Center for Research and Innovation in Cyber Threat Resilience

About US

The Center for Research and Innovation in Cyber Threat Resilience (CRICTR) at Kerala University of Digital Sciences, Innovation and Technology (KUDSIT) is an initiative for creating resilient and robust systems for government, businesses and organisations in all different domains of information technology. The lab aims for the research, innovation, consultancy and training in the broad areas related to the development of cyber threat resilient IT infrastructure capable of threat detection, prevention, and self-healing. The Center was inaugurated by Dr. Gulshan Rai, The Chief Information Security Officer (CISO), Prime Minister’s Office, Government of India on October 13, 2015 during the First International Workshop on Cyber Threat Resilience jointly organized by Indian Institute of Information Technology and Management-Kerala and Steven’s Institute of Technology, USA.

Research Areas

  • Authorship Analysis
  • Biometrics
  • Cognitive Cyber Security
  • Cryptology
  • Endpoint Security
  • IoT Security
  • Machine Learning
  • Malware Analysis
  • Mobile Security
  • Privacy & Trust
  • Smart Video Surveillance
  • Social Network Security
  • Vulnerability Analysis

Phd Scholars and Staff

Publications

Journals

Conferences

Books and Book Chapters

1. Roopak Surendran, Tony Thomas and Sabu Emmanuel, On Existence of Common Malicious System Call Codes in Android Malware Families, IEEE Transactions on Reliability, Available online 16 April 2020, doi: 10.1109/TR.2020.2982537.
2. Roopak Surendran, Tony Thomas and Sabu Emmanuel, GSDroid: A Graph Signal Based Compact Feature Representation for Android Malware Detection, Expert Systems with Applications, Elsevier, Available online 29 May 2020, https://doi.org/10.1016/j.eswa.2020.113581
3. Roopak Surendran, Tony Thomas and Sabu Emmanuel,A TAN based hybrid model for android malware detection, Journal of Information Security and Applications, Elsevier, Volume 54, October 2020, doi: 10.1016/j.jisa.2020.102483.
4. Gemini George and Sabu M Thampi, Combinatorial Analysis for Securing IoT-assisted Industry 4.0 Applications from Vulnerability-based Attacks, IEEE Transactions on Industrial Informatics, DOI: 10.1109/TII.2020.3045393
5. Fabi A K and Sabu M Thampi, A Psychology-Inspired Trust Model for Emergency Message Transmission on the Internet of Vehicles (IoV), International Journal of Computers and Applications, Taylor & Francis Group, DOI:10.1080/1206212X.2020.1814557
6. Elizabeth B Varghese, Sabu M. Thampi and Stefano Berretti, A Psychologically Inspired Fuzzy Cognitive Deep Learning Framework to Predict Crowd Behavior, IEEE Transactions on Affective Computing, doi: 10.1109/TAFFC.2020.2987021.
7. Elizabeth B Varghese and Sabu M. Thampi, Application of Cognitive Computing for Smart Crowd Management, IEEE IT Professional Magazine, IEEE
8. Elizabeth B. Varghese and Sabu M. Thampi (2020) Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis, Connection Science, Taylor & Francis DOI: 10.1080/09540091.2020.1772723
9. Gemini George and Sabu M. Thampi, Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things, Elsevier Pervasive and Mobile Computing Journal (PMC) 59; 101068; Oct 2019
10. Anjana P. Das and Sabu M. Thampi, Unsupervised anomaly detection in underwater acoustic sensor networks, Journal of Intelligent & Fuzzy Systems 36(3); 2367-72; Jan 2019
11. Anjana P. Das and Sabu M. Thampi, LLORET (J), Anomaly detection in UASN localization based on time series analysis and fuzzy logic, Mobile Networks and Applications, Springer; 1-13; Jan 2019
12. Indu V and Sabu M. Thampi, A nature-inspired approach based on Forest Fire model for modeling rumor propagation in social networks, Journal of Network and Computer Applications, Elsevier; 125:28-41; Jan 2019
13. Soumya T and Sabu M. Thampi, Nighttime visual refinement techniques for surveillance video: a review, Springer Journal on Multimedia Tools and Applications, 78; 32137–32158; Nov 2018
14. Divya S. Vidyadharan and Sabu M. Thampi, Evaluating color and texture features for forgery localization from illuminant maps, Springer Journal of Multimedia Tools and Applications 77 21131-21161: Apr 2018
15. Athira U and Sabu M. Thampi, An author-specific-model-based authorship analysis using psycholinguistic aspects and style word patterns, Journal of Intelligent & Fuzzy Systems 34(3):1453-66; Jan 2018
16. Soumya T and Sabu M. Thampi, Recolorizing dark regions to enhance night surveillance video, Springer Journal on Multimedia Tools and Applications, Springer; 76: 24477–24493; Nov 2017
17. Anjana P. Das and Sabu M. Thampi, Fault-resilient localization for underwater sensor networks, Elsevier Ad Hoc Networks Journal 55:132-42; Feb 2017
18. Soumya T and Sabu M. Thampi , A fuzzy fusion approach to enlighten the illuminated regions of night surveillance videos, Journal of Intelligent & Fuzzy Systems, 3143-3149; Jan 2017
19. Soumya T and Sabu M. Thampi, Self-organized night video enhancement for surveillance systems, Springer Journal on Signal, Image and Video Processing, 11(1):57-64; Jan 2017
20. Peng Zhang, Tony Thomas and Tao Zhuo, Object coding based video authentication for privacy protection in immersive communication, Journal of Ambient Intelligence and Humanized Computing, Springer, pp 1-14, 2016.

