Back close
Dr-Gireesh-Kumar-T_asst-professor_tifac-core_cybersecurity_engineering_amritauniversity_coimbatore

Dr. Gireeshkumar T.

Professor, School of Computing, Coimbatore

Qualification: B. Tech., M.Tech., Ph.D
t_gireeshkumar@cb.amrita.edu
Google Scholar Profile
Research Interest: Security and Privacy issues in health care and LLM models, Malware Analysis, Machine Learning for Cyber Security, Differential Privacy

Bio

Dr. Gireesh Kumar T. currently serves as Professor at School of Computing, Coimbatore Campus. His areas of research include Security and Privacy issues in health care and LLM models, Malware Analysis, Machine Learning for Cyber Security, Differential Privacy.

Publications

Journal Article

Year : 2024

A Multi-class Classification for Detection of IoT Network Attacks Using Machine Learning Models

Cite this Research Publication : Vaisakhkrishnan, K., Ashok, G., Mishra, P., & Kumar, T. G. (2024). Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT. Procedia Computer Science, 235, 2498-2507

Publisher : Procedia Computer Science

Year : 2024

Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT.

Cite this Research Publication : Vaisakhkrishnan, K., Ashok, G., Mishra, P., & Kumar, T. G. (2024). Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT. Procedia Computer Science, 235, 2498-2507

Publisher : Procedia Computer Science

Year : 2024

VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks

Cite this Research Publication : Lakshmi, Vimitha R. Vidhya, and T. Gireesh Kumar. "VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks."Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), volume: 15, number: 1,2024

Publisher : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA

Year : 2023

Energy efficient machine learning based SMART-A-BLE implemented wireless battery management system for both hybrid electric vehicles and battery electric vehicles

Cite this Research Publication : Pannerselvam, S., Narayanan, V., & Kumar, T. G. (2023). Energy efficient machine learning based SMART-A-BLE implemented wireless battery management system for both hybrid electric vehicles and battery electric vehicles. Procedia Computer Science, 218, 235-248

Publisher : Procedia Computer Science

Year : 2023

Detection of network attacks using machine learning and deep learning models

Cite this Research Publication : Dhanya, K. A., Vajipayajula, S., Srinivasan, K., Tibrewal, A., Kumar, T. S., & Kumar, T. G. (2023). Detection of network attacks using machine learning and deep learning models. Procedia Computer Science, 218, 57-66

Publisher : Procedia Computer Science

Year : 2023

Automatic face enhancement technique using sigmoid normalisation based on single scale Retinex algorithm

Cite this Research Publication : Baskar, A., & Kumar, T. G. (2023). Automatic face enhancement technique using sigmoid normalisation based on single scale Retinex algorithm. International Journal of Advanced Intelligence Paradigms, 26(1), 1-13

Publisher : International Journal of Advanced Intelligence Paradigms

Year : 2023

Obfuscated Malware detection using Machine Learning models

Cite this Research Publication : Balasubramanian, K. M., Vasudevan, S. V., Thangavel, S. K., Kumar, G., Srinivasan, K., Tibrewal, A., &Vajipayajula, S. (2023, July). Obfuscated Malware detection using Machine Learning models. In 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-8). IEEE

Publisher : IEEE

Year : 2023

Comparative analysis of deep learning and machine learning models for network intrusion detection

Cite this Research Publication : Dharaneish, V. C., Kumar, N., Kumar, G., &Vajipayajula, S. (2023, July). Comparative analysis of deep learning and machine learning models for network intrusion detection. In 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-13). IEEE

Publisher : IEEE

Year : 2023

Edge Computing Based Secure Healthcare System

Cite this Research Publication : Souganthika, G., Gireesh Kumar, and N. Radhika. "Edge Computing Based Secure Healthcare System." 2023 Innovations in Power and Advanced Computing Technologies (i-PACT). IEEE, 2023

