Kavuri Satheesh | Cryptography | Best Researcher Award

Dr. Kavuri Satheesh | Cryptography | Best Researcher Award

Vasireddy Venkatadri International Technological University | India 

Dr. Kavuri K. S. V. A. Satheesh is an accomplished academician and researcher with over two decades of experience in the field of computer science and engineering. His passion for teaching and research has led to significant contributions in cloud computing, blockchain technology, and network security. He has consistently demonstrated excellence in both teaching and research, publishing numerous papers in reputed journals and participating in conferences.

Publication Profile 

Scopus

Google Scholar

Educational Background 

He holds a Ph.D. in Computer Science and Engineering, along with postgraduate and undergraduate degrees in computer science. Additionally, he completed an M.Tech. in Computer Science and Engineering, establishing a strong academic foundation that supports his teaching and research expertise.

Professional Experience 

With a career spanning more than 25 years, he has served in various academic roles ranging from Lecturer to Professor in reputed engineering institutions. His responsibilities have included mentoring postgraduate and engineering students, delivering lectures on advanced computer science topics, and guiding research projects.

Research Interests 

His primary research interests lie in cloud computing, blockchain technology, and network security. He has explored innovative solutions to enhance security in cloud environments and developed models for authentication, encryption, and secure data management. His work also extends to artificial intelligence, machine learning, and their integration with secure computing models.

Awards and Honors 

He has published extensively in SCI and Scopus-indexed journals, authored a book on network and system security, and contributed chapters to reputed publications. Additionally, he holds patents related to cryptographic systems and data security techniques, reflecting his commitment to technological innovation and applied research.

Research Skills 

Dr. Satheesh possesses strong expertise in encryption models, secure authentication systems, data access control, and cryptographic techniques for cloud environments. His technical skills span programming languages, algorithm design, and security protocol development. He has also participated in several faculty development programs and advanced workshops on machine learning, blockchain, and cloud computing.

Publications 

  1. Title: Data authentication and integrity verification techniques for trusted/untrusted cloud servers
    Citations: 20
    Year: 2014

  2. Title: Resource allocation method using scheduling methods for parallel data processing in cloud
    Citations: 16
    Year: 2012

  3. Title: An improved integrated hash and attributed based encryption model on high dimensional data in cloud environment
    Citations: 9
    Year: 2017

  4. Title: A Novel Hardware Parameters Based Cloud Data Encryption and Decryption Against Un-Authorized Users
    Citations: 5
    Year: 2016

  5. Title: Cryptographic access control schemes in cloud storage services
    Citations: 5
    Year: 2015

Conclusion 

Dr. Kavuri K. S. V. A. Satheesh is a dedicated educator and researcher committed to advancing knowledge in computer science and engineering. His extensive teaching experience, impactful research, and innovative contributions to security in cloud and distributed systems underscore his suitability for academic leadership and research-driven roles in higher education and industry collaborations.

Ferda Ozdemir Sonmez | Smart Contract Security | Best Researcher Award

Dr. Ferda Ozdemir Sonmez | Smart Contract Security | Best Researcher Award

University of West London at Imperial College of London, United Kingdom

Dr. Ferda Ozdemir Sonmez is an expert in cybersecurity and data visualization with a focus on enterprise security systems, security metrics, and decision support systems. With extensive experience in both academic research and practical applications, [Your Name] has contributed to various conferences, books, and journals, particularly in the areas of security visualization, big data technologies, and smart contracts for cybersecurity. [Your Name] has been involved in numerous scholarly projects aimed at enhancing security measures, predictive analytics, and system efficiency in digital environments.

Publication Profile : 

Scopus

Educational Background 🎓

  • MIT Online (Ongoing): Micro MSc in Statistics and Data Science (2020)
  • Middle East Technical University, Ankara: PhD in Information Systems (Cybersecurity Focus, 2019)
  • Middle East Technical University, Ankara: MSc in Information Systems (Cybersecurity Focus, 2014)
  • Middle East Technical University, Ankara: BSc in Electrical & Electronic Engineering (Computer Option, 1997)

Professional Experience 💼

University of West London, Department of Computing
Senior Lecturer of Cybersecurity – Computer Scientist
11/2024 – Present

  • Delivered courses on cybersecurity fundamentals, threat intelligence, and applied cryptography.
  • Supervised MSc and PhD students, supported by advanced research in cybersecurity.
  • Authored grant applications and collaborated on cutting-edge curriculum design.

