Logo


Dr. Syed Siraj Ahmed N

Qualification : Ph.D.

Details of Educational Qualification:

Course Specialization Group College Name/University Year of Passing
Ph.D. Computer Science and Engineering Computer Science and Engineering Vellore Institute of Technology (VIT) University 2016
M.Phil. Computer Science M.Phil. Periyar University 2007
M.Sc. Computer Science M.Sc. Jamal Mohammed College, Bharathidasan University 1999
B.Sc. Computer Science B.Sc. Islamiah College, University of Madras 1997

My Publications

S.No Title of the Paper Full Details of Journal Name / Conference Name, Volume number, page number, Date
1 Tracing of online assaults in 5g networks using dominance based rough set and formal concept analysis. Peer to Peer Networking and Applications. (SCIE, Scopus Indexed and WOS, Impact Factor : 3.307)
2 A framework for various attack identification in mobile ad hoc network using multi-granular rough set. International Journal of Information Security and Privacy, IGI Global, Vol. 13, No. 4, pp. 28-53. (Scopus, ESCI Indexed and WOS)
3 A framework for phishing attack identification using rough set and formal concept analysis. International Journal of Communication Networks and Distributed Systems, Inderscience, Vol. 18, No. 2, pp. 186-212 (Scopus, ESCI Indexed and WOS)
4 An application of containing order rough set for analyzing data of intrusion detection. An Interdisciplinary Journal of Scientific Research and Education, Scientific Digest Publications, Vol. 2, No. 5, pp. 52-57.
5 A dominance based rough set approach for the detection of jamming attack. International Journal of Philosophies in Computer Science, EdinoRg Publications, Vol. 1, No. 2, pp. 45-66.
6 Detection of denial of service attack in wireless network using dominance based rough set. International Journal of Advanced Computer Science and Applications, SAI Publications,Vol. 6, No. 12, pp. 267-278. (Scopus, ESCI Indexed and WOS)
7 Public key cryptography algorithm using binary manipulation and chinese remainder theorem. International Journal of Recent Technology and Engineering, Vol. 2, No. 5, pp. 85-88.
8 Analyzing and tracing of various packet dropping attacks using containing order rough set. IOSR Journal of Engineering,Vol. 2, Special issues on IoT, pp. 10-16
  • Acharjya, D. P., and Ahmed, N. S. S. (2017). Recognizing attacks in wireless sensor network in view of internet of things, in Internet of Things: Novel Advances and Envisioned Applications, Series: Studies in Big Data, Acharjya D. P. and Geetha M. K. Eds, Springer, Vol. 25, pp. 149-172 (ISI, WOS)