Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations.
PO6The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice.
PO7Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
PO8Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.
PO9Individual and team work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
PO10Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
PO11Project management and finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments.
PO12Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.
Program Specific Outcomes (PSOs)
PSO1Foundation of Computer System and Cyber Security: Ability to understand the principles and working in the areas related to data communication, networking, digital forensic, cyber defense, cryptography, network security, cyber laws and ethics for the development of Cyber Security solutions.
PSO2Applications of Cyber Security: Ability to apply the acquired depth knowledge of Cyber Security to protect and defend computer systems and networks from cyber security attacks.

Students Achievements

Academic Year 2024 - 2025
Name of the studentAward NameVenue & DateOrganized By
Ajmal Thahseen
III CYS –‘A’
Participated in Regional Finals of ICT Academy Youth Talk- Tamil Nadu.PEC &  01.10.2024ICT Academy Youth Talk


Skill Training Program:

S.NoName of the StudentYear & DeptName of the ProgrammeVenue & DateName of the CompanyDuration
1Pavinath EIV-CYSCertified Ethical HackerOnline
&
18.12.24
EC-Council3 Months
S.NoName of the StudentName of the OrganizationAward DetailsRemarks
1Gokul RTamilnadu GovernmentElectoral Commission of IndiaView
S.No Name of the Student Name of the Examination (GATE, Govt, Private Sector, Public Sector) Date of the Exam Qualified Remarks (Proofs)
1 Sowmya.V.M GATE 10.02.2024 27..6 View
S.NoName of StudentClassTitleVenuePrize / PlaceDate
1K.KabilanII CYSEthical HackerOnlineCourse Completed01.02.23
2V.SanjayII CYSTwo Days National ConclaveClinical Intelligence:A High End Exploration of Healthcartew Predictive Analysis using AI and Data Analytics ToolParticipated03.04.23
3J.JeyasenaadhiIII yearSelected for CSR CourseOnlineParticipated27.02.23
4K.Salmankhan II YearSelected for CSR CourseOnlineParticipated27.02.23
5M.Gokul RajI YearSelected for CSR CourseOnlineParticipated27.02.23
6K.SalmankhanII YearCyber WarriorOnlineParticipated05.03.23

Faculty Achievements

Academic Year 2025 - 2026
S.NoName of the FacultyName of the OrganizationAward DetailsRemarks
1Velumani JNPTEL SwayamNPTEL STAR BELIEVERView
S.NoName of the FacultyName of the OrganizationAward DetailsRemarks
1Loganathan RThe Institutions of Engineers IndiaBest Faculty AwardView

Laboratory Facilities

S.NoName of The EquipmentQuantityConfiguration
1Computers (Make : WIPRO)

60Model : WIPRO-Evolv-E7600, CPU : Core2 Duo 3.06GHz, RAM : 2GB, HDD : Sata320, Speed : 3.06 GHz, Monitor : 19.5”TFT Keyborad, Optical Mouse
2Computers (Make :HP)

60Model : HP-DC5800-E7500, CPU : Dual Core Duo 3.06GHz, RAM : 2GB, HDD : Sata250, Speed : 3.06 GHz, Monitor : 19.5”TFT, Keyborad, Optical Mouse
3Printers3HP 1020 printer
4UPS (Compact)110 KVA
5UPS (Compact)15 KVA
6Switch3Make : D-LINK Rack : 12 U Model : 1400 24(3) Patch Panel : 2
7Air Conditioner4LG 2 TON

Department Library

S.NoParticularsQuantity
1No. of Volumes10050
2No. of Titles1350
3No. of Journals30
4No. of e-Books550
5No. of System with Internet Facility & IEEE Access01

Capstone Projects

Academic Year 2024 - 2025
Batch NoRegister NumberName of the Students Project TitleProject Supervisor
1622121111019Hariharan.SAlpha Shield:Robutness for Linux ServerR. Loganathan
622121111020Harikrishnan.R
622121111050Salmankhan.K
2622121111047Sabarishan.PBad USB detector using Raspberry pi picoR. Rajalakshmi
622121111030Madhankumar.M
622121111048Sabhareesh.S
3622121111041PraveenKumar AFile Forensics: Investigating Digital Traces and Strengthening Data ProtectionDr. P. Muthusamy
622121111032Mukesh M
622121111021Jana M
4622121111024Kabilan KFake News and Disinformation Tracking Using OSINT and MaltegoJ. Velumani
622121111029Kumarjeyanth K
622121111028Kumaresan L
5622121111037Pasupathi RDataShift: Automatically searches for vulnerable dork queriesR. K. Poongodi
622121111039Poobalan M
622121111015Elamparithi S
6622121111003Arulkumar SCyber Therat Intelligence PlatformS. Ramya
622121111013Dhinakaran S
622121111018Gowtham A
7622121111040Prasanth S Checks the target using CVE vulnerabilities*S. Chandrakala
622121111007Bharanitharan S
622121111045Ranjith B
8622121111038Pavinath.EAlgoDetect: A Web-Based Tool for Identifying Encryption Algorithms in Encrypted MessagesR. Rajalakshmi
622121111053Santhoshkumar.M
622121111062Thivagar A P
9622121111004Arun R Secure and Tamper-Proof CCTV Video Streaming with Blockchain IntegrationS. Ramya
622121111009Dhanush M
622121111061Tharneesh S R
10622121111043Raja.SMulti Layered Health Care Data Security: Integrating keystrokes dynamics and Block Chain Technology strokes dynamics and Block Chain TechnologyR. Loganathan
622121111033Muthu Pandiyan.P
622121111016Gokul.R
11622121111010Dharani DDeepfake detection in Video using Resnet CNNDr. P. Muthusamy
622121111012Dharsini R
622121111014Durgadevi S
12622121111025Karthick RChildren Safety Monitoring (CSM) Application

 

 

N. Nijanthan

 

