Research Degree

  • Post Doctoral2004-2006

    Postdoctoral Research in Grid Computing

    Nagoya Institute of Technology,Japan

  • Ph.D. 1999-2003

    Ph.D. in Distributed Computing, Wireless Sensor Network

    College of Engineering, Anna University

Ph.D Research Scholars

Ph.D (In Progress)

  • 1. Mr.Venkateshwaran [ Big data security - Cloud computing - Attribute watermarking on DBMS ]

  • 2. Mr.S.Murugesan [ Data Mining ]

  • 3. Ms.Shenbaga Bharatha Priya [ Cloud Security ]

  • 4. Mr.Shyamsundar S [ WiFi Security ]

  • 5. Mrs.Sharmela [ Cloud Security - Group key management ]

  • 6. Mr.Harish

Ph.D (Completed)


  • 1.Sivakumar.D
    [ A Study And Implementation Of Ant Based Routing Algorithms For Mobile Ad Hoc Networks - Completed (2009) ]

    • D.Sivakumar, R.S.Bhuvaneswaran, "Proposal on Multi agent Ants based Routing Algorithm for Mobile Adhoc Networks", International Journal of Computer Science and Network Security, Vol.7, Issue 6, pp. 260-268 (2007).
    • D.Sivakumar, R.S.Bhuvaneswaran, "ALRP: scalability study of ant based local repair routing protocol for mobile adhoc networks", WSEAS Transactions on Computer Research, Vol.3, Issue 4, pp. 105-111 (2008).
    • D.Sivakumar, R.S.Bhuvaneswaran, "MARP: Multi Ant Based Routing Protocol for Mobile Adhoc Networks", Journal of Mobile Communication, Vol.4, Issue 4, pp. 105-111 (2008).
  • 2. Sakthi.U
    [ Data Grid Mining Of Location Aware Service Request Patterns Of Mobile Users In Web Environments - Completed (2011) ]

    • U.Sakthi, R.Hemalatha, R.S.Bhuvaneswaran,, "Parallel and Distributed Mining of Associative rule on Knowledge Grid", World Academy of Science, Engineering & Technology, Vol. 9, Issue1, pp. 316-320 (2008).
    • U.Sakthi, R.S.Bhuvaneswaran, "Incremental Data Grid Mining Algorithm for Mobility Prediction of Mobile Users", Journal of Computer Science, Vol. 5, Issue 2, pp. 146-153 (2009).
    • U.Sakthi, R.S.Bhuvaneswaran, "Mobility Prediction of Mobile Users in MobileEnvironment Using Knowledge Grid", International Journal of Computer Science and Network Security, Vol.9, Issue 1, pp. 303-309 (2009).
    • U.Sakthi, R.S.Bhuvaneswaran, " Data Grid Mining of Mobile User behaviors in Web Environment", European Journal of Scientific Research, Vol. 49, Issue 4, pp. 555-566 (2011).
  • 3. Shatheesh Sam.S
    [ Design And Analysis Of Efficient Chaos Based Image Encryption Schemes - Completed (2012) ]

    • Shatheesh Sam, P Devaraj, R S Bhuvaneswaran, "Enhanced substitution-diffusion based image cipher using improved chaotic map", Proceedings of International conference on Advanes in Information and communication technologies, published by Springer. Vol. 4, Issue1, pp. 116-123 (2010).
    • I. Shatheesh Sam, P. Devaraj and R. S. Bhuvaneswaran, "Block Cipher Scheme for Image Cryptosystem Using Alternative Chaotic Maps", European Journal of Scientific Research, Vol.51, Issue 4, pp. 232-240 (2011).
    • I. Shatheesh Sam, P. Devaraj and R. S. Bhuvaneswaran, " A novel image cipher based on mixed transformed logistic maps", International Journal on Multimedia Tools and Applications, published by Springer. Vol. 56, Issue 2, pp. 315-330 (2012).
    • I. Shatheesh Sam, P. Devaraj and R. S. Bhuvaneswaran, "An intertwining chaotic maps based image encryption scheme", International Journal on Nonlinear Dynamics, published by Springer. Vol. 69, Issue 2, pp. 1995-2007 (2012).
    • I. Shatheesh Sam, P. Devaraj, R.S.Bhuvaneswaran, "An Efficient Quasigroup Based Image Encryption Using Modified Nonlinear Chaotic Maps", Sensing and Imaging, published by Springer. Vol. 6, Issue 1, pp. 91 (2014).
  • 4. Soundararajan.S
    [ Multipath Congestion Control Schemes for Mobile Ad Hoc Networks - Completed (2013) ]