Publisher : IEEE

Year : 2023

A vision system to assist visually challenged people for face recognition using multi-task cascaded convolutional neural network (MTCNN) and local binary pattern (LBP)

Cite this Research Publication : Baskar, A., Kumar, T. G., &Samiappan, S. (2023).
. Journal of Ambient Intelligence and Humanized Computing, 14(4), 4329-4341

Publisher : Journal of Ambient Intelligence and Humanized Computing,

Year : 2023

Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN

Cite this Research Publication : Dhanya, K. A. Gireesh Kumar T" Obfuscated malware detection in iot android applications using markov images and cnn. IEEE Syst. J., 1–11 (2023)." (2023)

Publisher : IEEE

Year : 2022

A machine learning and deep neural network approach in industrial control systems

Cite this Research Publication : Ribu Hassini, S., Gireesh Kumar, T., & Kowshik Hurshan, S. (2022). A machine learning and deep neural network approach in industrial control systems. In ICT Analysis and Applications (pp. 525-536). Springer Singapore

Publisher : Springer

Year : 2022

Smart farming based on AI, edge computing and IoT

Cite this Research Publication : Kumar, G., & Shashank, K. V. (2022, September). Smart farming based on AI, edge computing and IoT. In 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 324-327). IEEE

Publisher : IEEE

Year : 2021

An efficient data hiding technique in image using binary Hamming code along with particle swarm optimisation

Cite this Research Publication : Malathi, P., & Kumar, T. G. (2021). An efficient data hiding technique in image using binary Hamming code along with particle swarm optimisation. International Journal of Intelligent Systems Technologies and Applications, 20(2), 167-181

Year : 2020

String Reduced Dimensional Representation of Spatial Trajectory for Clustering

Cite this Research Publication : B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “String Reduced Dimensional Representation of Spatial Trajectory for Clustering”, 2020.

Publisher : (2020)

Year : 2020

Maximizing the Embedding Efficiency Using Linear Block Codes in Spatial and Transform Domains

Cite this Research Publication : Malathi P., M, A. Sridhar, Paliwal, A., and Dr. Gireesh K. T., “Maximizing the Embedding Efficiency Using Linear Block Codes in Spatial and Transform Domains”, Procedia Computer Science, vol. 167, pp. 302-312, 2020.

Publisher : Procedia Computer Science

Year : 2020

An Ensemble Approach For Algorithmically Generated Domain Name Detection Using Statistical And Lexical Analysis

Cite this Research Publication : M. P. Anand, Dr. Gireesh K. T., and Charan, P. V. Sai, “An Ensemble Approach For Algorithmically Generated Domain Name Detection Using Statistical And Lexical Analysis”, Procedia Computer Science, vol. 171, pp. 1129-1136, 2020.

Publisher : Procedia Computer Science

Year : 2020

Socialized Proficient Routing in Opportunistic Mobile Network Using Machine Learning Techniques

Cite this Research Publication : V. Lakshmi and Dr. Gireesh K. T., “Socialized Proficient Routing in Opportunistic Mobile Network Using Machine Learning Techniques”, International Journal of Intelligent Engineering and Systems, vol. 13, pp. 434-445, 2020.

Publisher : International Journal of Intelligent Engineering and Systems

Year : 2020

Future Engineering Curricula: Balancing Domain Competence with CPS Readiness

Cite this Research Publication : B. B. Nair, Ram, D. S. H., Manoj Kumar Panda, Balaji, A. J., Dr. Gireesh K. T., and Mohan, V., “Future Engineering Curricula: Balancing Domain Competence with CPS Readiness”, IEEE Design Test, vol. 37, pp. 16-23, 2020.

Publisher : IEEE Design Test

Year : 2019

String based Feature Representation for Trajectory Clustering

Cite this Research Publication : B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “String based Feature Representation for Trajectory Clustering ”, International Journal of Embedded and Real-Time Communication Systems (IJERTCS), vol. 10, no. 2, pp. 1-18, 2019.