622121111052Sanjay p
622121111044Rajamohan R
13622121111023Jeevanantham MCross Site Scripting (XSS) – SentinelV.Sinthuja
622121111036Nithiyan M
622121111026Kesavan T
14622121111051Sangamithiran MAI Powered Digital Twin for Personalised Search J.Velumani
622121111058Sri prasanna.S
622121111301Gokul.B
15622121111001Akash KExeScan- Execute file malware detector.  N.Nijanthan
622121111027Keshavan T
622121111063Vinothkumar M
16622121111017Gokulnath SEmail Header Analysis: Analyzes email headers (.eml) both online and offline.V.Sinthuja
622121111046Rohith S
622121111056Sri Cibi S
17622121111005Bala PMetadata Extractor: Extracts metadata from files in user friendly InterfaceP. Sathishkumar
622121111011Dharmaraj D
622121111054Saranraj K
18622121111501Dharsini S RShadow intelligence with OSINT and spiderfootS.Chandrakala
622121111035Niranjani M
622121111059Sushmitha k
19622121111006Balamanikandan MAutomated Cyber Protection with AI-Driven Toxic Comments Filtering on InstagramR.K. Poongodi
622121111034Magimairaj J
622121111057Srisaran S
20622121111008Bhuvaneshwaran BHacking with ANDRAXP.Sathishkumar
622121111031Nandhakumar B
622121111055Sathishkumar V
21622121111022Jayasri SDrowsiness Detection System Using PythonR.Loganathan
622121111049Sakthi K
Batch NoRegister NumberName of the StudentsProject TitleProject Supervisor
120111023R. KapilsuryaPYTHON BASED SOC AND FORENSICS ANALYSIS FOR INCIDENT CYBER THREATDr. P. Muthusamy
20111051V. Shanmugam
20111302R. Saran Kumar
220111042B.SanjaikumarSECURE AND ENCRYPTED VIDEO SHARING TO PREVENT ILLEGAL ACCESSDr. T. Loganayagi
20111058S.Suriyaprakash
20111059R.Thirupathi
320111002Adhithya GKDETECTING FACIAL FORGERY IN VIDEOS USING DEEP LEARNING ALGORITHMK.Alarmelmangai
20111008Barathinikeshan S
20111039Rahul.P
420111030Manoj.KONLINE TRANSACTION FRAUD DETECTION USING BACKLOGGING ON E-COMMERCEJ.Velumani
20111043Sanjay kumar S
20111050Shajan M
520111017Hariharan S BSMART TRANSACTION ON ETHEREUM DAPPR.Loganathan
20111016Hariharan R
20111015Haridharan A
620111062Yashika.cSECURE CRIME RECORD SHARING USING CRYPTOGRAPHY AND STEGANOGRAPHY APPROACHDr. T. Loganayagi
20111053Sowmya. V.M
20111055Suchimitha. D
720111009Ben GarryTHREE FACTOR BASED AUTHENTICATION SCHEME IN CYBER SECURITY AGAINST POTENTIAL MALICIOUS THREATSS.Ramya
20111027Kowshik E
20111038Praveen Raj.E
820111003Adithiya.TMALWARE DETECTION AND ANALYSIS USING THE PYWHAT TOOLR.Loganathan
20111026Keerthika.Y
920111014Gopi KrishnanDIGITAL LEGAL RIGHTS MANAGEMENT USING STEGNOGRAPHY AND BLOCKCHAIN TECHNOLOGYS.Suganya
20111029Manikandan.N
20111056Sudharsan.K
1020111021Jeyasenaadhi JA BLOCKCHAIN BASED SECURE PHOTO SHARING FRAMEWORK FOR CROSS-SOCIAL NETWORKSathish
20111054Sreether R
20111046Saravana Kumar U
1120111038Praveena STEMP FILE RESCUE ENDEAVOR FOR DETECTING RECENT HACKER ACTIVITY USING PYTHONDr.P. Muthusamy
20111063Yogarisha M
20111005Akchaya B
1220111060Venkateswaran GSENTRYSHELL: CRAFTING AN EFFECTIVE SSH HONEYPOT FOR THREAT MONITORINGJ.Velumani
20111006Anisto Mejin A
20111031Mohammed Azarudeen
1320111001Abilash MDESIGN AND DEVELOPMENT OF ANDROID APP MALWARE DETECTOR API USING ANDROGUARD AND CATBOOSTR.K.poongodi
20111049Selvarasu S
20111034Mukesh M
1420111044Sanjay.VTOKEN BASED BIO-METRIC ENHANCED KEY DERRIVATION FOR AUTHENTICATION OVER WIRELESS NETWORKR.Rajalakshmi
20111010Bharath Kumar.G
20111028Kubendiran E
1520111033Monish kanna RCREDIT CARD FRAUD DETECTION USING PYTHONR.Rajalakshmi
20111011Dharnesh L
20111047Satheesh kumar M
1620111048Sathish.BINVERTIBLE NEURAL NETWORK FOR TAMPER RESILIENT RECOVERYR.K.poongodi
20111057Suresh .S
20111301Mohammed siddiq
1720111036Prabakaran SAUTOMATED PENETRATION TESTING AND VULNERABILITY ANALYZING TOOL USING PYTHONS.Suganya
20111018S.B.hariharan
20111032Mohanraj M
1820111061Vignesh.KENCRYPTED HONEY PASSWORD AUTHENTICATION FOR ONLINE BANKING SYSTEMS.Ramya
20111052Sivaramakrishnan. D
20111022Kabilan.S
1920111035Paramananthan NIDENTIFYING MISSING CHILD USING FACE RECOGNITION SYSTEMSathish
20111020Harish jayaraj B
20111024Kaviya Raj S
2020111041Rithick SSENTINEL SIGHT: PYTHON-BASED DIGITAL FORENSIC ANALYSIS TOOLR.Loganathan
20111040Ravindhar V
20111013Dhinesh M
20111025Kaviyarasu.G
S.No Name of the Student Year Name of the Organizer Duration Title Activity
1 V.Sanjay III NSIC, Chennai 06.03.23 – 22.03.23 IoT Applications using Raspberry PI Internship
2 B.Harish Jayaraj III Kaashiv Infotech 10.02.23 – 25.02.23 Ethical Hacking Internship
S.S.Kaviyaraj
N.Paramananthan
V.M.Sowmya
C.Yashika
3 T.Adhithya III Livewire, Namakkal 23.01.23 – 11.02.23 Cyber Analyst Internship
A.Anisto Mejin
4 S.R.Dharshini III Livewire, Namakkal 23.01.23 – 11.02.23 Cyber Analyst Internship
S.Gopikrishnan
Y.Kiruthika
B.Sathish
G.Venkateshwaran
M. Yogarisha
5 Adhithya G Krishna III Accent Technosoft 21.09.22 – 11.10.22 Ethical Hacking Internship
R.Kapilsurya
R.Sarankumar
6 V.Shanmugam III Accent Technosoft 21.09.22 – 11.10.22 Cyber Security Internship
7 R.Kapilsurya III Internshala Training 11.07.22 (8 weeks) Ethical Hacking Internship
8 A.Praveenkumar II Cybersec Infotech associated with Teachnook 01.08.22 – 30.09.22 Cyber Security Internship
M.Mukesh
E.Pavinath
A.P.Thivagar
M.Balamanikandan
K.Kabilan
M.Poobalan
S.Elamparithi
S.Raja
S.No Name of the Student Year Name of the Company Duration Specialization Activity
1 Sanjay V II BSNL, Coimbatore 26.09.22 – 30.09.22 Telecom Internship
2 Dharshini Shakila II Internshala 19.01.22 Programming With C,& C++ Internship
3 Dharshini Shakila II Internshala 11.07.21 Internship And Job Preparation Internship
4 Dharshini Shakila II Internshala 09.06.21 Programming With Python Internship
5 V.Shanmugam II Intershala 31.05.21 Ethical Hacking Internship

MOU Signed

Academic Year 2024 - 2025
Sl.NoName of the institution / industry / corporate houseMonth and Year of signing MoUDurationList of activities under each MOU
1Csuite Tech LabsAug/20243 YearsCourses, Workshop & Training
2Cybernaut Edu-Tech LLPFeb/20252 YearsCourses & Training
3Prompt Info TechFeb/20253 YearsCourses & Training
Sl.NoName of the institution / industry / corporate houseMonth and Year of signing MoUDurationList of activities under each MOU
1TutlorFeb/233 YearsCourses & Training
2LivewireFeb/233 YearsWorkshop & Training
3EC CouncilApr/233 YearsCourses & Training
4BhumiJul/232 YearsSoftware Skills Training
Sl.NoName of the CompanyDate of MoU SignedDuration of MoUActivities
1EC Academy, Bengaluru10.04.20233 YearsSeminar, Workshop, Webinar, Internship
2Genuine IT Solution, Chennai15.05.20235 YearsSeminar, Workshop, Internship
3LiveWire, Chennai14.02.20235 YearsGuest Lecture, Webinar, Workshop
4Tutler, Chennai24.03.20235 YearsInternship, Workshop

Industry Interactions

Industry Visit

Academic Year 2022 - 2023

S.NoName of The Company With AddressMode of ActivityDescription
1LiveWire ChennaiIndustrial VisitStudents visited “LiveWire” is an emerging Information security company and Institution with an aim to provide information security solutions to clients with wide array of platforms: Networks web applications, servers and databases.It follows global standards while performing penetration testing operations to ensure integrity, availability and confidentiality of Data