1. Teenu S. John and Tony Thomas, Evading Static and Dynamic Android Malware Detection Mechanisms, Eighth International Symposium of Security in Computing and Communications (SSCC’20).
2. Vineetha Mary Ipe and Tony ThomasPeriocular Recognition Under Unconstrained Image Capture Distances, Sixth International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’20).
3. Ragendhu SP and Tony Thomas, Secure Multimodal Biometric Recognition in Principal Component Subspace, International Conference on Applied Soft computing and Communication Networks (ACN’20).
4. Arya Krishnan, Gayathri R Nayar, Tony Thomas and Ake Nystrom, FEBA –An Anatomy Based Finger Vein Classification, 2020 International Joint Conference on Biometrics (IJCB 2020), September 28 – October 1, 2020, USA, IEEE Xplore
5. Devyani Vij, Vivek Balachandran, Tony Thomas, and Roopak Surendran, GRAMAC: A Graph Based Android Malware Classification Mechanism, Tenth ACM Conference on Data and Application Security and Privacy, pp. 156-158. 2020.
6. Teenu S. John, Tony Thomas and Sabu Emmanuel, Graph Convolutional Networks for Android Malware Detection with System Call Graphs, 2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP), India, 2020, IEEE Xplore
7. Vineetha Mary Ipe and Tony Thomas, Periocular Recognition under Unconstrained Conditions Using CNN Based Super-Resolution, International Conference on Applied Soft Computing and Communication Networks (ACN’19), Dec 2019, Lecture Notes in Networks and Systems (LNNS) 125, Springer.
8. Vineetha Mary Ipe and Tony Thomas , CNN Based Periocular Recognition Using Multispectral Images, Fifth International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’19), Dec 2019, Communications in Computer and Information Science Series (CCIS) 1209, Springer.
9. Roopak Surendran, Athira Vijayaraghavan and Tony Thomas, On Effectiveness of Source Code and SSL Based Features For Phishing Website Detection, First International Conference on Advanced Technologies in Intelligent Control, Environment, Computing and Communication Engineering (ICATIECE-2019), IEEE, Bangalore, 19th – 20th March 2019
10. Roopak S., Tony Thomas and Sabu Emmanuel, Android Malware Detection Mechanism Based on Bayesian Model Averaging, Advances in Intelligent Systems and Computing (AISC), Volume 707, pp 87-96, Springer, 2019.
11. Arya Krishnan, Tony Thomas, Gayathri R.Nayar and Sarath SM, Liveness Detection in Finger Vein Imaging Device Using Plethysmographic Signals, 10th International Conference on Intelligent Human Computer Interaction, IHCI 2018, 7th to 9th December 2018, Allahabad, India, LNCS 11276, Springer, pp. 251-260, 2018.
12. Ragendu SP and Tony Thomas, Fast and Accurate Fingerprint Recognition in Principal Component Subspace, International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2018, 27-28 July, 2018 , Bangalore, India, Advances in Intelligent Systems and Computing series, Springer
13. Teenu S. John, Tony Thomas and Md. Meraj Uddin, A Multifamily Android Malware Detection Using Deep Autoencoder Based Feature Extraction, ICoAC 2017, 9th IEEE International Conference on Advanced Computing, December 14-16, 2017, Chennai, India
14. Roopak S., Tony Thomas and Sabu Emmanuel, Android Malware Detection Mechanism Based on Bayesian Model Averaging, 5th International Conference on Advanced Computing, Networking, and Informatics, ICACNI – 2017, 01-03 June 2017, Goa.
15. Peng Zhang, Tony Thomas and Tao Zhuo, An Object-based Video Authentication Mechanism for Smart-Living Surveillance, The 2015 International Conference on Orange Technologies (ICOT2015), Hong Kong, 19 – 22 December 2015.
16. Saleema A and Sabu M. Thampi, Speaker Identification Approach for the Post Pandemic era of Internet of Things, Fourth International Conference on Computing and Network Communications (CoCoNet’20) , October 14-17, 2020, Chennai, India.
17. Indu V and Sabu M. Thampi, A Systematic Review on the Influence of User Personality in Rumor and Misinformation Propagation Through Social Networks, Advances in Signal Processing and Intelligent Recognition Systems. SIRS 2020. Communications in Computer and Information Science, vol 1365. Springer, Singapore. https://doi.org/10.1007/978-981-16-0425-6_17.