Publisher : International Journal of Embedded and Real-Time Communication Systems (IJERTCS)

Year : 2019

Ransomware Analysis Using Reverse Engineering

Cite this Research Publication : S. Naveen and Dr. Gireesh K. T., “Ransomware Analysis Using Reverse Engineering”, Communications in Computer and Information Science, vol. 1046, pp. 185-194, 2019.

Publisher : Communications in Computer and Information Science

Year : 2019

Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions

Cite this Research Publication : V. R. Vidhya Lakshmi and Dr. Gireesh K. T., “Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions”, International Journal of Electrical and Computer Engineering, vol. 9, no. 2, pp. 1145-1152, 2019.

Publisher : International Journal of Electrical and Computer Engineering

Year : 2019

Efficient Android Malware Scanner using Hybrid Analysis

Cite this Research Publication : K. A. Dhanya and Dr. Gireesh K. T., “Efficient Android Malware Scanner Using Hybrid Analysis”, International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. e-5S3, 2019.

Publisher : International Journal of Recent Technology and Engineering (IJRTE)

Year : 2019

Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks

Cite this Research Publication : P. V. Sai Charan, Dr. Gireesh K. T., and P. Anand, M., “Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks”, Communications in Computer and Information Science, vol. 985, pp. 45-54, 2019.

Publisher : Communications in Computer and Information Science

Year : 2018

Static and Dynamic Analysis for Android Malware Detection

Cite this Research Publication : K. Sugunan, Dr. Gireesh K. T., and Dhanya, K. A., “Static and Dynamic Analysis for Android Malware Detection”, Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing, vol. 645, pp. 147-155, 2018.

Publisher : Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing

Year : 2018

Clustering of trajectory data using hierarchical approaches

Cite this Research Publication : B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “Clustering of trajectory data using hierarchical approaches”, Lecture Notes in Computational Vision and Biomechanics, vol. 28, pp. 215-226, 2018.

Publisher : Lecture Notes in Computational Vision and Biomechanics

Year : 2017

Mobile social networks: Architecture, privacy, security issues and solutions

Cite this Research Publication : V. R. Vidhya Lakshmi and T. Kumar, G., “Mobile social networks: Architecture, privacy, security issues and solutions”, Journal of Communications, vol. 12, pp. 524-531, 2017.

Publisher : Journal of Communications, Engineering and Technology Publishing,

Year : 2017

A framework for dynamic malware analysis based on behavior artifacts

Cite this Research Publication : T. G. Gregory Paul and Dr. Gireesh K. T., “A framework for dynamic malware analysis based on behavior artifacts”, Advances in Intelligent Systems and Computing, vol. 515, pp. 551-559, 2017.

Publisher : Advances in Intelligent Systems and Computing

Year : 2017

A computational approach to determine shielding effectiveness of carbon nanotube-based nanocomposites for EMC application

Cite this Research Publication : S. S. Prabhu, Bhavani, R., Dr. Gireesh K. T., and Dr. T. Rajagopalan, “A computational approach to determine shielding effectiveness of carbon nanotube-based nanocomposites for \EMC\ application”, Computational Materials Science, vol. 126, pp. 400 - 406, 2017.

Publisher : Computational Materials Science

Year : 2016

Privilege-based scoring system against cross-site scripting using machine learning

Cite this Research Publication : N. S. Sunder and Dr. Gireesh K. T., “Privilege-based scoring system against cross-site scripting using machine learning”, Advances in Intelligent Systems and Computing, vol. 394, pp. 591-598, 2016

Publisher : Advances in Intelligent Systems and Computing

Year : 2014

A Novel Cloud Based NIDPS for Smartphones

Cite this Research Publication : V. A. Pandian and Dr. Gireesh K. T., “A Novel Cloud Based NIDPS for Smartphones”, Communications in Computer and Information Science, vol. 420 CCIS, pp. 473-484, 2014.

