Qualification: 
M.E
k_abirami@cb.amrita.edu

Abirami K. currently serves as Assistant Professor at Department of Computer Science and Engineering, School of Engineering, Coimbatore Campus. Her areas of research include Web Security.

Work Experience

Year Affiliation
March 2008 - Present Assistant Professor, Department of Computer Science and Engineering at Amrita Vishwa Vidyapeetham, Coimbatore
January 2007 - February 2008 Software Programmar at Icatalyst Interactive Solutions, Chennai
July 2006 - December 2006 Lecturer at Avinashilingam University(Faculty of Engineering)

Teaching

  • Computer Networks
  • Object Oriented Programming
  • Computer Programming
  • Computational Thinking and Problem Solving

Invited Talks

  • Technical talk at SNS College of Technology on "Computer Networks and Hands-On Training in CISCO Packet Tracer".
  • Technical Talk at P.A. College of Engineering and Technology ,Pollachi on “Computer Networks”

Publications

Publication Type: Journal Article

Year of Conference Publication Type Title

2018

Journal Article

M. K.A, G., R., and Abirami K., “Mobile Interaction based on Eye Movement”, International Journal of Engineering and Technology(UAE)Open Access, vol. 7, no. 2, 2018.[Abstract]


In the looking for hithertio-unused strategies by which clients and PCs can convey, we explore the value of eye developments as a quick and helpful correspondence mode. As cell phones develop analysts are examining new strategies to facilitate the human-portable cooperation. The obstruction to misusing this medium has not been eye-following innovation but rather the investigation of cooperation methods that join eye developments into the client PC exchange in a characteristic and unpretentious way. This paper discusses some of the human factors and the possible technical considerations that can arise by using eye movement as input medium.

More »»

2015

Journal Article

A. Suresh, Babu, V., Jithin, J., Manne, J., and Abirami K., “Sybil defense mechanisms: A survey”, International Journal of Applied Engineering Research, vol. 10, pp. 24693-24700, 2015.[Abstract]


Sybils are fake identities in any network. Sybils cannot be matched to a physical identity. There are several mechanisms to detect Sybil Attacks in networks. In this paper we are discussing Sybil Defense Mechanisms in Social Networks. We have included the working principles of existing Decentralized Sybil Defenses and the assumptions under which these mechanisms operate. We have also gathered information supporting the fact that the assumptions about Social Networks are flawed. Certain drawbacks of each mechanism have also been looked into. © Research India Publications.

More »»

2014

Journal Article

sathyabapuju Sai and Abirami K., “Comparative study on linear and non linear models for spell correction”, International journal of computer science and Information technologies, vol. 5, no. 4, pp. 5734-5736, 2014.[Abstract]


Machine learning techniques are provided with small amount of data to learn and training models are expected to evolve in course of time with continuous and incremental learning. Each technique has different requirements and performance. In this article, an evaluation of two different machine learning techniques and how these could be used for isolated spelling correction have been explained. Measures of similarities based on distance and probability is used as features to train the model. Learning can be made specific to every language model by providing necessary data from the domain More »»

Publication Type: Conference Proceedings

Year of Conference Publication Type Title

2016

Conference Proceedings

S. Jose, Priyadarshini, K., and Abirami K., “An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection”, Proceedings of the International Conference on Soft Computing Systems. Springer India, New Delhi, 2016.[Abstract]


Web application vulnerabilities enable attackers to perform malicious activities that can cause huge losses to the users. Web application vulnerability scanners are automated Black-Box testing tools that identify the vulnerabilities prevailing in a web application. The scanners have gained popularity with time due to its ability to detect the application architecture weaknesses without accessing the source codes of the target web applications. However, a scanner has its own limitations as well. This paper focuses on analyzing the web application vulnerability scanners' ability to detect SQL injection and therefore we test a set of three open-source scanners against a set of custom-built test samples with various categories of SQL injection.

More »»

2016

Conference Proceedings

Abirami K., Jasty, S. J., and Jaswanth, S., “A Consummate Smart Water Management System using Esp8266 Microcontroller”, Conference CAASR 2nd ICATCA'16 & CAASR 2nd ICCMP'16 CAASR Second International Conferences on Advanced Theoretical Computer Applications and Contemporary Management Practices Kuala Lumpur, Malaysia . 2016.

2012

Conference Proceedings

Abirami K. and V. Reddy, S., “Peer to Peer File Sharing Using IRM”, In Proceedings of National Conference On Computer Science And Informatics(NCCSI’12). 2012.

Faculty Research Interest: 
207
PROGRAMS
OFFERED
6
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS