:ST. FRANCIS COLLEGE :

Back

Dr. Ambika N

Assistant Professor
Department of CSA

Qualification: B.Sc, MCA, M.Phil, Ph.D
Current Status: Assistant Professor, Department of CSA
Date of Joined: 1 October 2021
Total Experience: 15 years
Teaching : 15 years
Industry : Nil



Publication : Book Chapter

1. “Energy-Perceptive Authentication in Virtual Private Networks Using GPS data”, In Security, Privacy and Trust in the IoT Environment,(pp.25-38),2019, Springer publications
2. “Methodical IoT-Based Information System in Healthcare”, In Smart Medical Data Sensing and IoT Systems Design in Healthcare (pp. 155-177), 2020, IGI Global.
3. “Diffie-Hellman Algorithm Pedestal to Authenticate Nodes in Wireless Sensor Network”, In Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's (pp. 348-363), 2020, Springer, Cham.
4. “SYSLOC: Hybrid Key Generation in Sensor Network”, In Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's (pp. 325-347), 2020, Springer, Cham.
5. “Improved Methodology to Detect Advanced Persistent Threat Attacks”, In Quantum Cryptography and the Future of Cyber Security (pp. 184-202), 2020, IGI Global.
6. “Reinstate Authentication of Nodes in Sensor Network”,. In Sensor Network Methodologies for Smart Applications (pp. 130-147), 2020, IGI Global.
7. “Tackling Jamming Attacks in IoT. In Internet of Things (IoT)”, (pp. 153-165),2020, Springer, Cham.
8. “Encryption of data in cloud-based Industrial IoT devices”, IoT: Security and Privacy Paradigm,2020, CRC Press.
9. Chapter titled “Reliable Medchain management system” is accepted for publication in the book titled “IoT protocols and Applications for improving Industry, Environment and Society”, IGI publications.
10. Chapter titled “Reliable data transmission using biometric authentication methodology in IoT” is published in the book titled “Security and privacy in Internet of things”, Francis & Taylor publications.
11. Chapter titled “An improved solution to tackle Cyber attacks” is published in the book titled “Advanced controllers for smart cities: An industry 4.0 perspective” is published in EAI/Springer Innovations in communications and computing book series.
12. Chapter titled “A reliable hybrid block-chain based authentication system for IoT network” is published in the book titled “Handbook of Research on Blockchain-Enabled privacy and access control”, IGI publications.
13. Chapter titled “Enhancing security in IoT devices using artificial intelligence” is published in the book titled “IoT and cloud for societal good”, Springer Nature publications
14. Chapter titled “Wearable sensors for smart societies – A survey” is published in book titled “Green Technological Innovation for sustainable smart societies : Post pandemic Era, Springer publications
15. Chapter titled “Aiding IoT and cloud to control COVID-19 : A systematic approach” is published in the book titled “Pervasive Healthcare: A Compendium of critical factors for success”, EAI/ Springer publication
16. Chapter titled “A reliable cloud assisted IoT application in smart cities“ is published in book titled “Data-Driven mining, learning and Analytics for secured smart cities”, Springer publications
17. Chapter titled “A reliable blockchain-based image encryption scheme for IIoT network” is published in book titled “Blockchain and AI technology in the Industrial Internet of Things”, IGI publications.
18.Chapter titled “An improved Verification scheme based on user biometrics” is accepted for publication in the book titled “ security of Internet of things, nodes challenges, attacks and countermeasures”, Taylor & Francis Publications.
19. Chapter titled “A reliable IDS system to using blockchain for SDN-enabled IIoT systems” is accepted for publication in the book titled “IoT protocols and applications for improving industry, environment and society”, IGI publications
20. Chapter titled “An improved authentication scheme for wireless sensor network using user biometrics” is published in the book titled “privacy and security challenges in location aware computing, IGI publications
21.Chapter titled “ Advanced Associated Defence in CloudIoT Environment” is published in the book titled "Handbook of Research on Smarter and Secure Industrial Applications Using AI, IoT, and Blockchain Technology", IGI publications.
22. Chapter titled "Reliable Blockchain-aided Searchable Attribute-based Encryption for Cloud-IoT" ” is published in the book titled "Handbook of Research on Smarter and Secure Industrial Applications Using AI, IoT, and Blockchain Technology", IGI publications.
23. Chapter titled “Early detection of Infection/Disease in Agriculture” is published in the book titled “IoT and machine learning in Agriculture”, Nova Science Publishers, US.
24. Chapter titled “Storing and maintaining the smart healthcare system in IoT environment” is published in book titled “Trends and Technologies in Ontology based Information retrieval for healthcare systems, Nova Science publishers, U.S.
25. Chapter titled “Energy-aware secure routing in sensor network” is published in book titled “cloud computing enabled big-data analytics in Wireless Ad-hoc Networks”, Taylor & Francis Publications.
26. Chapter titled “Enhanced Intelligence Architecture “is accepted for publication in the book titled “Impacts and Challenges of Computation Intelligence in Software Engineering”, Apple Academic Press, CRC Press, Taylor & Francis Group.
27. Chapter titled “Precise risk assessment and management” is published in the book titled “Cyber Physical system - Introduction and techniques”, Scrivener-Wiley Publications, U.S
28. Chapter titled “Adapting Blockchain for Energy constrained IoT in Healthcare Environment” is accepted for publication in edited book titled “Sustainable and advanced applications of Blockchain in Smart Computational Technologies (SAAB 2021)”, CRC press
29. Chapter titled “Secure privacy-oriented location-aware network” is published in book titled “Achieving full realization and mitigating the challenges of the Internet of Things”, IGI publications. DOI: 10.4018/978-1-7998-9312-7.ch006
30. Chapter titled “Minimum prediction error at an early stage in Darknet analysis” is published in the book titled “Dark web pattern recognition and crime analysis using machine intelligence”, IGI publications. DOI: 10.4018/978-1-6684-3942-5.ch002
31. Chapter titled An Economical machine learning approach for anomaly detection in IoT environment is published in the book titled Bioinformatics and Medical Applications: Big data using deep learning algorithms, Wiley publications. DOI - 10.1002/9781119792673.ch11
32. Chapter titled securing autonomous robot systems is published in the book titled Applying drone technologies and robotics for agricultural sustainability, IGI publications, US.
33. Chapter titled An Augmented Edge Architecture for AI-IoT Services Deployment in the Modern Era is published in book titled Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World, IGI Global publications, US
34. Chapter titled Precise risk assessment and management is published in the book titled Cyber Physical system - Introduction and techniques, Scrivener-Wiley Publications, U.S.
35. Chapter titled Enhanced Intelligence Architecture is published in the book titled Impacts and Challenges of Computation Intelligence in Software Engineering, Apple Academic Press, CRC Press, Taylor & Francis Group.
36. Chapter titled Reliable Machine Learning Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles is published in the book titled Autonomous Vehicles Volume 1: Using Machine Intelligence, Wiley publications
37. Chapter titled Adapting Blockchain for Energy constrained IoT in Healthcare Environment is published in edited book titled Sustainable and advanced applications of Blockchain in Smart Computational Technologies (SAAB 2021), CRC press.

Publication: Journal Details

1. Ambika, N., & Raju, G. T. (2014). ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor network. International Journal of Security and Networks, 9(2), 78-84;DOI: 10.1504/IJSN.2014.060743; ISSN -1747-8413
2. Ambika, N. (2018). RPSE-reenactment of data using polynomial-variant cryptographic scheme in sensor environment. International Journal of High Performance Computing and Networking, 11(2), 156-166;DOI: 10.1504/IJHPCN.2018.089896 ; ISSN -1740-0570
3. Nagaraj, A. (2014). Recouping the Modified Data in Intruder-Based Environment. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 5(3), 23-41. ISSN: 1947-3176 , DOI: 10.4018/IJERTCS.2014070102

FDPs

• Attended international webinar on “Research Integrity: How Preprinting Can Enhance Trust in Research “, organized by research square.
• Attended webinar on “Empowering knowledge on ethical publishing: Mastering the art of identifying predatory, fake and cloned journals”, at APAC Customer Success Hub, on Wednesday 08 June, 2022 - Amity University Gwalior

Presentation : International Conference

1. Ambika, N., & Raju, G. T. (2012). MA WSN—Manifold authentication in wireless sensor network. In 2012 World Congress on Information and Communication Technologies (pp. 572-576). IEEE; DOI: 10.1109/WICT.2012.6409142
2. Ambika, N., & Raju, G. T. (2010). Figment Authentication Scheme in Wireless Sensor Network. In Security Technology, Disaster Recovery and Business Continuity (pp. 220-223). Springer, Berlin, Heidelberg; DOI -10.1007/978-3-642-17610-4_24;ISBN - 978-3-642-17610-4
3. Ambika, N., & Raju, G. T. (2014). PDMWSN: A Probable Approach to Detect Malicious Node in Wireless Sensor Network. In Emerging Research in Electronics, Computer Science and Technology (pp. 255-262). Springer, New Delhi; DOI: 10.1007/978-81-322-1157-0_27
4. Ambika, N., & Raju, G. T. (2013, January). DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network. In International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (pp. 866-878). Springer, Berlin, Heidelberg; DOI -10.1007/978-3-642-37949-9_75
5. Ambika, N., & Raju, D. G. TMW-Time-Endorsement by mobile agent in wireless sensor network. The Research Bulletin of Jordan ACM, 114-117; DOI: 10.1007/978-3-642-18129-. 0.
6. “Making business transactions secure through water marking”, at Federal Institute of Science & Technology, Kerala, India from 24-26 September,2008.
7. “Intrusion detection in sensor network – A survey”, multidisciplinary International conference (AVANT- GARDE 2019) held at sheshadripuram first Grade College on 18th May 2019.

Presentation : National Conference

1. “Energy conservation in IoT- A Survey”, Recent advances in technology and engineering (RATE-2019) held at T.John Institute of Technology on 27th April, 2019.
2. “Enhancing Security in Wireless Sensor Network”, National conference held at Jyothi Nivas college, on 30-31 October 2009.
3. “Security in Wireless Sensor Network”, National conference held at PESIT on 22- 23 Oct 2009.
4. “Providing security & long life span in wireless sensor network” selected for National Conference held at Sri Vasavi College, Erode on 19.9.2009.

Other Achievements

1.Advisory/Scientific committee member of International/National conferences
2. Reviewer of National/International conferences, books, encyclopedia and Journals
3. filed copyright titled "sample size"
4. Working as advisory committee member of International Conference on Artificial Immune and Intelligent Systems [ICAIIS 2023], organized on 30-31, May 2023 at Shah Alam, Malaysia
5. Invited for “Research conclave” at Jain University, Bangalore on 29 September 2022.
6. Program committee member of 4th edition of the Springer International Conference on Computing Science, Communication and Security (COMS2) will be held at Ganpat University, Gujarat, India on 6th -7th February 2023.
7. Technical Program committee member of 7th International Conference on “Advances in Computing and Data sciences” from 27-28 April, 2023 to held at Tirana, Albania.
8. Reviewer of International conference on recent strategies in Mathematics and computer science -ICRSMS 2022.
9. Working as technical program committee member of 6th International Conference on the topic-Advances in Computing and Data Sciences (ICACDS-2023) on 20-21 April 2023 with Springer CCIS at University of Malta.

Other certifications -
1. Completed “Data Science for Engineering”, NPTEL Online Certification conducted by IIT, Madras
2. Completed NPTEL in “Digital circuits”, NPTEL Online Certification conducted by IIT, Kharagpur
3. Completed NPTEL in “Problem solving using C”, NPTEL Online Certification conducted by IIT, Kharagpur
4. Completed higher diploma in software Engineering from Aptech Computers

Book publication
1. Edited & Published book titled “Introduction to sensors in IoT and cloud computing applications”, 2021, Bentham books.

Encyclopedia publications
1.“Secure and reliable knowledge-based intrusion detection using mobile base stations in smart environment” in Encyclopedia of Information science and Technology, chapter 36, Fifth Edition (3 volumes), IGI publication
2. “Improved cross-layer detection and prevention of sinkhole attack in WSN” in En cyclopedia of Information science and Technology, chapter 37, Fifth Edition (3 volumes), IGI publication
3. “TDSJ-IoT: Trivial Data transmission to sustain energy from reactive Jamming attack in IoT” in Encyclopedia of Information science and Technology, Fifth Edition (3 volumes), IGI publication

Patent publications -
1. patent titled “Estimate search algorithm” published on 27/08/2021
2. patent titled “Approximate search algorithm” published on 27/08/2021
3. patent titled “Position-search sorting algorithm” published on 27/08/2021
4. patent titled “Fleeting Disk Scheduling Algorithm” published on 28/01/2022
5. patent titled “Weightage-based Process Scheduling Algorithm" published 11/01/2022

Join the St. Francis Community

Let’s keep in touch! We'd like to share all of the good news happening here at St. Francis College, so sign up for emails below to hear about the latest news and updates.

© 2021 St. Francis College. All rights Reserved | Designed by INTEGRO