Publisher : Communications in Computer and Information Science

Year : 2012

Tracking of nose tip: An alternative for mouse

Cite this Research Publication : Dr. Gireesh K. T., Poornaselvan, K. Jb, ,, ,, and Sreevathsan, Ra, “Tracking of nose tip: An alternative for mouse”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6411 LNCS, pp. 219-225, 2012.

Publisher : Lecture Notes in Computer Science

Year : 2011

Steganalysis for calibrated and lower embedded uncalibrated images

Cite this Research Publication : D. D. Shankar, Dr. Gireesh K. T., and Nath, H. V., “Steganalysis for calibrated and lower embedded uncalibrated images”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7077 LNCS, pp. 294-301, 2011.

Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Year : 2011

Cognitive environment for pervasive learners

Cite this Research Publication : S. Sharma, Sreevathsan, R., Srikanth, M. V. V. N. S., Harshith, C., and Dr. Gireesh K. T., “Cognitive environment for pervasive learners”, Communications in Computer and Information Science, vol. 191 CCIS, pp. 506-515, 2011.

Publisher : Communications in Computer and Information Science

Year : 2010

Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine

Cite this Research Publication : P. P. Amritha, Madathil, A., and Dr. Gireesh K. T., “Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine”, Communications in Computer and Information Science, vol. 101, pp. 638-640, 2010.

Publisher : Communications in Computer and Information Science

Year : 2010

Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces

Cite this Research Publication : JaDivya Udayan, Dr. Gireesh K. T., John, R. Mc, Poornaselvan, K. Jd, and Lakshmanan, S. Aa, “Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces”, Communications in Computer and Information Science, vol. 101, pp. 602-605, 2010.

Publisher : Communications in Computer and Information Science

Year : 2010

Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.

Cite this Research Publication : Dr. Gireesh K. T., Poornaselvan, K. J., and Dr. M. Sethumadhavan, “Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.”, Defence Science Journal, vol. 60, no. 4, pp. 387-391, 2010.

Publisher : Defence Science Journal

Conference Paper

Year : 2024

Enhancing Power Grid Security by Detecting Relay Setting Manipulation Attacks with Machine Learning.

Cite this Research Publication : Varghese, S. R. J., Venu, A., Chandrakala, K. V., Kumar, T. G., & Shankar, V. A. (2024, May). Enhancing Power Grid Security by Detecting Relay Setting Manipulation Attacks with Machine Learning. In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT) (pp. 1-6). IEEE.

Publisher : 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)

Year : 2022

Performance assessment of IDS based on CICIDS-2017 dataset

Cite this Research Publication : Priyanka, V., & Gireesh Kumar, T. (2022). Performance assessment of IDS based on CICIDS-2017 dataset. In Information and Communication Technology for Competitive Strategies (ICTCS 2020) ICT: Applications and Social Interfaces (pp. 611-621). Springer Singapore

Publisher : Springer

Year : 2022

Analysis of Deep Steganography Robustness Using Various Loss Functions

Cite this Research Publication : Chekatamala, V., Malathi, P., & Kumar, G. (2022, May). Analysis of Deep Steganography Robustness Using Various Loss Functions. In 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 148-153). IEEE

Publisher : IEEE

Year : 2021

multi class classification for detection of IoT botnet malware

Cite this Research Publication : Chunduri, H., Gireesh Kumar, T., & Charan, P. V. S. (2021, February). A multi class classification for detection of IoT botnet malware. In International conference on computing science, communication and security (pp. 17-29). Cham: Springer International Publishing

Publisher : Springer

Year : 2021

Detection of Obfuscated Mobile Malware with Machine Learning and Deep Learning Models

Cite this Research Publication : K. A. Dhanya, Dheesha, O. K., Dr. Gireesh K. T., and Vinod, P., “Detection of Obfuscated Mobile Malware with Machine Learning and Deep Learning Models”, in Machine Learning and Metaheuristics Algorithms, and Applications, Singapore, 2021.