Imperial College, Department of Computing
Research Associate – Computer Scientist
11/2022 – Present

  • Researched secure blockchain technologies, including DAOs and voting systems.
  • Published peer-reviewed papers on smart contract security and generative language modeling.
  • Developed innovative solutions for multi-chain systems and account management.

Queen Mary University, ITS
Technical Analyst
10/2022 – 08/2024

  • Solved IT issues for bespoke and vendor applications, enhancing database efficiency.
  • Supported developers through troubleshooting and scripting solutions.

Imperial College, Security Science and Technology
Research Associate – Computer Scientist
11/2020 – 09/2022

  • Designed tools for security optimization, including a penetration testing planner.
  • Published academic papers on cost optimization and attack graph detection.

Yıldırım Beyazıt University
Part-Time Lecturer
09/2019 – 01/2020

  • Delivered graduate-level courses in blockchain, network security, and web application standards.
  • Received positive feedback for engaging and informative lecture delivery.

Honors and Achievements

  • Royal Academy of Engineering Endorsement: Recognized for exceptional skills and achievements in computer science and engineering.
  • University Entrance Ranking: Ranked within the top 0.02% of candidates in Turkey, placing in the top 300 out of approximately 1.5 million participants.

Technical Skills

Operating Systems: Linux, Unix, Windows 10
Programming Languages: Java, C#, Python, Solidity, and more.
Data Science Tools: TensorFlow, Keras, Scikit-learn, GPT libraries, SPSS.
Cybersecurity Tools: OWASP ZAP, Wireshark, Microsoft Threat Modeling, STRIDE.
DevOps & Platforms: Docker, Kubernetes, Git, Hadoop.
Database Management: Oracle, MySQL, MS SQL Server, LDAP.
Business Intelligence: Tableau, Apache Ambari.

Publications 📚

  • 📚 Security Visualization Extended Review Issues, Classifications, Validation Methods, Trends, Extensions (2018) – IGI Global | Security and Privacy Management, Techniques, and Protocols [DOI: 10.4018/978-1-5225-5583-4.ch006]

  • 📄 Qualitative and Quantitative Results of Enterprise Security Visualization Requirements Analysis through Surveying (2019) – IVAPP | 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications [DOI: 10.5220/0007255401750182]

  • 📚 Big Data Technologies– Supported Generic Visualization System in an Enterprise Cyber-Physical Environment (2019) – CRC Press | Cybersecurity and Privacy in Cyber-Physical Systems [DOI: 10.1201/9780429263897]

  • 📰 Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results (2021) – IEEE | IEEE Access [DOI: 10.1109/ACCESS.2021.3057044]

  • 📄 Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation (2018) – IEEE | International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism [DOI: 10.1109/IBIGDELFT.2018.8625291]

  • 📰 A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions (2020) – IEEE | IEEE Transactions on Network and Service Management [DOI: 10.1109/TNSM.2020.3044865]

  • 📄 Development of Automated Remote Security Prototype Base on IOT Technologies on IBM Bluemix Platform (2016) – ISCTurkey | 9th International Conference on Information Security and Cryptology [ISBN: 978-605-86904-6-2]

  • 📚 Prediction of Satisfaction with Life Scale Using Linguistic Features from Facebook Status Updates: Smart Life (2021) – Springer | Machine Intelligence and Data Analytics for Sustainable Future Smart Cities [DOI: 10.1007/978-3-030-72065-0_8]

  • 📄 Security Qualitative Metrics for Open Web Application Security Project Compliance (2019) – Elsevier | International Symposium on Machine Learning and Big Data Analytics for Cybersecurity and Privacy (MLBDACP) [DOI: 10.1016/j.procs.2019.04.140]

  • 📄 A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks’ Efficiency (2019) – Elsevier | International Conference on Emerging Ubiquitous Systems and Pervasive Networks [DOI: 10.1016/j.procs.2019.09.459]