18. Saleema A and Sabu M. Thampi, User Recognition using Cognitive Psychology based Behavior Modeling in Online Social Networks, Fifth International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’19), Dec 2019
19. Sreeshma Mohan, Indu V and Sabu M. Thampi, “Think before you post”: A Cognitive Psychological Approach for Limiting Bullying in Social Media, International Conference on Smart City and Informatization (iSCI 2019), Springer; 1122; 418-434; Nov 2019
20. Gemini George and Sabu M. Thampi, Securing Smart Healthcare Systems from Vulnerability Exploitation, 7th International Conference on Smart City and Informatization (iSCI 2019), Communications in Computer and Information Science Series (CCIS), Springer 1122; 295-308; Nov 2019
21. Elizabeth B Varghese and Sabu M Thampi, A Deep Learning Approach to Predict Crowd Behavior Based on Emotion, International Conference on Smart Multimedia, Springer; 296-307; Aug 2018
22. Gemini George and Sabu M. Thampi, A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks, International Symposium on Security in Computing and Communication, Springer, Bangalore, India (Best Paper Award) 969:1-23; Sep 2018
23. Athira U and Sabu M. Thampi, Authorship Analysis of Social Media Contents Using Tone and Personality Features, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS), Springer 10656; 212-228; Dec 2017
24. Divya S. Vidyadharan and Sabu M. Thampi, Detecting Spliced Face Using Texture Analysis, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Springer 10658; 805-813; Dec 2017
25. Manju S Nair, Rajasree M S and Sabu M. Thampi, Fine-Grained, Multi-key Search Control in Multi-user Searchable Encryption, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Springer; 10658:814-825; Dec 2017
26. Deepthi P S and Sabu M. Thampi, A Privacy Preserving and Safety-Aware Semi-supervised Model for Dissecting Cancer Samples, International Conference on Computational Collective Intelligence, Springer; 129-138; Sep 2017
27. Divya S. Vidyadharan and Sabu M. Thampi, Illuminant Color Inconsistency as a Powerful Clue for Detecting Digital Image Forgery: A Survey, International Symposium on Intelligent Systems Technologies and Applications, Springer; 683: 279-297; Sep 2017
28. Divya S. Vidyadharan and Sabu M. Thampi, Digital Image Forgery Detection using Compact Multi-texture Representation, Journal of Intelligent and Fuzzy Systems, 32; 3177-3188; 2017
29. Asha Liza John and  Sabu M. Thampi, Encryption scheme based on hyperelliptic curve cryptography, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Springer 491-506; Nov 2016
30. Asha Liza John and  Sabu M. Thampi, Mutual authentication based on HECC for RFID implant systems, International Symposium on Security in Computing and Communication, Springer 18-29; Sep 2016
31. Anjana P. Das and Sabu M. Thampi, Single anchor node based localization in mobile underwater wireless sensor networks, International Conference on Algorithms and Architectures for Parallel Processing, Springer; 757-770; Nov 2015
32. Divya S. Vidyadharan and Sabu M. Thampi, Detecting spliced face in a group photo using PCA, 7th IEEE International Conference on Soft Computing and Pattern Recognition (SoCPaR), 175-180; Nov 2015
33. Athira U and Sabu M. Thampi, Hallmarking Author Style from Short Texts by Multi-Classifier Using Enhanced Feature Set, Third International Symposium on Women in Computing and Informatics, 284-289; Aug 2015
34. Divya S. Vidyadharan and Sabu M. Thampi, Brightness distribution based image tampering detection, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), 1-5; Feb 2015
35. Soumya T and Sabu M. Thampi, Day color transfer based night video enhancement for surveillance system, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), 1-5; Feb 2015
36. Angel Rose A and Sabu M. Thampi, A secure verifiable scheme for secret image sharing, Elsevier Procedia Computer Science, 58:140-50; Jan 2015