Publisher : Machine Learning and Metaheuristics Algorithms, and Applications, Singapore, 2021.

Year : 2020

A Comprehensive Survey on Neural Network based Image Data Hiding Scheme

Cite this Research Publication : M. Chanchal, Malathi P., and Dr. Gireesh K. T., “A Comprehensive Survey on Neural Network based Image Data Hiding Scheme”, in 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020.

Publisher : 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)

Year : 2018

Neighbor Attack Detection in Internet of Things

Cite this Research Publication : A. Thomas, Dr. Gireesh K. T., and Ashok Kumar Mohan, “Neighbor Attack Detection in Internet of Things”, in Advanced Computational and Communication Paradigms, Singapore, 2018.

Publisher : Advanced Computational and Communication Paradigms

Year : 2018

Facial Expression Classification Using Machine Learning Approach: A Review

Cite this Research Publication : A. Baskar and Dr. Gireesh K. T., “Facial Expression Classification Using Machine Learning Approach: A Review”, in Advances in Intelligent Systems and Computing, 2018, vol. 542, pp. 337-345.

Publisher : Advances in Intelligent Systems and Computing

Year : 2016

Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Re-configurable Hardware

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies

Year : 2016

High Speed Network Intrusion Detection System Using FPGA

Cite this Research Publication : S. Anuraj, Premalatha, P., and Dr. Gireesh K. T., “High Speed Network Intrusion Detection System Using FPGA”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, New Delhi, 2016, pp. 187–194.

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015

Year : 2016

Frontier based multi robot area exploration using prioritized routing

Cite this Research Publication : S. K. Rahul, Honc, D., Dušek, F., Dr. Gireesh K. T., F., H., O., R., and M., M., “Frontier based multi robot area exploration using prioritized routing”, in Proceedings - 30th European Conference on Modelling and Simulation, ECMS 2016, 2016, pp. 25-30.

Publisher : Proceedings - 30th European Conference on Modelling and Simulation, ECMS 2016, European Council for Modelling and Simulation, p.25-30

Year : 2012

An intelligent question answering conversational agent using Naïve Bayesian classifier

Cite this Research Publication : Ma Niranjan, Saipreethy, M. Sa, and Kumar, T. Gb, “An intelligent question answering conversational agent using Naïve Bayesian classifier”, in Proceedings - 2012 IEEE International Conference on Technology Enhanced Education, ICTEE 2012, Kerala, 2012.

Publisher : ICTEE

Year : 2010

Feature based steganalysis using wavelet decomposition and magnitude statistics

Cite this Research Publication : Dr. Gireesh K. T., Jithin, R., and Shankar, D. D., “Feature based steganalysis using wavelet decomposition and magnitude statistics”, in ACE 2010 - 2010 International Conference on Advances in Computer Engineering, Bangalore, 2010, pp. 298-300.

Publisher : ACE 2010 - 2010 International Conference on Advances in Computer Engineering

Year : 2010

An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication

Cite this Research Publication : Dr. Gireesh K. T., Sasidharan, S., N., K., A.P., S., and Y., A., “An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication”, in Proceedings of the 2010 International Conference on Advances in Computer Engineering, Washington, DC, USA, 2010, pp. 363-365.

Publisher : Proceedings of the 2010 International Conference on Advances in Computer Engineering

Conference Proceedings

Year : 2018

An Improved Approach for Securing Document Images Using Dual Cover

Cite this Research Publication : R. E. Vinodhini, Malathi P., and T. Kumar, G., “An Improved Approach for Securing Document Images Using Dual Cover”, Advances in Signal Processing and Intelligent Recognition Systems, vol. 678. Springer International Publishing, Cham, pp. 155-166, 2018.

