Personal Profile
Dr.Shina Sheen
Academic Title: Professor
Dept. of Applied Mathematics & Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu, India.
Date of Joining: 10/06/2005
Educational Qualification(s): B.Sc ( Physics ) - Calicut University - 1993M.C.A ( ) - Bharathiar University - 1996Ph.D ( Computer Science ) - Anna University - 02/23/2015Supervisor: Dr.R.AnithaComputer Science ( Computer Science ) - Anna University - 05/20/2007
Certificate Course(s):- GIAC Certified Intrusion Analy
In Brief
Shina Sheen is the Professor and Head in the Department of Applied Mathematics and Computational Sciences of PSG College of Technology, Coimbatore India. She received her PhD degree from Anna University. She is also the programme head for the MSc Cyber Security in the department. She holds the SANS GCIA certification in Intrusion detection in depth and also attended the live training of Hacker tools and techniques GCIH certification programme of SANS. She has two funded projects sanctioned by the Department of Science and Technology, Government of India one on Proactive detection of Ransomware and the other an infrastructure development fund in setting up a Centre for Cybersecurity Research and Education. Her current professional interests are in Computer Security and Data mining and specially focusing towards proactive methods for ransomware detection.
She is a member of ACM, Cryptology Research Society of India and the Computer Society of India.
Subject Expertise
Data Mining TCP/IP Networks and Applications Intelligent Information Retrieval
Research Area
Information Security Ransomware Attack Detection
International & National Journals
S.No. |
Journal |
Paper Title |
Year |
Role |
Volume |
1 |
Computers and Electrical Engineering |
R-Sentry: Deception based ransomware detection using file access patterns |
2022 |
Main Author |
103 |
2 |
SN Computer Science |
Darknet Traffic Analysis and Classification Using Numerical AGM and Mean Shift Clustering Algorithm |
2019 |
Co Author |
1 |
3 |
Neurocomputing, |
Android based malware detection using a Multifeature Collaborative fusion approach |
2014 |
Main Author |
151 |
4 |
The Computer Journal |
Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks. |
2014 |
Co Author |
58 |
5 |
Pattern Recognition Letters |
Malware detection by pruning of parallel ensembles using harmony search |
2013 |
Main Author |
34 |
International & National Conferences
S.No. |
Conference Title |
Paper Title |
Date |
Role |
Organized By |
1 |
Book cover Book cover Proceedings of Third International Conference on Communication, Computing and Electronics Systems |
Early Detection of Android Locker Ransomware Through Foreground Activity Analysis |
28-10-2021 |
Main Author |
PPG Institute of Technology, Coimbatore, |
2 |
ICACCI 2018 |
Ransomware detection by mining API call usage |
13-12-2018 |
Main Author |
OTHERS |
3 |
ACM conference on Women in Computing WCI 2015 |
Malware Detection in Android files based on multiple levels of Learning and Diverse Data Sources |
10-08-2015 |
Main Author |
|
4 |
ICC3 2013 |
Comparative Study of Two- and Multi-Class-Classification-Based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set |
19-12-2013 |
Main Author |
|
5 |
International Conference on Neural Information Processing ICONIP 2012 |
A Novel Node Splitting Criteria for Decision Trees Based on Theil Index |
12-11-2012 |
Main Author |
|
6 |
SecureIT 2012 |
Detection of StegoBot: A Covert Social Network Botnet |
17-08-2012 |
Main Author |
|
7 |
7th International Conference on Hybrid Artificial Intelligence System, HAIS 2012 |
"Ensemble pruning using Harmony Search |
28-03-2012 |
Main Author |
|
8 |
TENCON 2008 |
Network Intrusion Detection with feature selection and Decision Tree Classifier |
19-11-2008 |
Main Author |
|
Books Published
S.No. |
Publisher |
Title |
Year |
Role |
Edition |
1 |
Springer |
Computational Intelligence, Cyber Security and Computational Models |
2016 |
Co Author |
1 |
2 |
Springer |
Digital Connectivity – Social Impact: |
2016 |
Co Author |
1 |
Programmes Organised
S.No. |
Title of the Programme |
From |
To |
Sponsoring Agency |
No. of Audience |
1 |
Ethical Hacking and malware analysis |
04-08-2022 |
05-08-2022 |
DST |
50 |
2 |
Ethical Hacking and malware analysis |
04-08-2022 |
05-08-2022 |
DST |
50 |
3 |
Network Forensics - A Traffic Analysis Perspective |
19-03-2016 |
20-03-2016 |
Nil |
30 |
4 |
International Conference on Computational Intelligence, Cyber Security, Computational Models - ICC3-2015 |
17-12-2015 |
19-12-2015 |
DRDO,UGC,PSG |
65 |
Programmes Attended
S.No. |
Title of the Programme |
From |
To |
Organized by |
Sponsoring Agency |
1 |
GIAN Course on Big Data Stream Analytics |
26/10/2017 |
01/11/2017 |
IIT Indore |
IIT Indore |
2 |
SANS Hacker Tools, Techniques, Exploits, and Incident Handling |
20/02/2017 |
25/02/2017 |
SANS USA |
SANS USA |
3 |
SANS Intrusion Detection in depth |
18/05/2015 |
23/05/2015 |
SANS USA |
SANS USA |
4 |
1st IKDD Conference on Data Sciences, organized by ACM, Delhi |
21/03/2013 |
23/03/2013 |
PSG |
PSG |
5 |
Workshop on Machine Learning |
01/08/2012 |
05/08/2012 |
Microsoft Research |
Microsoft Research |
6 |
International Conference on Hybrid Artificial Intelligent Systems HAIS 2012 |
28/03/2012 |
30/03/2012 |
University of Salamanca |
University of Salamanca |
7 |
The 2011 Summer school on security and privacy-Microsoft Research |
18/06/2011 |
30/06/2011 |
Microsoft Research |
Microsoft Research |
8 |
National Conference on Intelligent Computing,BIG 2010 |
12/02/2010 |
13/02/2010 |
CSI |
CSI |
9 |
Nature and Bio Inspired Computing NaBIC 2009 |
09/12/2009 |
12/12/2009 |
PSG College of Technology |
Machine Intelligence Research (MIR) Labs |
Awards and Achievements
S.No. |
Title of the Award |
Awarded By |
Date of Achievement |
1 |
Active Participation Award (Woman) |
Computer Society of India (CSI) |
21/01/2018 |
Doctoral Guidance / Supervision : In Progress
S.No. |
Name of the Candidate |
Area of Research |
1 |
Ms.Kiruthika J
|
Security Analytics |
2 |
Mrs.Parisa Begum K
|
Pervasive Computing |
Sponsored Research Projects
S.No. |
Title of the Project |
Sponsoring Agency |
Role |
1 |
FIST _ DST |
DST |
Co Investigator |
2 |
Detection and mitigation of ransomware in Cyber physical healthcare systems |
DST |
Principal Investigator |
|