Association & Club Activities by the Department

Academic Year 2025 - 2026
S.NoNature of the ProgrammeTitle of the EventDateWebsite link
1Hands-On WorkshopCyber Security, Web Development and Data Analytics with Power Bi11/10/2025View
S.NoType of ProgrammeTitleResource PersonDate
1WORKSHOP“Cyber Security- Staying Safe In The Digital World “Mr. Sankarraj Subramaniam, Founder & CEO, Prompt Infotech, Coimbatore07.03.2025
2WORKSHOPAi-Enhanced Prototyping And Security-First DevelopmentMr. Jayasurya Gnanavel Founder & CEO cybernaut EDU-Tech LLP, Chennai08.03.2025
3WEBINAR“Exploring The World Of Cloud With Aws”Mr.NATARAJAN DEEPU.PU, Senior Devops Engineer, Autodesk ,Bengaluru.13.03.2025
4GUEST LECTURE“Identity Security: Beyond Quick Fixes To Systematic Solutions “Mr. PONS MUDIVAI ARUN, Cyber Security Product Leader, Bangalore.18.02.2025
S.NoType of ProgrammeTitleResource PersonDate
1WORKSHOPInhouse Training on “Introduction to Ethical Hacking & Kali LINUX ”Mr.K.Kabilan, Mr.Sabarishan,
Mr.Kumar Jeyanth, Mr.Akash (III YEAR)
22.07.2023
2WEBINARHow to Build a Successful Career in Cyber SecurityMs.Pooja Joshi ,  Country Head – India , EC-Council24.07.2023
S.NoDateType of the ProgrammeTitle of the ProgrammeName of the resource person
124.4.2023 to 25.4.2023National Level WorkshopBug BountyMr. R Loganathan, AP/Cyber Security, Paavai Engineering College. V.Shanmugam, III year/Cyber Security Mr. R Kapilsurya, III year/Cyber Security Mr. Anisto Mejin, III year/Cyber Security Mr. SB Hariharan, III year/Cyber Security
223.3.2023 To 24.3.2023National Level SeminarHow to Plan for Startup And Legal & Ethical StepsMr.Akash Venketasan , Technical Trainer Founder and CEO, Tutelr Infosec PVT.Ltd, Chennai, Mr.Thowbik Ahmed, Cyber Security Engineer, FreshworksIns ,Chennai Mr.SriramKannan, Cyber Security Analyst, Tutelr Infosec Pvt.Ltd,Chennai
317.3.2023 To 18.3.2023National Level WorkshopMastering the Art of Penetration TestingMr.T.Prabakaran, Regional Manager, Livewire, Chennai. Mr.M.Vignesh and Mr.V.Pugalenthi, Technical Trainers, Cyber security Analyst, Chennai.
414.02.2023Guest LectureThe Next Generation Workforce for Information TechnologyMr.T.Prabakaran, Regional Manager, Livewire, Chennai
501.02.2023Online WebinarRoles of Machine Learning in Cyber SecurityDr. S. V. Kogilavani, Professor, Department of Artificial Intelligence, Kongu Engineering College, Perundurai, Erode.
630.11.2022Online SeminarNeed for InnovationMr.M.V.Mahesh, Innovation Ambassador, AP(Sr.G)/ECE, KSR Institute for Engineering and Technology, Tiruchengode,
717.10.2022Guest LectureFree Software PhilosophyMr. S. Mathankumar, CEO, Inevitable Tech & System Engineer, Atoma Development & Services, Chennai,
815.10.2022National level ConferenceEmerging Trends in IT, CSE & CYBER SECURITYDr S Prabhu, Associate Professor, Department of Banking Technology, Pondicherry University (A Central University).
916.09.2022Online webinarLife Skill and Social Entrepreneur SkillsMr. R. Sathishraj, CEO, E –Crusaders, Chennai.
1003.09.2022WorkshopCyber security and the Threats of Mobile DevicesDr.T.Sudhakar, Associate professor, VIT-AP University, Amaravathi and Mrs.Deepthi, Junior AI Engineer, Object Automation, Chennai.
1123.08.2022Online WebinarInnovation and Startup Eco SystemMr. B. Krishnakumar, Managing Director, New Technology Mobile Service Center and Training Institute, Coimbatore
1211.6.2022SeminarInnovation/Prototype Validation-Converting Innovation into a StartupDr.Sampath Kumar Nandhagopal, Principal Consultant LAD2LEADER, EDII Master Trainer and NEN Faculty, Mentor and Educator, Salem.
S.NoDateType of the ProgrammeTitle of the ProgrammeName of the resource person
103.12.2021SeminarCybersecurity Brief: Threats, Targeted Attacks and Operations – PracticalsDr Sibi Chakkaravarthy Sethuraman, Security Researcher and Associate, Professor Vellore Institute of Technology.
210.12.2021SeminarCybersecurity Brief: Threats, Targeted Attacks and Operations – PracticalsDr Sibi Chakkaravarthy Sethuraman, Security Researcher and Associate, Professor Vellore Institute of Technology.
314.12.2021SeminarCyber Warfare with Case Studies-2Dr. Sibi Chakkaravarthy Sethuraman, Security Researcher and Associate, Professor Vellore Institute of Technology.
417.12.2021SeminarCyber Warfare with Case Studies-3Dr Sibi Chakkaravarthy Sethuraman, Security Researcher and Associate, Professor Vellore Institute of Technology.
S.No Date Type of the Programme Title of the Programme Name of the resource person
1 19-10-20 Guest lecture Data Science – Machine Learning Cherukuri Ravindranath Chowdary, Prof & Head Christ (Deemed to be University), Karnataka.
2 20-10-20 Guest lecture Data Science With R Rajkumar Kalaimani, Senior Systems, Engineer, Infosys Ltd, Chennai.
3 10-12-20 Workshop Setting up Environment and Programming with Python Dr.R.Srinivasan, SRM Institute of Science and Technology, Chennai.
4 11-12-20 Guest lecture Importance of Probability and Statistics in Data Science Dr.J.Somasekar, Prof & head, Gopalan College of Engineering and Management, Bangalore.
5 10-04-21 Webinar Infrastructure and Operations in IT Mr.Natrayan Chinnasamy, Sr. Systems Engineer, Micron Technologies, Hyderabad.
6 04-05-21 Webinar So You Think, You Can Block Chain Mrs.Christy Benitha, Founder and Chief Design Officer, Technizant.

Events Participation

Faculty Events Participation

Academic Year 2025 - 2026
S.NoName of the FacultyDeptName of the Guest and ProgrammeVenue & DateDuration
1Mrs.Chandrakala S
Mr.Sathishkumar P
CYSMr.Jayasurya G and Data Analysis Made SimplePEC
&
23.10.2025
Half Day
2Mr.Loganathan R
(Assistant Professor)
CYSMr.Bernard Arockiam P and Full Stack Unlocked: Cloud Skills for Modern DevelopersPEC
&
04.09.2025
Half Day
3Mr.Sathishkumar P
(Assistant Professor)
CYSMr.MonishKanna S.P and Advanced Web ExploitationPEC
&
02.09.2025
Half Day
4Mrs.Chandrakala S
(Assistant Professor)
CYSMr.Rajkumar M and Cyber Security Compliance and Innovation: Safegaurding Data through Regulatory AlignmentPEC
&
22.08.2025
Half Day


Workshop Organized by Faculty

S.NoName of the FacultyDeptName of the WorkshopVenue & DateDuration
1Mr.Loganathan R
(Assistant Professor)
CYSHackshield 2k25PEC
&
11.10.2025
1 Day


Certification Courses

S.NoName of the Faculty with DesignationName of the ProgrammeVenue and dateType of the Program
1Loganathan RCyber SecurityOnline
05.08.24 to 09.08.2024
AICTE
2Poongodi R KIBM Block chain Foundation for DevelopersIBM 05.08.24Certification course
3Poongodi R KAndroid Bug Bounty HuntingEC -Council
07.08.24
Certification course
4Velumani JPython AI and Machine Learning For Production & DevelopmentTutorials point
10.08.24
Certification course
5Velumani JBuild a Simple Forum in PHP And MYSQLTutorials point
10.08.24
Certification course
6Velumani J

Chat Gpt for Beginners

Tutorials point
10.08.24
Certification course

7

Velumani JCoaching the Analytical Mind: Best Practices of Fortune 500Tutorials point
10.08.24
Certification course
8Velumani JCyber Security 101Tutorials point
10.08.24
Certification course
9Velumani JGood Communication Skills are Key to SuccessTutorials point
10.08.24
Certification course
10Velumani JEffective MeetingsTutorials point
10.08.24
Certification course
11Sathishkumar PNPTEL E- AwarenessNPTEL
14.08.24
Certification course
12Chandrakala SNPTEL E- AwarenessNPTEL
14.08.24
Certification course
13Loganathan RInnovation Ambassador (IA) Training ‘Reskilling’AICTE
14.08.24
FDP
14Ramya STwo Days Online FDP On Deep Learning And Internet Of Things In Precision HealthcareKongu Engineering College
16.08.24 to
17.08.24
FDP
15Poongodi R KTwo Days Online FDP On Deep Learning And Internet Of Things In Precision HealthcareKongu Engineering College
16.08.24 to
17.08.24
FDP
16Rajalakshmi RTwo Days Online FDP On Deep-Learning And Internet Of Things In Precision HealthcareKongu Engineering College
16.08.24 to
17.08.24
FDP
17Rajalakshmi RInternational  Faculty Development Program On Machine Learning And Artificial Intelligence.EXCELR
12.08.24
FDP
18Ramya SOnline FDP On Machine Learning And Artificial IntelligenceEXCELR
14.08.24
To
19.08.2024
FDP


FDP /
Course / Workshop / Seminar / Conferences Attended by Faculty

S.NoName of the Faculty with DesignationDeptName of the ProgrammeVenue & dateType of the ProgramPosition /  Place
1Nijanthan N
(Assistant Proffessor)
CYSWykoff Trading: Making Profits with Demand And SupplyOnline &
16.03.05
CourseCompleted
2Ramya S
(Assistant Proffessor)
CYSEthical Consideration in Generative AI for Healthcare: Balancing Innovation and ReasearchKongunadu College of Engineering and Technology
&
10.03.25 – 11.03.25
National Level SeminarParticipated


Skill Training Program Attended By Faculty

S.NoName of the FacultyDeptName of the ProgrammeVenue & DateDuration
1Dr.P.Muthusamy
(Head of the Department)
CYSShaping the future with Physical AI and Interdiscipilinary InnovationPEC
&
26.03.25 – 27.03.25
1 Day
2Loganathan R
(Assistant Proffessor)
CYSShaping the future with Physical AI and Interdiscipilinary InnovationPEC
&
26.03.25 – 27.03.25
1 Day
3Poongodi R K
(Assistant Proffessor)
CYSShaping the future with Physical AI and Interdiscipilinary InnovationPEC
&
26.03.25 – 27.03.25
1 Day
4Velumani J
(Associate Proffessor)
CYSShaping the future with Physical AI and Interdiscipilinary InnovationPEC
&
26.03.25 – 27.03.25
1 Day
5Nijanthan N
(Assistant Proffessor)
CYSShaping the future with Physical AI and Interdiscipilinary InnovationPEC
&
26.03.25 – 27.03.25
1 Day
S.NoName of the FacultyTitleOrganized byDate
1Mr.R.LoganathanSix Days Development programme on Artificial Intelligence and Machine LearningKSR College of Engineering

06.03.2023 to 
11.03.2023

2Mr.R.LoganathanTraining programme on  Cyber SecurityAICTE-AU17.01.2023 to 22.01.2023
3Ms.R.RajalakshmiSix Days International FDP  on  Smart Future Technologies in AI/ML & Data Analytics Research Papers and Usage of Research ToolsAmity University, Teshkant03.04.2023 to 07..04.2023
4Ms.R.RajalakshmiNational Workshop on Machine Learning & Data Science – Techniques & TrendsNIT, Tiruchirappallli26.06.2023 to 30.06.2023
5Ms.R.RajalakshmiTECHNO Workshop Series Artificial Intelligence

TECHNOBYTES & CHEMPLUS’23 

IIT Madras

11.03.2023 to 12.03.2023
S.NoName of the FacultyTitleOrganized byDate
1Ms.R.RajalakshmiFive Days Faculty Development program on MS Power BI Data Analyst AssociateKSR Institute for Engineers & Technology

26.12.2022 to
30.12.2022

2Ms.R.RajalakshmiFive Days Faculty Development program on Cloud Practitioner (AWS)ICT Academy, Mahendra Engineering College12.09.2022 to 16.09.2022

Students Events Participation

Academic Year 2025 - 2026


Symposisum Program Attended By Students

S.NoNameDeptSymposium NameVenue and DateDuration
1Irfan MCYSSpringFest2k2509.10.20251 DAY
2Kirthikkumar KVCYSSpringFest2k2509.10.20251 DAY
3Badrinarayanana KSCYSSpringFest2k2509.10.20251 DAY
4Pragathiesh MCYSSpringFest2k2509.10.20251 DAY
5Muthumani DCYSSpringFest2k2509.10.20251 DAY
6Mukesh Vaithiyanathan KaliyamoorthyCYSSpringFest2k2509.10.20251 DAY
7Meiyarasan PCYSViyugam2k2515.10.20251 DAY
8Chandru ACYSSymcosci’2513.08.20251 DAY


Workshop Program Attended By Students

S.NoNameDeptWorkshop NameVenue and DateDuration
1Kadhirvel PCYSBuilding and Deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
2Mukesh Vaithiyanathan KaliyamoorthyCYSBuilding and Deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
3Kirthikkumar KVCYSBuilding and Deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
4Subha PYCYSBuilding and Deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
5Pragathiesh MCYSBuilding and Deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
6Muthumani DCYSBuilding and Deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
7Shree Dharani CCYSBuilding and deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
8Sujitha SRCYSBuilding and Deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
9Yazhini KCYSBuilding and Deploying and interactive AR/VR Applications Using UnityKongu Engineering College 04.09.20251 DAY
10Meiyarasan PCYSAI Tools WorkshopTop Engineers 24.08.20251 DAY
11Jagatheesan KCYSAI Tools WorkshopTop Engineers 24.08.20251 DAY
12ArunKumar BCYSAI Tools WorkshopTop Engineers 24.08.20251 DAY
13Elangkumaran VPCYSImage Classification Using Deep learningIndian Infotech 10.09.20251 DAY
14Karthi PRCYSAI Tools WorkshopTop Engineers 24.08.20251 DAY
15Jaya Prakash SCYSAI Tools WorkshopTop Engineers 24.08.20251 DAY
16Gokula Krishnan MCYSAI Tools WorkshopTop Engineers 24.08.20251 DAY


Internship Program Attended By Students

S.NoNameDeptCompany NameDateDuration
1Naveena RCYSMettur thermal power plant and expansion23/06/2025 – 11/07/20252 WEEK
2Neveen NCYSPhoenix Softech16/06/2025 – 02/7/202515 DAYS
3Nivas PCYSCode bind20/06/2025 – 07/07/202515 DAYS
4Pino Peter ACYSCode bind20/06/2025 – 07/07/202515 DAYS
5Poun kumar PCYSCode bind20/06/2025 – 07/07/202515 DAYS
6Prabu MCYSCode bind20/06/2025 – 07/07/202515 DAYS
7Prasanna SCYSCode bind20/06/2025 – 07/07/202515 DAYS
8Premkumar MCYSNew technology institutions16.06.2025 – 11.07.202625 DAYS
9Richvel pradeep JCYSE-soft31.06.2025 – 14.07.202515 DAYS
10Rithika SCYSMettur thermal power plant and expansion23/06/2025 – 11/07/20252 WEEK
11Rooso Sekuvera SCYSCodebind technologies11/07/2025 – 26/07/202515 DAYS
12Sanjai ACYSCodebind technologies11/07/2025 – 26/07/202515 DAYS
13Sanjay SCYSCodebind technologies20/06/2025 – 07/07/202515 DAYS
14Santhanasibi MCYSCodebind technologies11/07/2025 – 26/07/202515 DAYS
15Sathiya GCYSThinkinfo expert solutions23/06/2025 – 17/07/202525 DAYS
16Shushaanth SCYSNux software solution20/06/2025 – 05/07/202515 DAYS
17Sivaraman BCYSCode bind20/06/2025 – 07/07/202515 DAYS
18Sridhar MCYSNew technology institutions16/06/2025 – 11/07/202625 DAYS
19Sudharsan BCYSNux software solution20/06/2025 – 05/07/202515 DAYS
20Sudharsun SCYSCodebind technologies20/06/2025 – 07/07/202515 DAYS
21Sugumaran MCYSCodebind technologies20/06/2025 – 07/07/202515 DAYS
22Varuna KCYSThinkinfo expert solutions23/06/2025 – 17/07/202525 DAYS
23Veeraa Suriyaa BCYSHack up technology24/06/2025 – 12/07/202515 DAYS
24Aswath RCYSStock Market12/08/2025-21/08/202510 DAYS


Online courses

S.NoName of the StudentName of the ProgrammeVenue and DateName of the Event
1Sakthivel SIBM Block chain Foundation for DevelopersOnline
05.08.2024
Coursera
2Sakthivel SHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
3Parthasarathy SHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
4Tamilarasan SHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
5Ramana.BHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
6Samuel RHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
7Rohith PHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
8Manikandan AHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
9Sajith SHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
10Nandha Kumar KHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
11Vaishak SHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
12Lokesh GHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
13Lokesh SHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
14Sajith SHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
15Vasanthan JHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
16Vishvabharathi AHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
17Monash GHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
18Vinoth CHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
19Sethu Raja RHardware Projects Using Raspberry PiOnline
08.08.2024
EC-Council
20Naveen RajSQL Injection AttacksOnline
09.08.2024
EC-Council
21Nandhini NCyber security workshopOnline 10.08.2024EC-Council
22Sudharsan BCyber Security for Businesses – The Fundamental EditionOnline 10.08.2024TTUSECURITY PVT.LID
23Pino Peter AAndroid Bug Bounty Hunting: Hunt Like a RatOnline 10.08.2024EC-Council
24Ranjith BBuild Your Own Net app Storage LabOnline 10.08.2024EC-Council
25Sanjai AHardware Projects Using Raspberry PiOnline 10.08.2024EC-Council
26Keerthana KData science and Data AnalyticsOnline 10.08.2024EC-Council
27Kumarjeyanth KIntroduction to Networking For Cyber ProfessionalOnline
19.08.24
Zscaler
28Balamanikandan MCompTIA Pentest+ Training & LabOnline
21.08.24
Udemy
29Balamanikandan MRHCSA Training + LabOnline
21.08.24
Udemy
30Hariharan SAPI Security WorkshopOnline
23.08.24
APISEC UNIVERSITY
31Suryagandhan S VMobile App Development Using Android  StudioOffline 24/08/24Odugaatech pvt.Ltd
32Sudharsan KMobile App Development Using Android  StudioOffline 24/08/24Odugaatech pvt.Ltd
33Nanthess O RMobile App Development Using Android  StudioOffline 24/08/24Odugaatech pvt.Ltd
35Balamanikandan MEthical Hacking With PythonOnline
27.08.24
Udemy
36Gokul KOffensive Penetration TestingOnline
27.08.24
CYBRARY
37Sakthivel SEthical Hacking and Reverse EngineeringOnline 29.08.2024EC council


Webinar Attended

S.NoDateTopicResource PersonNo. of Participant
122.07.2023Introduction to Ethical Hacking & Kali LINUXMr.K.Kabilan, Mr.Sabarishan, Mr.Kumar Jeyanth, Mr.Akash60
224.07.2023How to Build a Successful Career in Cyber SecurityMs.Pooja Joshi120
311.08.2023Innovations in Cyber WorldMr.Benjamin Owusu Ansah120
48.9.2023MALWARE ANALYSISDr. M.B. Mukesh Krishnan ,Dr. V. Joseph Raymond ,Mr. M. Balaji.55
512.09.2023Artificial Neural Networks with Tested Usecases in Machine LearningDr. A.R. Kavitha60
616.9.2023How to Start a Business and Startup Grind with Successful LaunchMr. B. Mani Parthasarathy60
714.12.2023Deployment of Cyber Security in IOT ApplicationDr. P. Karuppsamy180
829.02.2024Converting Innovation into a StartupMr. S. Vivek50
927.03.2024Building Scalable Web Apps with ReactDr. K. Sathya120
1016.04.2024Safeguarding Against Digital Threats and Enhancing Digital WellbeingMr. M. VAIRAMUTHU
Cyber Security Mentor (Naan Mudhalvan – Tamil Nadu) &The Times of India Group
220


Online Courses Attended

S.NoName of the StudentDurationTitleOrganization
1Adhithya.G.Krishna07.03.2024REquirements for Certified Ethical HAckerEc Council
2V.shanmugam13.02.2023 – 16.06.2023WebdesignAsia university, Taiwan
3R.Kapilsurya13.02.2023 – 16.06.2023WebdesignAsia university, Taiwan
4Adhithya.G.Krishna07.08.2023Artificial IntelligenceAsia university, Taiwan
5Balamurugan S29.11.23 to 01.12.23Workshop on “Reverse Engineering in 3D Printing Technology used for Additive Manufacturing”Sathyabama Institute of Science and Technology
6Ganapathi M29.11.23 to 01.12.23Workshop on “Reverse Engineering in 3D Printing Technology used for Additive Manufacturing”Sathyabama Institute of Science and Technology
7Anuragee K21.03.24 to 22.03.24Workshop on “Deeplearning and neural networks ”Karpagam Institute of Tech,Coimbatore
8Gokulakannan R21.03.24 to 22.03.24Workshop on “Deeplearning and neural networks ”Karpagam Institute of Tech,Coimbatore
9Anushiya G M21.03.24 to 22.03.24Workshop on “Deeplearning and neural networks ”Karpagam Institute of Tech,Coimbatore
10Antony Wilson S22.03.24 to 23.03.24Workshop on “Vehicler  ad-hoc NetworkCIT coimbatore
11Chandru K22.03.24 to 23.03.24Workshop on “Vehicler  ad-hoc Network  ”CIT coimbatore
12Harikaran V22.03.24 to 23.03.24Workshop on “Vehicler  ad-hoc Network  ”CIT coimbatore
13Kaviyarasu R22.03.24 to 23.03.24Workshop on “Vehicler  ad-hoc Network  ”CIT coimbatore
14Ajmal26.03.24 to 27.03.24

