Your IP : 216.73.216.40


Current Path : /var/www/html/venkat/
Upload File :
Current File : /var/www/html/venkat/Venkat_IIIT.htm

<html><head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<title>
Venkat/IIIT
</title>
</head>
<body>

<table bgcolor="lightgreen" border="1" width="100%">
<tbody><tr>
<td align="center" bgcolor="white">
<img src="Venkat_IIIT_files/iiita%2520logo.jpg" height="110" width="100">
</td> 
<td align="center"><b>
Indian Institute of Information Technology,Allahabad 
<br><font size="1">(A University Established under sec 3 of UGC Act, 1956 vide Notification <br>
No. F. 9-4/99-U.3 Dated 4/08/2000 of Govt. Of India)</font><br>
A Centre of Excellence in Information Technology, Established by Ministry Of H.R.D., Govt Of India <br>
Deoghat, Jhalwa, Allahabad-211012 (U.P.) <br>
Ph. (0532) 2922025 Fax : (0532) 2430006 / 2431689 <br>
E-mail :contact@iiita.ac.in &amp; dr@iiita.ac.in 
</b></td>

<td align="center" width="10%">
<img src="Venkat_IIIT_files/vs.png" height="160" width="150">
</td>
</tr>
</tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td align="center">
<h1><b><font color="blue"><span><span id="dtx-highlighting-item" dtx-highlight-backgroundcolor="lime"> S.VENKATESAN </span></span></font></b> </h1></td>
</tr><tr>
</tr></tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Designation and Address </font> </i></b></td>
<td>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Assistant Professor <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Division of MBA &amp; Cyber Law and Information Security  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Room Number : 3216 <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lecture Theatre <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Indian Institute of Information Technology,Allahabad <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Deoghat, Jhalwa, Allahabad-211012 (U.P.) <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ph. : +  91 532 2922187 <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;E-Mail : venkat@iiita.ac.in ,
venkalt_s@yahoo.co.in

</td>
</tr>
</tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Education</font>  </i></b><br></td><td><align="justify"><ul><li>
Ph.D. - Mobile Agent Security from Department of Computer Science and 
Engineering at Anna University, Chennai,Tamilnadu, India in Feb. 2010.</li><li>
M.Tech. -  Computer Science and Engineering from Bharath Institute of 
Higher Education and Research University,Chennai, Tamilnadu, India in 
2005.</li><li>
B.Tech. -  Computer Science and Engineering from Sri Manakula Vinayagar 
Engineering College affiliated with Pondicherry University, Pondicherry,
 India in 2003. </li><li>
DCT - Diploma in Computer Technology from Adhiparasakthi Polytechnic, Tamilnadu, India in 2000. </li></ul></align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<br>
<b> <i><font color="lightred">Publications</font></i> </b> <br></td><td><align="justify">
<b>International Journals </b> <br> <ol><li>
Venkatesan S., Baskaran R., Chellappan C., Anurika Vaish and 
Dhavachelvan P., "Artificial Immune System based Mobile Agent Platform Protection", accepted to publish in International Journal on Computer Standard and Interfaces, Elsevier 
Standards.
</li><li>
Venkatesan S., Saleem Basha M.S., Chellappan C., Anurika Vaish and 
Dhavachelvan, " Analysis of accounting models to detect duplicate 
request in Web Service", accepted to publish in Journal of King Saud 
University - Computer and Information Sciences, Elsevier Standards.
</li><li>
Venkatesan S., C Chellappan, T.Vengattaraman, P.Dhavachelvan and Anurika
 Vaish (2010), 'Advanced Mobile Agent Security Models for Code Integrity
 and Malicious Availability Check', International Journal of Computer 
and Network Applications,Elsevier Standards, Vol No.33, pp.661-671. </li><li>
Venkatesan S., Chellappan C. and Dhavachelvan P.(2010), 'Performance 
analysis of mobile agent failure recovery in E-Service applications', 
International Journal on Computer Standard and Interfaces, Elsevier 
Standards, Vol.32,No.1-2,pp.38-43.</li><li>
Venkatesan S. and Chellappan C. (2009), 'Free Roaming Mobile Agent 
(FRoMA) Protection against Multiple Attacks', International Journal on 
Communication Networks and Distributed Systems, Inderscience Publishers,
 Vol. 3, No. 4, pp. 362-383. </li><li>
Venkatesan S. and Chellappan C. (2009), 'Generating Routing Table of 
Free-Roaming Mobile Agent (FRoMA) in Distributed Environment', 
International Journal on Computer standard and Interfaces, Elsevier 
Standards, Vol. 31, No. 2, pp. 428-436. </li><li>
Venkatesan S. and Chellappan C. (2008), 'Inaugurating Free-Roaming 
Mobile Agent (FRoMA) Based Secured e-Health Model', eHealth 
International Journal, Vol. 4, No. 1, pp. 14-19. </li></ol>

 

