| Current Path : /var/www/html/venkat/ |
| Current File : //var/www/html/venkat/Venkat_IIIT.htm |
<html><head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<title>
Venkat/IIIT
</title>
</head>
<body>
<table bgcolor="lightgreen" border="1" width="100%">
<tbody><tr>
<td align="center" bgcolor="white">
<img src="Venkat_IIIT_files/iiita%2520logo.jpg" height="110" width="100">
</td>
<td align="center"><b>
Indian Institute of Information Technology,Allahabad
<br><font size="1">(A University Established under sec 3 of UGC Act, 1956 vide Notification <br>
No. F. 9-4/99-U.3 Dated 4/08/2000 of Govt. Of India)</font><br>
A Centre of Excellence in Information Technology, Established by Ministry Of H.R.D., Govt Of India <br>
Deoghat, Jhalwa, Allahabad-211012 (U.P.) <br>
Ph. (0532) 2922025 Fax : (0532) 2430006 / 2431689 <br>
E-mail :contact@iiita.ac.in & dr@iiita.ac.in
</b></td>
<td align="center" width="10%">
<img src="Venkat_IIIT_files/vs.png" height="160" width="150">
</td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td align="center">
<h1><b><font color="blue"><span><span id="dtx-highlighting-item" dtx-highlight-backgroundcolor="lime"> S.VENKATESAN </span></span></font></b> </h1></td>
</tr><tr>
</tr></tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Designation and Address </font> </i></b></td>
<td>
Assistant Professor <br> Division of MBA & Cyber Law and Information Security <br>
Room Number : 3216 <br>
Lecture Theatre <br>
Indian Institute of Information Technology,Allahabad <br>
Deoghat, Jhalwa, Allahabad-211012 (U.P.) <br>
Ph. : + 91 532 2922187 <br>
E-Mail : venkat@iiita.ac.in ,
venkalt_s@yahoo.co.in
</td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Education</font> </i></b><br></td><td><align="justify"><ul><li>
Ph.D. - Mobile Agent Security from Department of Computer Science and
Engineering at Anna University, Chennai,Tamilnadu, India in Feb. 2010.</li><li>
M.Tech. - Computer Science and Engineering from Bharath Institute of
Higher Education and Research University,Chennai, Tamilnadu, India in
2005.</li><li>
B.Tech. - Computer Science and Engineering from Sri Manakula Vinayagar
Engineering College affiliated with Pondicherry University, Pondicherry,
India in 2003. </li><li>
DCT - Diploma in Computer Technology from Adhiparasakthi Polytechnic, Tamilnadu, India in 2000. </li></ul></align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<br>
<b> <i><font color="lightred">Publications</font></i> </b> <br></td><td><align="justify">
<b>International Journals </b> <br> <ol><li>
Venkatesan S., Baskaran R., Chellappan C., Anurika Vaish and
Dhavachelvan P., "Artificial Immune System based Mobile Agent Platform Protection", accepted to publish in International Journal on Computer Standard and Interfaces, Elsevier
Standards.
</li><li>
Venkatesan S., Saleem Basha M.S., Chellappan C., Anurika Vaish and
Dhavachelvan, " Analysis of accounting models to detect duplicate
request in Web Service", accepted to publish in Journal of King Saud
University - Computer and Information Sciences, Elsevier Standards.
</li><li>
Venkatesan S., C Chellappan, T.Vengattaraman, P.Dhavachelvan and Anurika
Vaish (2010), 'Advanced Mobile Agent Security Models for Code Integrity
and Malicious Availability Check', International Journal of Computer
and Network Applications,Elsevier Standards, Vol No.33, pp.661-671. </li><li>
Venkatesan S., Chellappan C. and Dhavachelvan P.(2010), 'Performance
analysis of mobile agent failure recovery in E-Service applications',
International Journal on Computer Standard and Interfaces, Elsevier
Standards, Vol.32,No.1-2,pp.38-43.</li><li>
Venkatesan S. and Chellappan C. (2009), 'Free Roaming Mobile Agent
(FRoMA) Protection against Multiple Attacks', International Journal on
Communication Networks and Distributed Systems, Inderscience Publishers,
Vol. 3, No. 4, pp. 362-383. </li><li>
Venkatesan S. and Chellappan C. (2009), 'Generating Routing Table of
Free-Roaming Mobile Agent (FRoMA) in Distributed Environment',
International Journal on Computer standard and Interfaces, Elsevier
Standards, Vol. 31, No. 2, pp. 428-436. </li><li>
Venkatesan S. and Chellappan C. (2008), 'Inaugurating Free-Roaming
Mobile Agent (FRoMA) Based Secured e-Health Model', eHealth
International Journal, Vol. 4, No. 1, pp. 14-19. </li></ol>
<b>International Conferences </b><br><ol><li>
Venkatesan S. and Abhishek Vaish. (2011), 'Multi-Agent based Dynamic
Data Integrity protection in cloud computing', Proceedings of the
International Conference on Advances in Communication, Network, and
Computing- CNC 2011,Bangalore,Volume 142, part 1, pp. 76-82.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Identifying the Split
Personality of the Malicious Host in the Mobile Agent Environment',
