Abirami K. currently serves as Assistant Professor at Department of Computer Science and Engineering, School of Engineering, Coimbatore Campus. Her areas of research include Web Security.

Work Experience

Year Affiliation
March 2008 - Present Assistant Professor, Department of Computer Science and Engineering at Amrita Vishwa Vidyapeetham, Coimbatore
January 2007 - February 2008 Software Programmer at Icatalyst Interactive Solutions, Chennai
July 2006 - December 2006 Lecturer at Avinashilingam University(Faculty of Engineering)


  • Computer Networks
  • Object Oriented Programming
  • Computer Programming
  • Computational Thinking and Problem Solving

Invited Talks

  • Technical talk at SNS College of Technology on "Computer Networks and Hands-On Training in CISCO Packet Tracer".
  • Technical Talk at P.A. College of Engineering and Technology ,Pollachi on “Computer Networks”


Publication Type: Conference Paper

Year of Publication Title


Abirami K., Harini, D. N., Vaidhyesh, P. S., and Dr. Priyanka Kumar, “Analysis of Web Workload on QoS to Assist Capacity planning”, in International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), 2018.[Abstract]

Workload characterization is a well-established discipline, which finds its applications in performance evaluation of modern Internet services. With the high degree of popularity of the Internet, there is a huge variation in the intensity of workload and this opens up new challenging performance issues to be addressed. Internet Services are subject to huge variations in demand, with bursts coinciding with the times that the service has the most value. Apart from these flash crowds, sites are also subject to denial-of-service (DoS) attacks that can knock a service out of commission. The paper aims to study the effect of various workload distributions with the service architecture ‘thread-per-connection’ in use as a basis. The source model is structured as a sequence of activities with equal execution time requirement with an additional load time of page (loading embedded objects, images, etc.). The threads are allocated to the requests in the queue; leftover requests if any are denied service. The rejection rate is used as a criterion for evaluation of the performance of the system with a given capacity. The proposed model could form a basis for various system models to be integrated into the system and get its performance metrics (i.e. QoS) evaluated.

More »»

Publication Type: Journal Article

Year of Publication Title


M. K.A, G., R., and Abirami K., “Mobile Interaction based on Eye Movement”, International Journal of Engineering and Technology(UAE)Open Access, vol. 7, no. 2, 2018.[Abstract]

In the looking for hithertio-unused strategies by which clients and PCs can convey, we explore the value of eye developments as a quick and helpful correspondence mode. As cell phones develop analysts are examining new strategies to facilitate the human-portable cooperation. The obstruction to misusing this medium has not been eye-following innovation but rather the investigation of cooperation methods that join eye developments into the client PC exchange in a characteristic and unpretentious way. This paper discusses some of the human factors and the possible technical considerations that can arise by using eye movement as input medium.

More »»


A. Suresh, Babu, V., Jithin, J., Manne, J., and Abirami K., “Sybil defense mechanisms: A survey”, International Journal of Applied Engineering Research, vol. 10, pp. 24693-24700, 2015.[Abstract]

Sybils are fake identities in any network. Sybils cannot be matched to a physical identity. There are several mechanisms to detect Sybil Attacks in networks. In this paper we are discussing Sybil Defense Mechanisms in Social Networks. We have included the working principles of existing Decentralized Sybil Defenses and the assumptions under which these mechanisms operate. We have also gathered information supporting the fact that the assumptions about Social Networks are flawed. Certain drawbacks of each mechanism have also been looked into. © Research India Publications.

More »»


sathyabapuju Sai and Abirami K., “Comparative study on linear and non linear models for spell correction”, International journal of computer science and Information technologies, vol. 5, no. 4, pp. 5734-5736, 2014.[Abstract]

Machine learning techniques are provided with small amount of data to learn and training models are expected to evolve in course of time with continuous and incremental learning. Each technique has different requirements and performance. In this article, an evaluation of two different machine learning techniques and how these could be used for isolated spelling correction have been explained. Measures of similarities based on distance and probability is used as features to train the model. Learning can be made specific to every language model by providing necessary data from the domain More »»

Publication Type: Conference Proceedings

Year of Publication Title


Abirami K., Jasty, S. J., and Jaswanth, S., “A Consummate Smart Water Management System using Esp8266 Microcontroller”, Conference CAASR 2nd ICATCA'16 & CAASR 2nd ICCMP'16 CAASR Second International Conferences on Advanced Theoretical Computer Applications and Contemporary Management Practices Kuala Lumpur, Malaysia . 2016.


S. Jose, Priyadarshini, K., and Abirami K., “An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection”, Proceedings of the International Conference on Soft Computing Systems. Springer India, New Delhi, 2016.[Abstract]

Web application vulnerabilities enable attackers to perform malicious activities that can cause huge losses to the users. Web application vulnerability scanners are automated Black-Box testing tools that identify the vulnerabilities prevailing in a web application. The scanners have gained popularity with time due to its ability to detect the application architecture weaknesses without accessing the source codes of the target web applications. However, a scanner has its own limitations as well. This paper focuses on analyzing the web application vulnerability scanners' ability to detect SQL injection and therefore we test a set of three open-source scanners against a set of custom-built test samples with various categories of SQL injection.

More »»


Abirami K. and V. Reddy, S., “Peer to Peer File Sharing Using IRM”, In Proceedings of National Conference On Computer Science And Informatics(NCCSI’12). 2012.

Faculty Research Interest: