Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

portfolio

publications

A Self-Tuning Hybrid Fuzzy-PID Controller for First Order Hydraulic Systems

Published in 2015 Fifth International Conference on Advances in Computing and Communications (ICACC), 2015

This paper presents a Self-Learning Hybrid Fuzzy-PID Controller developed for pressure control in a first order hydraulic tank system, featuring self-adjusting tuning parameters for improved performance.

Recommended citation: J Jithish, KS Arun Nath, Deepa Sivan, Biju C Oommen. (2015). "A Self-Tuning Hybrid Fuzzy-PID Controller for First Order Hydraulic Systems." 2015 Fifth International Conference on Advances in Computing and Communications (ICACC), pp.75-78. https://ieeexplore.ieee.org/abstract/document/7433779

A Hybrid Adaptive Rule based System for Smart Home Energy Prediction

Published in DIAS/EDUDM@ ISEC, 2017

This study presents a hybrid intelligent system integrating neural networks and fuzzy systems for predicting daily electricity demand in smart homes.

Recommended citation: J Jithish, Sriram Sankaran. (2017). "A Hybrid Adaptive Rule based System for Smart Home Energy Prediction." DIAS/EDUDM@ ISEC.

Modelling the Impact of Code Obfuscation on Energy Usage

Published in DIAS/EDUDM@ ISEC, 2017

This study models the impact of code obfuscation algorithms on energy usage in embedded devices, analyzing the energy-security-performance trade-offs.

Recommended citation: Athul Raj, J Jithish, Sriram Sankaran. (2017). "Modelling the Impact of Code Obfuscation on Energy Usage." DIAS/EDUDM@ ISEC.

A neuro-fuzzy approach for domestic water usage prediction

Published in 2017 IEEE Region 10 Symposium (TENSYMP), 2017

This study develops a hybrid intelligent system for domestic water usage prediction using an Adaptive Neuro-Fuzzy Inference System (ANFIS).

Recommended citation: J Jithish, Sriram Sankaran. (2017). "A neuro-fuzzy approach for domestic water usage prediction." 2017 IEEE Region 10 Symposium (TENSYMP), pp.1-5.

Sybil attack in IoT: Modelling and defenses

Published in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017

This paper models sybil attacks in IoT, evaluating its impact on performance, and develops a defense mechanism based on behavioural profiling of nodes using an enhanced AODV protocol.

Recommended citation: Anjana Rajan, J Jithish, Sriram Sankaran. (2017). "Sybil attack in IoT: Modelling and defenses." 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.2323-2327.

Securing networked control systems: Modeling attacks and defenses

Published in 2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 2017

This study develops an analytical model for DoS and Deception attacks in NCS, proposing a symmetric key encryption based mechanism for securing NCS from such attacks.

Recommended citation: J Jithish, Sriram Sankaran. (2017). "Securing networked control systems: Modeling attacks and defenses." 2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), pp.7-11.

Towards a decision-centric approach for securing cyber physical systems

Published in 2018 10th International Conference on Communication Systems & Networks (COMSNETS), 2018

This work uses Markov Decision Processes (MDP) to decide the threshold for initiating security mechanisms in CPS, aiming to balance the trade-off between system performance and security.

Recommended citation: J Jithish, Sriram Sankaran. (2018). "Towards a decision-centric approach for securing cyber physical systems." 2018 10th International Conference on Communication Systems & Networks (COMSNETS), pp.500-502.

A bio-inspired approach to secure networked control systems against adversarial delays

Published in Journal of Intelligent & Fuzzy Systems, 2019

This work leverages the Lotka-Volterra (LV) competition model to analyze the impact of time-delays in an NCS compromised by an adversary, proposing a fuzzy logic based defense mechanism.

Recommended citation: J Jithish, Sriram Sankaran. (2019). "A bio-inspired approach to secure networked control systems against adversarial delays." Journal of Intelligent & Fuzzy Systems, Vol. 36, No. 4, pp.3779-3790.

Attack detection based on statistical analysis of smartphone resource utilization

Published in 2019 IEEE 16th India Council International Conference (INDICON), 2019

This work proposes a novel approach using statistical analysis and information theory to detect malware-based attacks on smartphones, leveraging data such as CPU usage, RAM utilization, and network data.