Proceedings of the 2008 IEEE International Conference on Intelligent
Systems, Bulgaria, pp. 14-40 to 14-44.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Mobile Agent
Platform through Attack Identification Scanner (AIS) by Malicious
Identification Police (MIP)', Proceedings of the IEEE International
Conference on Emerging Trends in Engineering and Technology,
(ICETET'2008), India, pp. 1228-1231.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Malicious Host to
Host Attack in the Free Roaming Mobile Agent (FRoMA) Environment',
Proceedings of the ACM International Conference on Advances in Computing
(ICAC 2008), India, pp. 1-4.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Performance of Protecting Free
Roaming Mobile agent against Multiple Colluded Attacks', Proceedings of
the IEEE International Conference on Advances in Computer Vision and
Information Technology(ACVIT'07), India, pp. 16-24. </li><li>
Venkatesan S. and Chellappan C. (2007), 'Protecting Free Roaming Mobile
Agent against Multiple Colluded Truncation Attacks', ACM Proceedings of
International Conference on Mobile Multimedia
Communication(MobiMedia'07), Greece, pp. 293-297.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Recovery model for Free Roaming
Mobile Agent against Multiple Attacks', ACM Proceedings of
International Conference on Mobile Multimedia Communication
(MobiMedia'07), Greece, pp. 275-279. </li><li>
Venkatesan S. and Kalaivany A.N. (2006), 'Autonomous Scattered
Firewall', Proceedings of 1st International Conference on Intelligent
System and Control(ISCO'06), Coimbatore, India. </li></ol>
<b>Book Chapters </b><br><ol><li>
Venkatesan S. Chellappan C. Dhavachelvan P.(2012), 'Recovery of
Ubiquitous Multimedia Content Discovery Mobile Agent', published in the
book named Ubiquitous Multimedia and Mobile Agents: Models and
Implementations, Editor: Susmit Bagchi IGI Global Publishing Service,
USA.pp.215-231.</li><li>
Venkatesan S. Chellappan C. Anurika Vaish (2012), 'Mobile Agent based
Multimedia Content Discovery', published in the book named Ubiquitous
Multimedia and Mobile Agents: Models and Implmentations, Editor: Susmit
Bagchi, IGI Global Publishing Service, USA. pp.135-147.</li></ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Experience</font></i></b><br></td><td><align="justify"><ol><li>
Research: 2.2 Years in Collaborative Directed Basic research on Smart
and Secure Environment (SSE) project funded by National Technical
Research Organization (NTRO), New Delhi as Research/Scientific
Associate. </li><li>
Teaching: 4.4 Years (subject interest: Network and Security). </li></ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Software Development</font></i> </b> <br></td><td><align="justify"><ol><li>
Digital Display Content Copying Protection for Smart and Secure
Environment project funded by National Technical Research Organization,
New Delhi </li><li>
Online Examination System for Smart and Secure Environment project
funded by National Technical Research Organization, New Delhi. </li></ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<b> <i><font color="lightred">Courses Teaching</font></i> </b> <br></td><td><align="justify"><ol><li>
Business Continuity Plannaing and Disaster Recovery Planning</li><li>
Network Security </li><li>
Security Architecture</li><li>
Database Management System</li><li>
Authentication Protocol</li></ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Research Area</font></i> </b> </td><td><align="justify">
<ol><li>Mobile Agent Security </li><li>
Cryptography</li><li>
Information Centric Networking</li><li>
Cloud Computing and Social Network Privacy</li> </ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Papers Reviewed in </font></i> </b> </td><td><align="justify"><ol>
<li>IEEE transaction on System, Man and Cybernetics: Part C.</li> <li>
International Journal of Network and Applications (Elsevier). </li><li>
International Journal of Applied Mathematics and Computation (Elsevier). </li><li>
International Journal on NETNOMICS: Economic Research and Electronic Networking (Springer). </li><li>
International Conference on ICADIWT 08 and ICADIWT 09. </li><li>
International Conference on NDT 09. </li></ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%"><center>
<a href="http://www.iiita.ac.in/"> IIITA HOME </a></center>
</td>
<td align="center">
<img src="Venkat_IIIT_files/sword.jpg" height="120" width="120">
</td>
<td width="20%"><center><font color="blue">
<img src="Venkat_IIIT_files/bouquet.jpg" height="70" width="70">
Greetings and Thanks to my Parents, Professors and to my Friends</font></center><font color="blue">
</font></td>
</tr><tr>
</tr></tbody></table>
</body></html>