<b>International Conferences </b><br><ol><li>
Venkatesan S. and Abhishek Vaish. (2011), 'Multi-Agent based Dynamic 
Data Integrity protection in cloud computing', Proceedings of the 
International Conference on Advances in Communication, Network, and 
Computing- CNC 2011,Bangalore,Volume 142, part 1, pp. 76-82.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Identifying the Split 
Personality of the Malicious Host in the Mobile Agent Environment', 
Proceedings of the 2008 IEEE International Conference on Intelligent 
Systems, Bulgaria, pp. 14-40 to 14-44.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Mobile Agent 
Platform through Attack Identification Scanner (AIS) by Malicious 
Identification Police (MIP)', Proceedings of the IEEE International 
Conference on Emerging Trends in Engineering and Technology,
(ICETET'2008), India, pp. 1228-1231.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Malicious Host to
 Host Attack in the Free Roaming Mobile Agent (FRoMA) Environment', 
Proceedings of the ACM International Conference on Advances in Computing
 (ICAC 2008), India, pp. 1-4.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Performance of Protecting Free 
Roaming Mobile agent against Multiple Colluded Attacks', Proceedings of 
the IEEE International Conference on Advances in Computer Vision and 
Information Technology(ACVIT'07), India, pp. 16-24. </li><li>
Venkatesan S. and Chellappan C. (2007), 'Protecting Free Roaming  Mobile
 Agent against Multiple Colluded Truncation Attacks', ACM Proceedings of
 International Conference on Mobile Multimedia 
Communication(MobiMedia'07), Greece, pp. 293-297.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Recovery model for Free Roaming
 Mobile Agent against Multiple Attacks', ACM Proceedings of 
International Conference on Mobile Multimedia Communication 
(MobiMedia'07), Greece, pp. 275-279. </li><li>
Venkatesan S. and Kalaivany A.N. (2006), 'Autonomous Scattered 
Firewall', Proceedings of 1st International Conference on Intelligent 
System and Control(ISCO'06), Coimbatore, India. </li></ol>




<b>Book Chapters </b><br><ol><li>
Venkatesan S. Chellappan C. Dhavachelvan P.(2012), 'Recovery of 
Ubiquitous Multimedia Content Discovery Mobile Agent', published in the 
book named Ubiquitous Multimedia and Mobile Agents: Models and 
Implementations, Editor: Susmit Bagchi IGI Global Publishing Service, 
USA.pp.215-231.</li><li> 
Venkatesan S. Chellappan C. Anurika Vaish (2012), 'Mobile Agent based 
Multimedia Content Discovery',  published in the book named Ubiquitous 
Multimedia and Mobile Agents: Models and Implmentations, Editor: Susmit 
Bagchi, IGI Global Publishing Service, USA. pp.135-147.</li></ol>
</align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Experience</font></i></b><br></td><td><align="justify"><ol><li>
Research: 2.2 Years in Collaborative Directed Basic research on Smart 
and Secure Environment (SSE) project funded by National Technical 
Research Organization (NTRO), New Delhi as Research/Scientific 
Associate. </li><li>
Teaching: 4.4 Years (subject interest: Network and Security). </li></ol>
</align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Software Development</font></i> </b> <br></td><td><align="justify"><ol><li>
Digital Display Content Copying Protection for Smart and Secure 
Environment project funded by National Technical Research Organization, 
New Delhi </li><li>
Online Examination System for Smart and Secure Environment project 
funded by National Technical Research Organization, New Delhi. </li></ol>

</align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<b> <i><font color="lightred">Courses Teaching</font></i> </b> <br></td><td><align="justify"><ol><li>
Business Continuity Plannaing and Disaster Recovery Planning</li><li>
Network Security </li><li>
Security Architecture</li><li>
Database Management System</li><li>
Authentication Protocol</li></ol>



</align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Research Area</font></i> </b> </td><td><align="justify">
<ol><li>Mobile Agent Security </li><li>
Cryptography</li><li>
Information Centric Networking</li><li>
Cloud Computing and Social Network Privacy</li> </ol>
</align="justify"></td>
</tr>
</tbody></table>

<table border="1" width="100%">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Papers Reviewed in </font></i> </b>  </td><td><align="justify"><ol>
      <li>IEEE transaction on System, Man and Cybernetics: Part C.</li> <li>
International Journal of Network and Applications (Elsevier). </li><li>
International Journal of Applied Mathematics and Computation (Elsevier). </li><li>
	International Journal on NETNOMICS: Economic Research and Electronic Networking (Springer). </li><li>
	International Conference on  ICADIWT 08 and ICADIWT 09. </li><li>
International Conference on  NDT 09. </li></ol>

</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%">
<tbody><tr>
<td width="20%"><center>
<a href="http://www.iiita.ac.in/"> IIITA HOME </a></center>
</td>

<td align="center">
<img src="Venkat_IIIT_files/sword.jpg" height="120" width="120">
</td>
<td width="20%"><center><font color="blue">
<img src="Venkat_IIIT_files/bouquet.jpg" height="70" width="70">
Greetings and Thanks to my Parents, Professors and to my Friends</font></center><font color="blue">
</font></td>
</tr><tr>
</tr></tbody></table>


</body></html>