FDP ON AI tools for academic research
FDP ON AI tools for academic research
FDP ON AI tools for academic research
In a hyper-connected world, you are the digital defense. We train you to anticipate attacks before they happen. You will learn to secure critical infrastructure, banking systems, and national data from invisible threats.
Why Choose This? (The AI Edge): Hackers are using AI to attack; you need AI to defend. We teach you “AI-driven Threat Detection” to neutralize threats in milliseconds.
You in 2030 (Designations):




The AI-based mini project demonstrates how artificial intelligence can be effectively applied in different engineering domains. By integrating AI with traditional engineering concepts, the project provides smart, automated, and efficient solutions. This project helps students gain practical knowledge and prepares them for future technology-driven industries.

Head of the Department
Welcome to the Department of Cyber Security at Siddhartha Institute of Technology & Sciences (UGC-Autonomous), Narapally, Medchal–Malkajgiri, Telangana. Established in 2020, the department began with an intake of 30 and now admits 60 students, reflecting our growth and commitment to leadership in cybersecurity education. As Head of the Department, I am honored to work with dedicated faculty and talented students who value academic excellence, innovation, and ethics.
Our curriculum blends strong fundamentals in Computer Science with cutting-edge domains like Artificial Intelligence, Machine Learning, Data Science, Cybersecurity, and Cloud Computing. Through project-based learning, research, and industry-aligned training, we bridge the gap between academia and practice—cultivating curiosity, creativity, and problem-solving for real-world challenges. Our alumni contribute across IT, R&D, education, and entrepreneurship. I invite you to explore our vibrant learning ecosystem and join us on a journey of learning, innovation, and impact.
| S. No | Name of the Faculty | Designation |
|---|---|---|
| 1 | VEMURI NAGA SRI MANASWINI | Associate Professor & HOD |
| 2 | GUGULOTH RAVINDER | Associate Professor |
| 3 | MANI KANTA ADI | Associate Professor |
| 4 | KONDAPAKALA INDUMATHI | Assistant Professor |
| 5 | SHIVA KUMAR TUMMA | Assistant Professor |
| 6 | MOGILIPAKA ARAVIND | Assistant Professor |
| 7 | MADHUNIKA KULKARNI | Assistant Professor |
| 8 | BANOTHU SOUNDARYA | Assistant Professor |

The Department of Computer Science and Engineering (Cyber Security) aspires to cultivate a community of knowledgeable, ethical, and socially conscious cybersecurity professionals and researchers, committed to sustainable innovation and academic excellence.
A 4-year program to build industry-ready experts who protect networks, data, and systems from evolving cyber threats.
Apply mathematics, science, and engineering fundamentals to complex cybersecurity problems.
Identify, formulate, and analyze engineering problems using research and first principles.
Design secure solutions, systems, and processes with consideration for health, safety, society, culture, and the environment.
Conduct investigations using experimental design, data analysis, and synthesis to reach valid conclusions.
Use modern engineering and IT tools for modeling, prediction, and security analysis with awareness of their limits.
Assess societal, legal, cultural, health, and safety issues relevant to professional practice.
Understand the environmental impact of engineering solutions and the need for sustainability.
Uphold ethics and professional responsibilities in cybersecurity practice.
Work effectively as individuals and as leaders in multidisciplinary teams.
Communicate clearly through reports, documentation, presentations, and structured instructions.
Apply engineering and management principles to plan and manage projects in diverse environments.
Pursue independent, lifelong learning to keep pace with technological change.
| Sl. No | Author Name(s) | Title of the Paper | Name of the Journal | Article Link / DOI Number | Year |
|---|---|---|---|---|---|
| 1 | G. Neha, J. Tulasi, D Vidya | Unwanted Cookies Cleaner | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 2 | G. Jyoshna, B. Srivennela, D. Vikas | Hospital Management Website | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 3 | K. Manoj, B. Sai Kiran, V. Bharath Sharma | Malware Scanner | International Journal of Research Publication and Reviews | View Paper | 2025 |
| 4 | B Vineeth Kumar, B. Vamshi, S. Chandrakanth | Online Courier Service System | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 5 | Rohan Patil, Subham Maity, Md. Yaseen | Facial Recognition Attendance System | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 6 | D. Kalyani, P Bhanu Chander, Sumithra | College E-commerce Website on Stationery | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 7 | V. Mythri, A. Srividhya, B. Dharani | Web-based Cyber Security Awareness System | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 8 | Jitender C, N. Sahithya, N. Harshavardhan | Network Traffic Analysis | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 9 | A. Praveen Kumar, N. Manoj, B. Sanjeev | AI News Aggregator | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 10 | A. Sagar Goud, A. Vishnu, K. Ajay | Smart Property Risk and Hydra Operation Analysis | International Journal of Progressive Research in Engineering Management and Science | View Paper | 2025 |
| 11 | K. Kishore, B. Naveen, A. Manoj | Dual Access Control for Cloud Based Data Storage | International Journal of Research Publication and Reviews | View Paper | 2025 |
| 12 | G. Adarsh*, M. Satish Kumar*, Y. Mahalaxmi*, P. Chandrashekar*, U. Harshavardhan*, Junaid Akthar* | DETECTING DEEPFAKES USING CNN AND RNN | International Research Journal of Modernization in Engineering Technology and Science | View Paper | 2025 |
| 13 | K. Shiva*, G. Ravinder*, D. Bhavani*, A. Nikhil*, B. Akhil* | ADVANCE WEP APPLICATION FIREWALL | International Research Journal of Modernization in Engineering Technology and Science | View Paper | 2025 |
| 14 | Rajesh Naik.N1, Charan Tej.P2, Afroz Basha.A3, Shiva Kumar.N4, Ravinder.G5 | Enhancing IOT Data Security in Wireless Sensor Networks Using Blockchain Technology | Journal Publication of International Research for Engineering and Management | View Paper | 2025 |
| 15 | S. Vasu Srivastav*, M. Satish Kumar*, Rohit JK*, G. Sathvik Goud*, BV Gowtham*, B. Shiva Ganesh* | NETWORK ANOMALY DETECTION | International Research Journal of Modernization in Engineering Technology and Science | View Paper | 2025 |
| 16 | P. Ajay Reddy*, D. Pavani*, S. Sai Sunil*, B. Anusha*, N. Devi Sri Prasad*, M. Ozairuddin* | EVENLY: KEYLOGGER (CAPTURE KEYSTROKES) | International Research Journal of Modernization in Engineering Technology and Science | View Paper | 2025 |