Workshop on Augmented Reality

Bannari Amman Institute of Technology
15Anandhkumar26.03.24 to 27.03.24Workshop on Augmented RealityBannari Amman Institute of Technology
16Dhanush kumar26.03.24 to 27.03.24Workshop on Augmented RealityBannari Amman Institute of Technology
17Diwahar26.03.24 to 27.03.24Workshop on Augmented RealityBannari Amman Institute of Technology
18Ayathulla26.03.24 to 27.03.24Workshop on Augmented RealityBannari Amman Institute of Technology
19Ezhilarasan26.03.24 to 27.03.24Workshop on Augmented RealityBannari Amman Institute of Technology
20Kaliraj M27.03.24Workshop on Ethical HackingSSM Institute of Engg and Technology
21Berlin Jaish M27.03.24Workshop on Ethical HackingSSM Institute of Engg and Technology
22GuruPrasath B27.03.24Workshop on Embedded Systems and IOTHindusthan college of Engg and Technology , Coimbatore
23Arokiyaraj S13.04.24 -14.04.24Ethical Hacking and Data ScienceIIT HYDERABAD
24Arokiya Raj J04.05.24AWS and DockerKongu Engineering College, perundurai
25Kabilan K30.06.23Certified Ethical HackerSlytherin
26Kabilan K16.08.23Workshop on Ethical Hacking & Cybercrime InvestigationSlytherin EduTech Pvt Ltd
27Kabilan K13.0923Course on ”Leveraging ChatGPT for Smarter Cybersecurity”LinkedInLearning
28Kabilan K23.11.23Physical Security Design and ImplementationLinkedIn Learning
29Kabilan K22.12.2023Letter of Recommendataion for Excellence in InternshipCyber Security Forensic Solutions
30Kabilan K03.01.2024Emerging Security Threats & Safety MitigationsCentre for Cyber Security Studies and Research
31Kabilan K06-02-24Course on Cybersecurity Awarenesws : Cybersecurity TerminologyLinkedin Learning
32Kabilan K06-02-24Course on  Cybersecurity FoundationsLinkedin Learning
33Kabilan K07-02-24The Cybersecurity Threat LandscapeLinkedin Learning
34Kabilan K15.02.24Online Session”XXE External Entity”Center for Cyber Security Studies and  Research ,Unit of Secure Sphere Foundation
35Kabilan K28.01.24Online Session “Certified Linux File System Professional “Center for Cyber Security Studies and  Research ,Unit of Secure Sphere Foundation
36Kabilan K26.03.24TQI Ullas Confluence 2024PEC
37Kabilan K25.03.24Certification of  Analyst Cyber security Analyst Job SimulationOnline , Forage
38Kabilan K14.04.24Foundations of CyberSecurityCoursera
39Manoj Kumar S22.03.2024PCb Designing and FabricationECE association with IETI Students
40Manoj Kumar S29.12.2023Intro to Dark Web,Anonimity and CryptocurrencyEC-COUNCIL
41Manoj Kumar S03.04.2024Cybersecurity FundamentalsPaloalto
42Kumarjeyanth K30.03.2024Time ManagementInfosis Springboard
43Kumarjeyanth K30.03.2024Mastering Ethical HackingInfosis Springboard
44Kumarjeyanth K25.09.2023Deep Dive Into OSINTLinkedin Learning
45Kumarjeyanth K06.03.2024Learning SubnettingLinkedin Learning
46Kumarjeyanth K24.09.23SQL Injection AttacksEC-COUNCIL
47Kumarjeyanth K25.01.2024Cbersecurity Job SimulationFortage
S.NoName of Student(s)ClassTitleVenuePrize / PlaceDate
1S.ArulkumarIII CYSWorkshop – Blockchain and its TechnologyChennaiCertificate Received9/2/2023
2S.ArulkumarIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
3R.ArunIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
4Arun.III CYSUdemy Course – Certified Professional Ethical HackerOnlineCertificate Received26/2/2023
5M.BalamanikandanIII CYSWorkshop – Blockchain and its TechnologyChennaiCertificate Received9/2/2023
6S.BharanidharanIII CYSWorkshop – Data AnalysticsCoimbatoreCertificate Received17/2/2023
7M.BharanidharanIII CYSIntroduction to Ethical HackingOnlineCertificate Received18/3/2023
8M.DhanushIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
9D.Dharani III CYSWorkshop on Computer Forensics and Computer Crime InvestigationOffline- Karpagam College Of EngineeringCertificate Received18/2/2023
10D.DharaniIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
11.R.Dharshini III CYSTutelr WorkshopOfflineCertificate Received23/3/2023
12R.Dharshini III CYSUi Path  – RbiOfflineCertificate Received22/01/2023
13S.DhinakaranIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
14S.DhinakaranIII CYSLivewireOfflineCertificate Received17/3/2023
15S.DurgadeviIII CYSUi Path  – RbiOfflineCertificate Received22/01/2023
16S.DurgadeviIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
17R.Gokul III CYSWorkshop on Computer Forensics and Computer Crime InvestigationOffline- Karpagam College Of EngineeringCertificate Received18/2/2023
18R.Gokul III CYSTutelr WorkshopOfflineCertificate Received23/3/2023
19A.GowthamIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
20A.GowthamIII CYSLivewireOfflineCertificate Received17/3/2023
21S.HariharanIII CYSTCS Ion– Communication SkillOnlineCertificate Received9/11/2023
22S.Hariharan III CYSTutelr WorkshopOfflineCertificate Received23/3/2023
23R.HarikrishnanIII CYSTCS Ion– Communication SkillOnlineCertificate Received9/11/2023
24R.HarikrishnanIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
25M.Jana III CYSTutelr WorkshopOfflineCertificate Received23/3/2023
26M.Jana III CYSNPTEL – Ethical HackingOnlineCertificate Received28/4/2023
27S.JayasriIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
28S.JayasriIII CYSLivewireOfflineCertificate Received17/3/2023
29M.JeevananthamIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
30M.JeevananthamIII CYSLivewireOfflineCertificate Received17/3/2023
31R.KarthickIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
32R.KarthickIII CYSLivewireOfflineCertificate Received17/3/2023
33L.KumaresanIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
34L.KumaresanIII CYSFutureskillprime – Digital 101 JourneyOnlineCertificate Received30/1/2023
35K.KumarjeyanthIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
36M.MadhankumarIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
37M.MadhankumarIII CYSLivewireOfflineCertificate Received17/3/2023
38M.MukeshIII CYSWorkshop – Block chain and its TechnologyChennaiCertificate Received9/2/2023
39M.MukeshIII CYSInternship – Cyber SecurityOnlineCertificate Received28/2/2023
40B.NandhakumarIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
41M.NiranjaniIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
42M.NiranjaniIII CYSUi Path  – RbiOfflineCertificate Received22/01/2023
43M.NithiyanIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
44M.NithiyanIII CYSLivewireOfflineCertificate Received17/3/2023
45S.PrasanthIII CYSUi Path  – RbiOfflineCertificate Received22/01/2023
46S.PrasanthIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
47S.RajaIII CYSWorkshop On Computer Forensics And Computer Crime InvestigationOffline- Karpagam College Of EngineeringCertificate Received18/2/2023
48S.RajaIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
49R.RajmohanIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
50R.RajmohanIII CYSLivewireOfflineCertificate Received17/3/2023
51P.SabarishanIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
52P.Sabarishan III CYSUi Path  – RbiOfflineCertificate Received22/01/2023
53S.SabareeshIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
54S.SabareeshIII CYSUi Path  – RbiOfflineCertificate Received22/01/2023
55K.SakthiIII CYSLivewireOfflineCertificate Received17/3/2023
56K.Sakthi III CYSTutelr WorkshopOfflineCertificate Received23/3/2023
57K.Salmankhan III CYSTCS Ion– Communication SkillOnlineCertificate Received9/11/2023
58P.SanjayIII CYSLivewireOfflineCertificate Received17/3/2023
59P.SanjayIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
60S.Sricibi III CYSLivewireOfflineCertificate Received17/3/2023
61S.Sricibi III CYSTutelr WorkshopOfflineCertificate Received23/3/2023
62S.R.TharneeshIII CYSLivewireOfflineCertificate Received17/3/2023
63S.R.TharneeshIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
64A.P.ThivagarIII CYSInternship – Cyber SecurityOnlineCertificate Received28/2/2023
65A.P.ThivagarIII CYSTutelr WorkshopOfflineCertificate Received23/3/2023
66M.Vinothkumar III CYSLivewireOfflineCertificate Received17/3/2023
67M.Vinothkumar III CYSInternship – Cyber SecurityOnlineCertificate Received31/10/2022
S.NoName of Student(s)ClassTitleVenuePrize / PlaceDate
1M.BalamanikandanIIICYSInternship – Cyber SecurityOnlineCertificate Received31/10/2022
2S.HariharanIIICYSInternshala – Ethical HackingOnlineCertificate Received08/11/2022
3R.HarikrishnanIIICYSInternshala – Ethical HackingOnlineCertificate Received08/11/2022
4K.SalmankhanIIICYSInternshala – Ethical HackingOnlineCertificate Received08/11/2022
5K.KumarjeyanthIIICYSHackfixOnlineCertificate Received21/11/2022
6B.NandhakumarIIICYSAdvance Ethical HackingOnlineCertificate Received04/12/2021
7S.Sri Cibi IIICYSGoogle – Fundamental of Digital MarketingOnlineCertificate Received12/10/2022
S.NoName of Student(s)ClassTitleVenuePrize / PlaceDate
1K.Kabilan IICYSWireless Hacking ConceptsOnlineCourse Completed01.02.23
2V.SanjayIIICYSTwo Days National ConclaveOnlineParticipated03-04 Feb 23
3K.Kabilan IICYSCyber Warrior Course Given by CAPRICIOSEC UNIVERSITYOnlineParticipated19.02.23
4J.Jeyasenaadhi IIICYSCSR COURSE LIVEWIRE, NamakkalMCA LABSelected for CSR Course27.02.23
5K.Salmankhan IICYSCSR TEST LIVEWIRE NamakkalMCA LABSelected for CSR Course27.02.23
6M.Gokul Raj ICYSCSR TEST LIVEWIRE NamakkalMCA LABSelected for CSR27.02.23
7K.Salmankhan IICYSCyber Warrior Course Given by CAPRICIOSEC UNIVERSITYOnlineParticipated19.02.23
8S.R.Dharshini IIICYSHonours for imprinting creditworthy Proficiency in AcadamicsJayarani Matric Hr.Sec.School, SalemExcellence in AcadamicsJayarani Matric Hr.Sec.School, Salem

Department Toppers

Toppers List

S.NoNameBatch% of MarksPhoto
1Kiruthika Y2020-202389%
2Dharshini S R2020-202389%
3Manoj K2020-202388%
4Hariharan S2021-202491%
5Jana M2021-202489%
6PraveenKumar A2021-202490%

Academic Year 2023 - 2024

S.NoRegister NoName Of The StudentDepartment RankCGPAPhoto
120111026Kiruthika.YIst Rank9.05View
220111030Manoj.KIInd Rank8.80View
320111003Adhithya.TIIIrd Rank8.78View

Academic Year 2020 - 2021

S.No Register Number Name CGPA Classification Department Rank Position Photo
1 18601305 Divya.B 9.06 First Class 1 View
2 18601311 Nagajothi.R 8.91 First Class 2 View
3 18601301 Anusha.S 8.69 First Class 3 View
4 18601315 Santhiyamani.M 8.68 First Class 4 View

Value Added Courses

Academic Year 2023 - 2024
S.NoCourse NameTotal No of Students Participated
1Arduino Training6
2PHP and MySQL Training16
3Cpp Training4
4HTML Training4
S.NoName of the CourseNo. of Students EnrolledDuration
1Amazon Web Services512 weeks
S.NoName of the Course No. of Students EnrolledDuration
1IOS App Development482 weeks
S.NoName of the CourseNo. of Students EnrolledDuration
1Dye Penetration Testing422 weeks

Research & Development

Journal Publications

Academic year 2025 - 2026
S.NoName of the FacultyTitleName of the JournalDate of Publication, volume no.& Issue no
1Muthusamy PeriyasamyMultimodal Feature Fusion Using Optimal Transfer Learning
Approach for Lung Cancer Detection and Classification on CT Images
Journal of Intelligent Systems and Internet of ThingsVol. 12, No. 01, PP. 84-96, 2024
2Muthusamy PeriyasamyHarnessing DBSCAN and auto-encoder for hyper intrusion
detection in cloud computing
ScopusVol. 13, No. 5, October 2024, pp. 3345-3354
3Muthusamy PeriyasamyNetwork routing and scheduling architecture in a fully
distributed cloud computing environment
Indonesian Journal of Electrical Engineering and Computer ScienceVol. 36, No. 2, November 2024, pp. 1242-1252
4Muthusamy PeriyasamyNetwork routing and scheduling architecture in a fully distributed cloud computing environmentIndonesian Journal of Electrical Engineering and Computer Science2024
5Muthusamy PeriyasamyDecentralized energy optimization using blockchain with battery storage and electric vehicle networksScientific Reports2025
6Muthusamy PeriyasamyMachine learning boosts wind
turbine efficiency with smart failure
detection and strategic placement
Scientific Reports2025
7Muthusamy PeriyasamySecure and intelligent 5G-enabled remote patient monitoring using
ANN and Choquet integral fuzzy VIKOR
Scientific Reports2025
8Muthusamy PeriyasamyAHP VIKOR framework for selecting wind turbine materials with a focus on corrosion and efficiencyScientific Reports2024
9Loganathan RSupply Chain Attacks in CybersecurityIJEDR2025
10Loganathan RUNDERSTANDING CROSS-SITE SCRIPTING (XSS): TYPES, IMPACT,
AND PREVENTION STRATEGIES
IJIRT2024
11Loganathan RAnomaly Based Malware Detection Using Machine LearningIJRTI2024
12Loganathan RExploring the Dark Web: In-Depth AnalysisIJRASET2024
13Loganathan RDeveloping an NLP-Based System to Detect Phishing Attempts in Real-TimeIJARESM2024
14Loganathan RExploiting side-Channel Vulnerabilities in virtual cloud Environments:A Taxanomy of Emerging Threats and Countermeasures.IJFMR2025
15Loganathan RAI-Driven Predictive Models for Cryptographic Trading:Leveraging Deep Learning for Market TrendsJAAFR2025
16Loganathan RSmart Predictive Modeling For Malicious Url Detection And PreventionIREJ1712187
17Loganathan RInnovative Decision-Making in Engineering: The Role of Cognition, Heuristics, and Human FactorsDOI: 10.4018/979-8-3373-5702-7.ch011
18Mrs.J.VelumaniBook A Text book of BIG DATA ANAYTICS By RK publications (ISBN: 9788196040277)2023 Jan
19Mrs.J.VelumaniSOS Implementation With Camera FacilitiesInternational Journal of Engineering Technology and Management Sciences Website: ijetms.in Issue: 4Volume No.6 July – 2022 DOI:10.46647/ijetms.2022.v06i04.0079 ISSN: 2581-4621
20Mrs.J.VelumaniBrain Tumor Detection Using Skull-Stripping AlgorithmInternational Journal of Advanced Research in Computer Science Engineering and InformationTechnology Volume: 6 Issue: 3 Jun,2022,ISSN_NO: 2321-3337
21Mrs.J.VelumaniStock Price Prediction Using Machine LearningInternational Journal of Advanced Research in Computer Science Engineering and Information TechnologyVolume: 6, Issue: 3,Special Issue: 2 ,Jun,2022 ,ISSN_NO: 2321-3337
22Mrs.J.VelumaniEnhancing Breast Cancer Screening: Mammogram Image Analysis with Multiclass Support Vector MachineInternational Conference on Mobile Networks and Wireless Communications (ICMNWC)Published in: 2023 3rd
23Mrs.J.VelumaniDetecting Attackers During Quantum key Distribution in IoT Networks using Quantum-Based Secure and Lightweight Transmission

International Conference on Integrated Intelligence and Communiaction Systems(ICIICS)

 

Published in: 2023
24Mrs.J.VelumaniA Heart Disease Classification using an Improved Particle Swarm Optimization Algorithm with Support Vector Machine ClassifierInternational Conference on Integrated Intelligence and Communiaction Systems(ICIICS)Published in: 2023
25Mrs.J.VelumaniOnline Transaction Fraud Detection Using Backlogging on E-Commerce Websites2024 IJRTI| Volume 9, Issue 4 | ISSN: 2456-3315
26Mrs.J.VelumaniAutomatic Skin Cancer Segmentation and Classification using Fuzzy C-means Clustering-based Convolutional Neural NetworkInternational Conference on Integrated Intelligence and Communication Systems (ICIICS)

Published in: 2023

27Sathishkumar P
Chandrakala S
Phish-stop: Phishing detection pipeline using Email headers and LogsIRJETIRJET Volume 12 Issue 11
28Sathishkumar PWireless Penetrartion Testing and Security Analysis with ESP32IRJMETSIRJMETS, Volume 07,Issue 11, Nov 2025.
29Chandrakala.SZTrustChain: A Decentralized Zero Trust Framework for Adaptive AI Authentication Using Blockchain Synergy.IJIRMFDOIs:10.2015/IJIRMF/202511014
S.NoName of the FacultyTitleName of the JournalDate of Publication, volume no.& Issue no
1Dr.P.MuthusamyMultimodal Feature Fusion Using Optimal Transfer Learning Approach for Lung Cancer Detection and Classification on CT ImagesJournal of Intelligent Systems and Internet of Things Vol. 12, No. 01, PP. 84-96, 2024
2Dr.P.MuthusamyHarnessing DBSCAN and auto-encoder for hyper intrusion detection in cloud computing.BEEIVol. 13, No. 5, October 2024, pp. 3345-3354
3Dr.P.MuthusamyNetwork routing and scheduling architecture in a fully distributed cloud computing environment.Indonesian Journal of Electrical Engineering and Computer Science.Vol. 36, No. 2, November 2024, pp. 1242-1252
4Dr.P.MuthusamyDecentralized energy optimization using blockchain with battery storage and electric vehicle networks.Scientific ReportsArticle number: 5940 (2025)
5Dr.P.MuthusamyMachine learning boosts wind turbine efficiency with smart failure detection and strategic placementScientific ReportsArticle number: 1485 (2025)
6Dr.P.MuthusamySecure and intelligent 5G-enabled remote patient monitoring using ANN and Choquet integral fuzzy VIKORScientific ReportsArticle number: 9913 (2025)
7.Dr.P.MuthusamyAHP VIKOR framework for selecting wind turbine materials with a focus on corrosion and efficiencyScientific Reports24071 (2024)
8Loganathan RSupply Chain Attacks in CybersecurityIJEDRISSN:2321-9939, Vol.12, Issue 4, page no.86-91
9Loganathan RUnderstanding Cross-Site Scripting (Xss): Types, Impact, And Prevention StrategiesIJIRTVolume 11 Issue 7 | ISSN: 2349-6002
10Loganathan RAnomaly Based Malware Detection Using Machine LearningIJRTIVolume 9, Issue 9 | ISSN: 2456-3315
11Loganathan RExploring the Dark Web: In-Depth AnalysisIJRASETISSN: 2321-9653
12Loganathan RDeveloping an NLP-Based System to Detect Phishing
Attempts in Real-Time
IJARESMISSN: 2455-6211, Volume 12, Issue 11, November-2024
13Loganathan RExploiting side-Channel Vulnerabilities in virtual cloud Environments:A Taxanomy of Emerging Threats and Countermeasures.IJFMRVolume 7, Issue 1, January-February 2025
14Loganathan RAI-Driven Predictive Models for Cryptographic Trading:Leveraging Deep Learning for Market TrendsJAAFRVolume 3, Issue 2 February 2025 | ISSN: 2984-889X
S.NoName of the FacultyTitleName of the JournalDate of Publication, volume no.& Issue no
1Mr .R.Loganthan
ASP
Blockchain Cyber Security Vulnerabilities &Potential Conter MeasuresInternational Research Journal of Modernization in Engineering Technology and Science

Ref:IRJMETS/Certificate/Volume 05/
Issue 10/51000076419

2Mrs.J.Velumani.ASPJournal “A Heart disease Classification using an Improved particle swarm Optimization with Support Vector MachineIEEE,Scopus

Applied,Accepted,

https://ieeexplore.ieee.org/xpl/conhome
/10420831/proceeding

3Mrs.J.Velumani.ASPJournal “Skin Cancer Classification using Deep Learning”IEEE,Scopus

Applied,Accepted,https://ieeexplore.ieee.org
/xpl/conhome/10420831/proceeding

4Mrs.J.Velumani,ASPDetecting Attackers during quantum key distribution in IoT Networks using Quantum based Secure and lightweight TransmissionIEEE,Scopus

Applied,Accepted,https://ieeexplore.ieee.org
/xpl/conhome/10420831/proceeding

5Mrs.J.Velumani,ASPBreast Cancer Screening mammogram image Analysis with Multiclass Support Vector MachineIEEE,Scopus

Applied,Accepted,https://ieeexplore.ieee.org
/xpl/conhome/10420831/proceeding

6P. MuthusamyMultimodal Feature Fusion Using Optimal Transfer Learning Approach for Lung Cancer Detection and Classification on CT Images B.Journal of Intelligent Systems and Internet of Things

Volume. 12,

No. 01 February 25, 2024

7P. MuthusamyHarnessing DBSCAN and Auto-Encoder for Hyper Intrusion Detection in Cloud ComputingBulletin of Electrical Engineering and Informatics

Acceptance

Received

8R.K. PoongodiExploring the use of Computational Intelligence and Neuroscience in Enhancing Security and  PrivacyTIJER – International research Journal

ISSN:23499249

Volume 11, Issue 3,March 2024, Paper ID – TIJER2403052

9P.MuthusamyDesigning Smart Traffic Solutions: Sustainable Development and Healthcare Integration
(JES-112004)
The Journal of The Electrochemical Society

Acceptance

Received

10P.MuthusamyAir Quality Prediction in Smart Environment using Lightweight Residual Network: Sustainable Light – AirNet ApproachJournal of Environmental Nano
Technology
Acceptance
Received
11J.VelumaniOnline Transaction Fraud Detection Using Backlogging on-Ecommerce WebsitesInternational Journals For Research Trends And InnovationsApril 2024,vol no.9,issue no.4
12Mr .R.Loganthan
ASP
Tokenized Economy. The Rise Of Blockchain TokenInternational Journals For Research Trends And InnovationsApril 2024,vol no.9,issue no.4
13Mr .R.Loganthan
ASP
SCADA-A Manupulation Attacks An OverviewInternational Journal Of Research Publications And Reviews12 APR 2024,vol 5,issue 4
S.NoName of the AuthorTitle of the PaperName of the JournalISSN Number
1Dr.P.MuthusamyAn Efficient Automation for Agricultural Soil and Water Irrigation Using Machine Learning and Internet of ThingsIndian Journal of Agricultural Sciences1735-188X
2Dr.P.MuthusamyOptimizing Traffic Flow in Smart Cities: Soft GPU-Based Recurrent Neural Networks for Enhanced Congestion Prediction Using Deep LearningMDPI Sustainability2071-1050
3Dr.P.MuthusamyIntelligent Food Processing Industry Techniques using Artificial Intelligence and machine learningInternational Journal of Current Engineering and Scientific Research2394-0697
4Mrs.J.VelumaniStock Price Prediction using Machine LearningInternational journal of advanced research in computer science engineering and information technology2321 3337
5Mrs.J.VelumaniBrain Tumor Detection using Skull Stripping AlgorithmInternational journal of advanced research in computer science engineering and information technology2250-1770
6Mrs.J.VelumaniAutomatic traffic control system for ambulance using RF ModuleInternational Journal of Current Science2250-1770
7Mrs.J.VelumaniAutomated Virus Defect Detection in Fruits Using Image SegmentationInternational Journal of Advanced Research in Computer Science Engineering and Information Technology2321-3337
8Mrs.J.VelumaniSOS Implementation With Camera FacilitiesInternational Journal of Engineering Technology and Management Sciences2581-4621
9Mr.R.LoganathanFMRI Big Data Analytics in Machine LearningInternational journal of advanced research in computer science engineering and information technology2395-1052
S.NoName of the AuthorTitle of the PaperName of the JournalISSN Number
1Dr.P.MuthusamyTime Dependent Anomaly Detection System for Smart Environment using Probabilistic Timed Automaton with Artificial IntelligenceJournal of Ambient Intelligence and Humanized Computing – Springer1868-5137
2Dr.P.MuthusamyOptimal Confidential Mechanisms in Smart City HealthcareComputers, Materials & Continua, Tech Science Press1546-2226
S.NoName of the AuthorTitle of the PaperName of the JournalISSN Number
1Dr.P.MuthusamyDetection and Rectification of Cloned Node Intruder in Wireless Sensor NetworkMaterials Today: Proceedings2214-7853
2Dr.P.MuthusamyE-Restaurant using Artificial Intelligence for contactless dining to control the covid-19 outspreadInternational Journal of All Research Education and Scientific Methods (IJARESM)2455-6211
3Mr.R.LoganathanSarcasm Sentiment Detection and Classification Model on TwitterBioscience Biotechnology Research Communications2321-4007

Conference

Academic year 2022 - 2023
S.NoName of the AuthorTitle of the PaperTitle of the Proceeding of the ConferenceOrganized byPeriod
1Dr.P.MuthusamyA Cyber Security Model in Cloud Computing EnvironmentICATS 2023PEC17.3.2023 to 18.3.2023
2Dr.P.MuthusamyDigital Forensics (Evidence Handling) Using AutopsyICATS 2023PEC17.3.2023 to 18.3.2023
3Dr.P.MuthusamyIoT and Energy ManagementICATS 2023PEC17.3.2023 to 18.3.2023
4J.VelumaniAnalyzing Password StrengthICATS 2023PEC17.3.2023 to 18.3.2023
5J.VelumaniAutonomous Driving in Image ProcessingICATS 2023PEC17.3.2023 to 18.3.2023
6J.VelumaniA Review about Block Chain TechnologyICATS 2023PEC17.3.2023 to 18.3.2023
7J.VelumaniEthical Hacking: Impacts on SocietyICATS 2023PEC17.3.2023 to 18.3.2023
8R.LoganathanApplication of Cloud Computing in Banking and E-Commerce and Related Security ThreatsICATS 2023PEC17.3.2023 to 18.3.2023
9R.LoganathanPython-Based Malware Analysis PipelineICATS 2023PEC17.3.2023 to 18.3.2023
10R.LoganathanSurvey of Security AttacksICATS 2023PEC17.3.2023 to 18.3.2023
11R.LoganathanDeployment of Block Chain Technology In Software Defined NetworksICATS 2023PEC17.3.2023 to 18.3.2023
12R. RajalakshmiWeb Application Penetration TestingICATS 2023PEC17.3.2023 to 18.3.2023
13R.LoganathanBlock Chain Based Internet of Vehicles Information Transmission MechanismInternational Conference on Edge Computing and ApplicationsGnanamani College of Technology13.10.2022 to 15.10.2022
S.NoName of the AuthorTitle of the PaperTitle of the Proceeding of the ConferenceOrganized byPeriod
1J.VelumaniDiabetes Prediction Using Machine LearningICATS 2021PEC21.10.2021
2R.LoganathanFMRI Big Data Analytics in Machine LearningICATS 2021PEC21.10.2021

Patent Publications

Academic year 2024 - 2025
S.NoName of the FacultyTitleDate of PublicationPatent ID
1Dr.Muthusamy PIot And Machine Learning-Based System For Supporting Elderly Individuals In Daily Tasks07/5/2024202441035969 A
2Mrs.Ramya SSystem and Method for Secure Identity Verification Using Blockchain Technology11/4/2025202541035567 A
3Mr.Loganathan RSystem and Method for Secure Identity Verification Using Blockchain Technology11/4/2025202541035567 A
4Mrs.V.SinthujaSystem and Method for Secure Identity Verification Using Blockchain Technology11/4/2025202541035567 A
S.NoName of the FacultyTitleDate of PublicationPatent ID
1Dr.Muthusamy PSmart City Road Surface Defect Detection System Using IOT Sensors and
Deep Learning
27/03/2024202441024987 A
2Dr.Muthusamy PSmart Healthcare System For Brain Tumor Detection and Classification
Using IOT And Deep Learning
27/3/2024202441024988 A
3Dr.Muthusamy PSecure Data Sharing and Access Control System for IOT Healthcare Devices
Using Blockchain
27/3/2024202441024989 A
4Mr.R.LoganthanWeb3 Ethereum Transferring Web Applications using  Smart Contract17.10.2023202341070768
S.NoName of the PatentPatent NumberTitle of the Patent
1Dr.P.Muthusamy202341001643 ASystem and Methods for Controlling Virtual Mouse Using Hand Gesture using AI
2Mr.R.Loganathan202341001644 ADesign System of IoT-driven Smart Eco Inverter
S.NoName of the PatentPatent NumberTitle of the Patent
1Dr.P.Muthusamy202141059523Design System of Automated Microclimate Prediction System Using CNN and Internet of Things (IoT)
2Dr.P.Muthusamy202241009148IoT Driven Artificial Intelligence for Smart Food Recommendation to Health Management System
3Dr.P.Muthusamy202241029008IoT driven Sensor-based Crop Recommendation System using Machine Learning for Smart Agriculture
4Mr.R.Loganathan202241008752AI Based Voice Medical Prescription
5Mrs.J.Velumani202241008752 AAI Based Intelligent Traffic Delineation System
S.NoName of the PatentPatent NumberTitle of the Patent
1Dr.P.Muthusamy202111004765Information System for Contamination Water Quality Monitoring Using Cloud Based IOT
2Mr.R.Loganathan202241008753TRACKBOT: A quick Witted Robot for Detecting Cracks and Missing key in Railway Tracks with Unmanned Safeguard Gates
3Mr.R.Loganathan202041049010 AFarmers Helping Hand 2.0: A New Technological System for Monitoring and Protecting the Agricultural Field in All Weathers

Thrust Areas

S.NoName of the FacultyDesignationSpecialization / Area of Interest
1Dr.P.MuthusamyProfessor & HeadNetwork Security, Cloud, AI, ML
2J.VelumaniAssociate ProfessorAI, ML, Image Processing, Deep Learning
3R.LoganathanAssociate ProfessorBlockchain Technology, Penetration Testing
4R.RajalakshmiAssistant ProfessorML, NLP, Bigdata, Image Processing
5S.RamyaAssistant ProfessorBigdata, Blockchain Technology
6S.SuganyaAssistant ProfessorData Science, Bioinformatics