Books

1. Tony Thomas, Roopak Surendran, Teenu S John and Mamoun Alazab, Intelligent Mobile Malware Detection, CRC Press, Taylor and Francis, Expected date of publication: 2021 (Book)
2. Tony Thomas, Sabu Emmanuel, Athira P. Vijayaraghavan, Machine Learning Techniques in Cyber Security Analytics, Springer Nature, March 2020. (Book)
3. R. Maheswar, G. R. Kanagachidambaresan, R. Jayaparvathy and Sabu M. Thampi, Body Area Network Challenges and Solutions, Springer, 2019 (Edited Book)
4. Rajkumar Buyya and Sabu M. Thampi, Intelligent Distributed Computing, Springer-Verlag Berlin Heidelberg, Germany, September, 2014.(Edited Book)
5. Sabu M. Thampi, Bharat Bhargava and Pradeep Atrey, Managing Trust in Cyberspace, CRC Press, Taylor & Francis Group, USA, December, 2013.(Edited Book)

Book Chapters

1. Gayathri KS and Tony Thomas, Intrusion Detection Systems for Internet of Things, Book Chapter, Handbook of Research on Intrusion Detection Systems, IGI Global, 2020
2. Teenu S John, Tony Thomas, Adversarial Attacks and Defenses in Malware Detection Classifiers, Book Chapter, Advanced Research on Cloud Computing, Big Data, and the IoT, IGI Global, 2019.
3. Devi V.S.,Roopak S. and Tony Thomas, Md. Meraj UddinMulti-Pattern Matching Based Dynamic Malware Detection in Smart Phones, Book Chapter, Energy Efficient Computing: Devices, Circuits and Systems, CRC press, 2018
4. Roopak S, Tony Thomas and Sabu Emmanuel,Detection of Malware Applications in Android Smart Phones, World Scientific Reference on Innovation, Volume 4: Innovation in Information Security, World Scientific Publishing, 2018.
5. Aiswarya S. Nair and Sabu M Thampi, Book Chapter, “Flying Ad-hoc Networks: Security, Authentication protocols and Future directions”, In book: “Internet of Things and Secure Smart Environments: Success and Pitfalls”, CRC Press, USA.
6. Sunitha Krishnan K S and Sabu M Thampi, Book Chapter, “Deep Learning Approaches for IoT Security in the Big Data Era”, In book: Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham, 2020.
7. Fabi AK and Sabu M Thampi, Book Chapter, “Secure Big data Transmission with Trust management for Internet of Things (IoT)”, In book: Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham, 2020.
8. Indu V and Sabu M Thampi. “Nature Inspired Approaches for Social Network Security”, Invited Book Chapter, Nature-inspired Security and Resilience: Fundamentals, Technology and Applications, IET, UK, 2019, DOI: 10.1049/PBSE010E_ch
9. Athira U and Sabu M Thampi. “Dark Web and Its Research Scopes”, Book Chapter, In book: Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism, IGI Global, 2019, DOI: 10.4018/978-1-5225-8976-1.ch010
10. Elizabeth B Varghese and Sabu M Thampi. “IoT based Smart Surveillance: Role of Sensor Data Analytics and Mobile Crowd Sensing in Crowd Behavior Analysis”, Invited Book Chapter, In book Crowd Assisted Networking and Computing, published by CRC Press, Taylor & Francis, USA, DOI: 10.1201/9780429453731-3