    • Soundararajan, S. and Bhuvaneswaran, R.S, "Ant Based Multipath Routing for Load Balancing and Congestion Control in MANET", Journal of Information and Computational Science, Vol. 9, Issue 12, pp. 3365-3377 (2012).
    • Soundararajan, S. and Bhuvaneswaran, R.S, "Adaptive Multipath Routing for Load Balancing in Mobile Ad Hoc Networks", Journal of Computer Science, Vol. 8, Issue 5, pp. 648-655 (2012).
    • Soundararajan, S. and Bhuvaneswaran, R.S., "Multipath Rate Based Congestion Control for Mobile Ad Hoc Networks", International Journal of Computers and Applications, Vol. 55, Issue 1, pp. 42-47 (2012).
    • Soundararajan, S. and Bhuvaneswaran, R.S, "An Efficient Route Selection Policy for Multipath Routing in MANET", Journal of Innovation in Electronics and Communication, Vol. 2, Issue 2,pp. 58-63 (2012).
    • Soundararajan.S and Bhuvaneswaran R.S, "Adaptive Loss Recovery Techniques for Multipath Routing in MANETs", Journal of Innovation in Electronics and Communication, Vol. 3, Issue 1, pp. 6-11 (2013).
  • 5. Vimala.S
    [ Effective Techniques For Relational Database Design Through Entity Relationship Modeling, Normalization And Restructuring Pl/SQL Code Supervisor : Dr.H.Khanna Nehemiah, Assoc Prof, RCC, Anna University - Completed (2013) ]

    • S.Vimala, H.Khanna Nehemiah, R.S.Bhuvaneswaran and G Saranya, " Design Methodology for Relational Databases: Issues Related To Ternary Relationships In Entity- Relationship Model And Higher Normal Forms", International Journal of Database Management Systems, Vol. 5, Issue 3, pp. 15-37 (2013).
  • 6. Vydeki.D [ Design Of Credit Based Hybrid Schemes To Detect Blackhole Attacks In Mobile Ad Hoc Networks Using Soft Computing Frameworks - Completed (2014) ]

    • Vydeki, D. and Bhuvaneswaran, R.S., "Design of Wireless IDS using Adaptive Neuro-fuzzy Inference System", European Journal of Scientific Research, Vol. 90, Issue 1, pp. 149-156 (2012).
    • Vydeki Dharmar, Ayisha Razeena Parveen, M.A. Bhuvaneswaran, R.S, "Blackhole Detection in Ad hoc Networks using Neural Networks", Journal of Innovation in Computer Science and Engineering, Vol. 2, Issue 1, pp. 29-33 (2012).
    • Aramudhan M. and Rhymend Uthariaraj V, "LDMA and WLDMA: New Load balancing strategies on Distributed LAN and WAN Environment", Published in the International Journal of Computer system and Network security, Vol. 6, pp. 76-84 (2006).
    • Vydeki Dharmar, Ayisha Razeena Parveen, M.A. Bhuvaneswaran, R.S, "Blackhole Detection in Ad hoc Networks using Neural Networks", Journal of Innovation in Computer Science and Engineering, Vol. 2, Issue 1, pp. 29-33 (2012).
    • Vydeki, D. and Bhuvaneswaran, R.S., "Effect of Clustering Designing a Fuzzy based Hybrid Intrusion Detection System for Mobile Ad hoc Networks", Journal of Computer Science, Vol. 9, Issue 4, pp. 521-528 (2013).
  • 7. Arockia Xavier Annie
    [ VIPV-An effective sharing system for VCR interactive peer-to-peer video on demand system Supervisor : Dr.Yogesh, Assoc Prof,CSE, CEG, Anna University - Completed (2014) ]

  • 8. Ms.Anjana Devi
    [ Protocol Solutions To Detect Malicious Nodes For The Design Of Cross Layer Intrusion Detection System For Mobile Ad Hoc Network - Completed (2015) ]