Publisher : Advances in Signal Processing and Intelligent Recognition Systems, Springer International Publishing

Year : 2017

A Survey on DNA and Image Steganography

Cite this Research Publication : R. E. Vinodhini, Malathi P., and Dr. Gireesh K. T., “A Survey on DNA and Image Steganography”, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, Coimbatore, India, 2017.

Publisher : 2017 4th International Conference on Advanced Computing and Communication Systems

Year : 2016

Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains

Cite this Research Publication : Malathi P. and Dr. Gireesh K. T., “Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains”, Procedia Computer Science, vol. 93. Elsevier, Rajagiri School of Engineering and TechnologyKochi; India, pp. 878-885, 2016.

Publisher : Procedia Computer Science, Elsevier.

Year : 2008

Agent Based Ground Flight Control Using Type-2 Fuzzy Logic And Hybrid Ant Colony Optimization To A Dynamic Environment

Cite this Research Publication : Dr. Gireesh K. T., and V.P, V., “Agent Based Ground Flight Control Using Type-2 Fuzzy Logic And Hybrid Ant Colony Optimization To A Dynamic Environment ”, First International Conference on Emerging Trends in Engineering and Technology. 2008.

Publisher : First International Conference on Emerging Trends in Engineering and Technology

Book Chapter

Year : 2016

Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware

Cite this Research Publication : A. Eldho Jose and Dr. Gireesh K. T., “Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, C. Suresh Satapathy, Raju, S. K., Mandal, K. Jyotsna, and Bhateja, V., Eds. New Delhi: Springer India, 2016, pp. 11–19.

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Year : 2015

A Survey of Location Prediction Using Trajectory Mining

Cite this Research Publication : B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “A Survey of Location Prediction Using Trajectory Mining”, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1, P. L. Suresh, Dash, S. Subhransu, and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2015, pp. 119–127.

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014,

Year : 2015

Secure Seed-Based Sturdy OTP via Convenient Carry-on Device

Cite this Research Publication : Ashok Kumar Mohan and Dr. Gireesh K. T., “Secure Seed-Based Sturdy OTP via Convenient Carry-on Device”, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1, P. L. Suresh, Dash, S. Subhransu, and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2015, pp. 447–455.

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Year : 2015

A Novel Authentication Framework for Hadoop

Cite this Research Publication : P. K. Rahul and Dr. Gireesh K. T., “A Novel Authentication Framework for Hadoop”, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1, P. L. Suresh, Dash, S. Subhransu, and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2015, pp. 333–340.

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Year : 2015

An Autonomous Obstacle Avoiding and Target Recognition Robotic System Using Kinect

Cite this Research Publication : A. Velayudhan and Dr. Gireesh K. T., “An Autonomous Obstacle Avoiding and Target Recognition Robotic System Using Kinect”, in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1, L. C. Jain, Patnaik, S., and Ichalkaranje, N., Eds. New Delhi: Springer India, 2015, pp. 643–649.

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Year : 2012

Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis

Cite this Research Publication : D. D. Shankar, Dr. Gireesh K. T., Praveen, K., Jithin, R., and Raj, A. S., “Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis”, in Data Engineering and Management: Second International Conference, ICDEM 2010, Tiruchirappalli, India, July 29-31, 2010. Revised Selected Papers, R. Kannan and Andres, F., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 189–195.

Publisher : Springer Berlin Heidelberg

Year : 2010

Feature Based Classification System for JPEG Steganalysis

Publisher : Conference Proceedings RTCSP (Vol.10), (pp. 1 - 4).

Year : 2007

A Multi-agent Optimal Path Planning Approach to Robotics Environment

Cite this Research Publication : Dr. Gireesh K. T. and .V.P., V., “A Multi-agent Optimal Path Planning Approach to Robotics Environment ”, International Conference on Computational Intelligence and Multimedia Applications. 2007.