11. G. R. Kanagachidambaresan, R. Maheswar, R. Jayaparvathy, Sabu M. Thampi and V. Mahima, “Fail Safe Routing Algorithm for Green Wireless Nano Body Sensor Network (GWNBSN)”, Book Chapter, Body Area Network Challenges and Solutions. EAI/Springer Innovations in Communication and Computing. Springer, Cham, pp. 131-149, 2018
12. Saleema and Sabu M. Thampi. “Voice Biometrics: The Promising Future of Authentication in the Internet of Things.” Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science. IGI Global, 2018. 360-389. doi:10.4018/978-1-5225-5972-6.ch017
13. Deepthi, P. S., and Sabu M. Thampi. ‘Trends in Mining Biological Big Data,’ Book Chapter, Computational Intelligence Applications in Business Intelligence and Big Data Analytics, CRC Press, Taylor and Francis Group pp. 97-117, June 2017 (ISBN: 9781498761017)
14. Athira U and Sabu M. Thampi. ‘Authorship Analysis: Techniques and Challenges’, Book Chapter, Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism, IGI Global, USA, DOI: 10.4018/978-1-4666-8345-7.ch010

Funding

Will be published soon

Events

Conferences/Workshops:

International Workshop on Cyber Threat Resilience, October 13, 2015  

First International Conference on Security in Computer Networks and Distributed Systems (SNDS’12), October 11-12, 2012

Second International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), March 13-14, 2014

First International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS-2014), , March 13-14, 2014

Second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’15), December 16-19, 2015

• 2015 International Conference on Computing and Network Communications (CoCoNet’15), December 16-19, 2015

• Workshop on “Machine Learning for Cybersecurity”, December 17th-19th, 2018

• Workshop on Women in CyberSecurity Research (WCR’18), May 25-26, 2018

• CIFOR-’18 workshop on Computer Vision Intelligence and Digital Forensics, 07 Sep to 08 Sep, 2018

• Third International Conference on Computing and Network Communications (CoCoNet’19), December 18-21, 2019

• Seventh International Symposium on Security in Computing and Communications (SSCC’19), December 18-21, 2019

• Symposium on Machine Learning and Metaheuristics Algorithms, and Applications (SoMMA’19), December 18-21, 2019

• Fifth International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’19), December 18-21, 2019

• Fifth International Symposium on Intelligent Systems Technologies and Applications (ISTA’19), December 18-21, 2019

• International Conference on Applied Soft Computing and Communication Networks (ACN’19), December 18-21, 2019

Training Programmes:

will be shared soon

News

Will be published soon