
Geo Francis Edakulathur- Master of Computer Applications
- Research Scholar at Karpagam Academy of Higher Education
Geo Francis Edakulathur
- Master of Computer Applications
- Research Scholar at Karpagam Academy of Higher Education
HSST Jr., St. Aloysius H.S.S., Elthuruth, Thrissur, India
About
18
Publications
1,474
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
166
Citations
Introduction
Working as H.S.S.T Jr. (CS) at St. Aloysius H.S.S. Elthuruth, Kerala, India.
Received B.Sc. in Computer Science, Mathematics and Statistics from Bangalore University and MCA from Madras University. Received the B.Ph. in Philosophy and B.Th. in Theology from Dharmaram Vidya Kshetram, a Pontifical Athenaeum, Bangalore. Currently pursuing Ph.D. in Computer Science with Karpagam Academy of Higher Education, Coimbatore, India.
Skills and Expertise
Current institution
Additional affiliations
October 2015 - present
St. Aloysius H.S.S. Elthuruth
Position
- H.S.S.T Jr.
Description
- Working as a H.S.S.T. Jr.
Education
January 2021 - January 2025
June 2007 - March 2010
Dharmaram Vidya Kshetram
Field of study
- Theology
June 2004 - March 2007
Loyola College Chennai
Field of study
- Computer Applications
Publications
Publications (18)
This chapter delves into the ever-evolving Internet of Things (IoT) and its security challenges. In the context of the increasing number of interconnected smart devices, the chapter explores the rising potential for cyber threats, covering emerging threats, IoT vulnerabilities, attack vectors, and security best practices. It aims to assist individu...
The IoT’s remarkable growth rate has attracted cybercriminals’ attention more than ever. The rising number of cyberattacks on IoT devices and intermediary communication mediums support the assertion. There are various ways for attackers to tamper with the IoT data distribution service. Since it affects data secrecy, the Blackhole attack was the mos...
The world is rapidly arriving at the period of the IoT, which connects all types of technology to digital services and provides us with great ease. As the quantity of IoT-connected equipment increases rapidly, there may be a rise in network vulnerabilities, leading to an increase in network threats. Fog computing seems to be a distinctive paradigm...
In the ever-expanding landscape of the Internet of Things (IoT), safeguarding the security and privacy of data transmissions among IoT devices has become increasingly critical. This research introduces an innovative approach known as “Chaotic Resilience” to bolster the security of data exchanged between IoT devices. While traditional encryption met...
This paper introduces a novel intrusion detection system (IDS) with self-adaptive capabilities, specifically designed to enhance the security of Internet of Things (IoT) networks. The rapid growth and interconnectivity of IoT devices expose them to a wide array of cyber threats, demanding intelligent and adaptable defense mechanisms. Our proposed I...
In the Internet of Things, intrusion detection entails keeping an eye on device activity and network traffic in order to spot and address possible security lapses. Early threat detection, sensitive data protection, and cyberattack mitigation are some of its benefits. False positives, resource-intensive monitoring, and the difficulty of staying up t...
For minimizing security vulnerabilities and attacks, which affect Internet of Things (IoT) applications’ performance, it is essential to design an efficient authentication protocol owing to the rapid deployment of IoT. This paper proposes a bi-level Intrusion Detection (ID) in IoT using an ensemble and Arctan-based Gated Recurrent Unit-Recurrent Ne...
The rapid proliferation of Internet of Things (IoT) devices has revolutionized various domains, introducing unprecedented convenience and efficiency. However, this expansion has concurrently intensified the obstacles associated with network security. Detecting and mitigating anomalies in IoT networks are of utmost importance to protect critical sys...
A wireless Sensor Network (WSN) is made up of many sensor nodes which gather and transmit data to a central location. The limited resources of the nodes create significant security challenges when deploying and communicating WSNs. The detection of unauthorized access is a crucial aspect of enhancing the security measures of WSNs. The utilization of...
In recent times, IoT has been used in a wide range of applications for improving the quality of life. Conversely, IoT turns out to be progressively a superlative target for malicious attacks due to its huge range of openness, distributed nature, and objects. However, for maintaining IoT system security, there is a need for an effective Intrusion de...
Security has elevated to a top priority with the expansion of devices connected in the IoT. This research proposes a two-tier convolutional deep-learning model-based IDS to handle this problem. The suggested IDS calls for pre-processing step-by-step min-max normalisation, feature extraction, and use of statistical features like skewness, mean, stan...
Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Design...
Wireless Sensor Networks (WSN), which collect a large amount of confidential data related to the activities of the user, have emerged as a promising research platform recently. The main purpose of ambient intelligence might be easily damaged by an attacker tampering with those kinds of data. Hence, it is significant to secure the data. In the exist...
With the growth of the number in smart devices based on IoT, keeping a secure data processing among them has become even more significant in cloud computing. However, a high security is needed to protect the huge amount of data privacy. In this regard, many authentication approaches are presented in IoT-Cloud-based Architecture. However, computatio...