    • Anjana Devi, R.S.Bhuvaneswaran, "Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System For Manet", International Journal of Network Security & Its Applications, Vol. 3, Issue 5, pp. 243-256 (2011)
  • 9. Ms.Amuthavalli
    [ Design Of Mechanisms To Detect And Prevent Sybil Attacks In Leach For Wireless Sensor Network - Completed (2016) ]

    • R.Amuthavalli, R.S.Bhuvaneswaran, "Genetic Algorithm Enabled Prevention of Sybil Attacks forLEACH-E", Modern Applied Science, published by Canadian Center of Science and Education. Issue 9, pp. 41 (2015).
  • 10. Ms.Hemalatha.R
    [ Adaptive Energy Aware Multipath Routing Protocols For Mobile Adhoc Networks - Completed (2017) ]

    • U.Sakthi, R.Hemalatha, R.S.Bhuvaneswaran,, "Parallel and Distributed Mining of Associative rule on Knowledge Grid", World Academy of Science, Engineering & Technology, Vol. 9, Issue 1, pp. 316-320 (2008).
    • R.Hemalatha, R.S. Bhuvaneswaran, "Link stability and energy aware multipath routing in MANET", Research Journal of Applied Sciences, Engineering and Technology, published by Maxwell. Vol. 8, Issue 21, pp. 2179-2186 (2014).
    • R.Hemalatha, R.S. Bhuvaneswaran, "Energy Realization fisheye state routing algorithm for mobile adhoc networks", Journal of Theoretical and Applied Information Technology, published by LLS. Vol. 70, Issue 1, pp. 172-176 (2014)
    • R.Hemalatha, R.S. Bhuvaneswaran, "Reliable ENergy aware end to end delivery routing protocol for mobile adhoc networks", IJAER, published by IJAR. Vol. 1, Issue 1, pp. 1-6 (2015).
  • 11. Ms.Shanthi.P
    [ Chaotic Based Robust Dual Image Watermarking Using Wavelet And Other Transformations - Completed (2017) ]

    • Shanthi.P, Bhuvaneswaran.R.S., "Robust Chaos Based Image Watermarking Scheme for Fractal-Wavelet", Applied Mathematical Sciences, published by Hikari International publisher. Vol. 8, Issue 32, pp. 1593-1604 (2014).
    • P.Shanthi, R.S.Bhuvaneswaran, "Image Watermarking Using Fibonacci Transform", Asian Journal of Information Technology, published by Medwell Journals. Vol. 15, Issue 9, pp. 1431-1436 (2016).
  • 12. Ms.Shanmugapriya
    [ Supervisor : Dr.H.Khanna Nehemiah, Assoc Prof, RCC, Anna University - Completed (2018) ]

  • 13. Ms.Jayasree.N
    [ Design Of Robust Image Watermarking Schemes For Image Security Using Frequency Domain Transformations - Completed (2019) ]

  • 14. Mr.Shyamshankar
    [ Design Of Portable Pallet With Steering, Braking And Speed Control For Automatic Parking System Using Reinforced Learning Based Multi Criteria Decision Making - Completed (2020) ]

    • PK Shyamshankar, S Rajendraboopathy, RS Bhuvaneswaran., "Design of Working Model of Steering, Accelerating and Braking Control for Autonomous Parking Vehicle", Cmc-Computers Materials & Continua, published by Tech Science Press Vol. 61, Issue 1, pp. 66-68 (2020).
  • 15. Mr.Viswanathan
    [ Supervisor : Dr.A.Kannan, former Professor, DIST, CEG, AU - Completed (2021) ]

    • PK Shyamshankar, S Rajendraboopathy, RS Bhuvaneswaran., "Design of Working Model of Steering, Accelerating and Braking Control for Autonomous Parking Vehicle", Cmc-Computers Materials & Continua, published by Tech Science Press Vol. 61, Issue 1, pp. 66-68 (2020).

Subjects Handled

  • Information Security

  • Machine Learning Techniques

  • Dynamic Programming

  • Secure Network Design

  • Cryptography & Network Security

  • Python Programming & Problem Solving

  • Applied Cryptography

  • Security Principles & Practices

  • Computer Architecture

  • Parallel Programming

  • Unix Internals