Centre of Excellence in Digital Forensics Intelligence and Cyber Security
Empowering the future of digital security and investigation. supported by VGST, GoK
About CoE Cyber Security
Objectives
Educational Support
To create a collaborative working environment between university, government agencies, and commercial establishments to share information on potential threats, and counter-measures through ongoing research projects.
Govt. Support
To support law enforcement agencies in technical matters and help them in the development of cyber laws, whenever required in their investigations. Also, support them in capacity building.
Research
To promote research in the upcoming areas of Digital Forensics and Cybersecurity to provide solutions to cybercrime and cybersecurity-related issues and to publish scientific books, magazines, and compilations.
Training
To conduct training and skill development that can aid in understanding the nature of cybercrime. Conducting seminars, national and international conferences to create awareness among the stakeholders.
Facilities
- Unified Threat Management System
- Computer Unified Programming Unit
- ESP IOT Development Kit
- Alpha AWUS036ACH
- AtMegha Development Kit and Suitable Sensor
- PLC
- Data Logger
- HMI for Industrial Data Security Experiments
Funded Projects
50 Lakhs | Centre of Excellence in Digital Forensics Intelligence
Vision Group on Science and Technology, Govt. of Karnataka
2.6 Lakhs | Comprehensive Survey on Deepfake Detection
CYSECK, Govt. of Karnataka
Our Patents
An Improved Cyber Security System With Digital Watermarking Using Combined Transformation Approach
Year: 2021
Patent Number & Application: 2021101400
Type: International
Status: Granted
Enhanced Detection Of Attacks OnNetwork Based On Pattern Recognitions With Decision Stump
Year: 2021
Patent Number & Application: 202141010139
Type: Indian Patent
Status: Published
Publications
Advancements in User Security: Enhancing Usability with Graphical Password Authentication
IEEE 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)
Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures
Book: Advancements in Cybercrime Investigation and Digital Forensics :Apple Academic press and CRC Press
A performance evaluation of convolution neural networks for kinship discernment: An application in digital forensics.
Intelligent Decision Technologies Preprint: 1-8.
Deep learning-based approach for malware classification.
Journal of Intelligent Defence Support Systems 6.2 (2021): 61-80. [DBLP]
Person identification from arm's hair patterns using CT-twofold Siamese network in forensic psychiatric hospitals.
Complex Intell. Syst. (2022).
Advanced Mechanism to Achieve QoS and Profit Maximization of Brokers in Cloud Computing.
EAI Endorsed Transactions on Cloud Systems, 7(20). [DBLP]
Books Edited
Advancements in Cybercrime Investigation and Digital Forensics
Apple Academic Press with Co Publishing CRC Taylor and Francis
People
Chairman
Dr.Manjunath Bhandary
Chairman, SCEM
Advisors
Mr.Johnson Tellis
CEO, Bhandary Foundation
Dr. Manjappa Sarathi
Director R&D, SCEM
Dr. S S Injaganeri
Principal, SCEM
Mentors and Collaborators
Dr. Mustafa Basthikodi
HOD, Dept of CSE, SCEM
Dr. Abhishek Vaish
IIIT, Allahabad
Principal Investigators
Dr. Ananth Prabhu G
Principal Investigator
Mr. Harisha
Co-Principal Investigator
Faculty Team
Prof. Srinivas P M
Mr. Harisha
Mrs. Vidya VV
Ms. Alakananda
Ms. Chaithra S
Resource Persons
Likith U Salian
M.Sc in Cyber Security
Adish Yermal
Engineer at Tata Elxsi
Join our dynamic team as a cybersecurity intern and delve into an exciting problem statement that promises to challenge and inspire. If you're passionate about safeguarding digital landscapes and thwarting cyber threats, this opportunity is tailor-made for you. As an intern, you'll have the chance to work alongside seasoned professionals, gaining invaluable hands-on experience while contributing to cutting-edge solutions. Prerequisites include a readiness to explore operating systems like Kali Linux and Parrot OS, proficiency in Python programming, familiarity with Java libraries for cryptography, and strong communication skills for effective reporting. Don't miss out on this chance to make a real impact in the realm of cybersecurity - apply now and be part of something truly transformative!