Recommended citation: Jai Prakash, Sriram Sankaran, J Jithish. (2019). "Attack detection based on statistical analysis of smartphone resource utilization." 2019 IEEE 16th India Council International Conference (INDICON), pp.1-4. https://ieeexplore.ieee.org/abstract/document/9030310

Towards ensuring trustworthiness in cyber-physical systems: A game-theoretic approach

Published in 2020 International Conference on Communication Systems & NETworkS (COMSNETS), 2020

This work presents an analytical framework based on non-cooperative game theory to evaluate the trustworthiness of individual sensor nodes in CPS, using a game-theoretic model to derive a trust threshold criterion.

Recommended citation: J Jithish, Sriram Sankaran, Krishnashree Achuthan. (2020). "Towards ensuring trustworthiness in cyber-physical systems: A game-theoretic approach." 2020 International Conference on Communication Systems & NETworkS (COMSNETS), pp.626-629. https://ieeexplore.ieee.org/abstract/document/9027362

A Decision-centric approach for secure and energy-efficient cyber-physical systems

Published in Journal of Ambient Intelligence and Humanized Computing, 2021

This paper discusses a novel approach for balancing energy efficiency and security in Cyber-Physical Systems (CPSs), focusing on dynamic security mechanisms activated during cyberattacks.

Recommended citation: J Jithish, Sriram Sankaran, Krishnashree Achuthan. (2021). "A Decision-centric approach for secure and energy-efficient cyber-physical systems." Journal of Ambient Intelligence and Humanized Computing, 12, pp.417-441. https://link.springer.com/article/10.1007/s12652-020-01995-z

A game‐theoretic approach for ensuring trustworthiness in cyber‐physical systems with applications to multiloop UAV control

Published in Transactions on Emerging Telecommunications Technologies, 2021

This work presents an analytical framework based on noncooperative game theory to evaluate the trustworthiness of individual nodes in CPSs, with applications to multiloop UAV control.

Recommended citation: J Jithish, Sriram Sankaran. (2021). "A game‐theoretic approach for ensuring trustworthiness in cyber‐physical systems with applications to multiloop UAV control." Transactions on Emerging Telecommunications Technologies, 32(5), e4042. https://onlinelibrary.wiley.com/doi/abs/10.1002/ett.4042

Predictive Modelling Based Approaches for Secure and Energy Efficient Cyber Physical Systems

Published in Amrita Vishwa Vidyapeetham, 2022

This work by J Jithish focuses on predictive modelling approaches aimed at enhancing the security and energy efficiency of Cyber Physical Systems.

Recommended citation: J Jithish. (2022). "Predictive Modelling Based Approaches for Secure and Energy Efficient Cyber Physical Systems." Amrita Vishwa Vidyapeetham. https://shodhganga.inflibnet.ac.in/handle/10603/367401

Distributed Anomaly Detection in Smart Grids: A Federated Learning-Based Approach

Published in IEEE Access, 2023

This paper discusses the integration of Information and Communication Technologies (ICT) in smart grids for anomaly detection using Machine Learning (ML) techniques, focusing on privacy-preserving federated learning approaches.

Recommended citation: J Jithish, Bithin Alangot, Nagarajan Mahalingam, Kiat Seng Yeo. (2023). "Distributed Anomaly Detection in Smart Grids: A Federated Learning-Based Approach." IEEE Access, 11, pp.7157-7179. https://ieeexplore.ieee.org/abstract/document/10018378/

talks

teaching

Cloud Computing

Undergraduate course, Amrita Vishwa Vidyapeetham, Center for Cybersecurity Systems and Networks, 2019

Syllabus

  1. Introduction to Cloud Computing
    • Overview of cloud services
    • Basic cloud models (IaaS, PaaS, SaaS)
    • Cloud providers overview (AWS, Azure, GCP)
  2. Advanced Cloud Solutions
    • Designing scalable architectures
    • Cloud security and compliance
    • Cost optimization strategies
  3. DevOps in the Cloud
    • CI/CD pipelines and automation
    • Infrastructure as Code (IaC)
    • Monitoring and logging in cloud environments

Information Security

Undergraduate course, Amrita Vishwa Vidyapeetham, Center for Cybersecurity Systems and Networks, 2019

Syllabus

  1. Fundamentals of Information Security
    • Understanding security principles
    • Basics of cryptography
    • Network security essentials
  2. Advanced Cybersecurity Practices
    • Ethical hacking and penetration testing
    • Incident response and forensics analysis
    • Security policy formulation and implementation
  3. Emerging Threats and Defenses
    • IoT and mobile security
    • Cloud security best practices
    • AI and ML in cybersecurity