Publisher : International Conference on Computational Intelligence and Multimedia Applications

Educations
  • October 2006- August 2010: Ph.D(Computer Science and Engineering),Anna University Chennai, Tamil Nadu.
  • August2001- April A2003: M. Tech. in Computer Science and Engineering,Cochin University of Science and Technology, Cochin, Kerala
  • August 1993-June 1997: B. Tech. in Mechanical Engineering,NSS College of Engineering (Government Aided) Palakkad,Kerala.
Funding
  • Principal Investigator: Development of Artificial Intelligence (AI) based module for evaluation of Performance of Aircraft Testers for Revision of Calibration Periodicity Indian Airforce,August 2023 to March 2024
  • Principal Investigator: Detection and Prevention of Advanced Persistent Threat (APT) activities in heterogeneous networks using SIEM and Deep Learning.
    IBM Shared University Research Grant, Jan2019-May 2020
  • Principal Investigator: Malware detection using FPGA, Sandboxing and Machine Learning
    IBM Shared University Research Grant, January2016-January 2017
  • Co-Principal Investigator:Classified Image Transmission Systems
    (Scientific Analysis Group), DRDO New Delhi,May 2028-April 2009
  • Co-Principal Investigator:Distributed Energy Resources Market Management with Cyber Physical Co-Simulation Framework for Effective Electric Grid Resilience Amrita Seed grant October2022-October2025
Professional Appoinments
Year Affiliation
May 2008 to till date Associate Professor​
Amrita School of Engineering, Ettimadai
May 2004 to May 2008 Sr. Lecturer
V.L.B. Janaki Ammal College of Engineering and Technology, Coimbatore
2003 April to 2004 April Lecturer
Vel Multi Tech Engineering College, Chennai
Industrial/Research:
1998 Nov to 2000 April
Scientist Trainee
Vikram Sarabhai Space Centre(VSSC),India Space research Organization, Thiruvananthapuram.
Research Projects
  • Principal Investigator: Detection and Prevention of Advanced Persistent Threat (APT) activities in heterogeneous networks using SIEM and Deep Learning.
    IBM Shared University Research Grant.
  • Project Guide: Classified Image Transmission Systems
    Funded By: (SAG), DRDO New Delhi 4.90Laks
  • Principal Investigator: Malware detection using FPGA, Sandboxing and Machine Learning
    Funded By: IBM SUR
Awards & Recognitions
  1. TCS Best Research Paper Award for the paper titled “Tracking of nose tip: An Alternative for Mouse”,( ICDEM 2011)
  2. Best Paper Award: “A Novel Authentication Framework for Hadoop, International Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES 2014
Invited Lectures
MP Nachimuthu M Jaganathan Engineering College In Chennimalai, Erode Research Trends in Cyber Security
V.L.B. Janaki Ammal College of Engineering and Technology, Coimbatore Steganography and Steganalysis
Eswari Engineering College Chennai Artificial Intelligence
Eswari Engineering College, Chennai Soft Computing
MEA College of Engineering, Perinthalmanna, Kerala Machine Learning In Cloud
Info Institute of Technology Coimbatore Cloud Computing Issues
Sethu Institute of Technology, Madurai Cloud Security
GCE, Palakkad Cloud Computing
PSG College of Technology, Coimbatore Intrusion Detection System
Nehru Institute of Technology, Coimbatore Algorithms
Ratnam College of Engineering, Coimbatore Robotic
St. Thomas Engg. Kottayam Artificial Intelligence
CIT, Coimbatore Machine Learning for Cloud and Bigdata
Amrita School of Arts and Science Machine Learning
IRTT , Erode Cyber Security Awareness
MEA Engineering College, Perinthalmanna Cyber Security Awareness
KCT, Coimbatore Swarm Intelligence
SKCT,Coimbatore Back Tracking Algorithms
SKCT,Coimbatore Complexity and Computability
SKCT,Coimbatore Theory of Computations
SKCET Coimbatore Malware Detection feb 2016
MES College Mampad Security and privacy issues March 2016
Amrita Kochin Machine learning for modelling, March 2016
Admissions Apply Now