Nandha Engineering College

Department of CSE (Cyber Security)

Head of the Department

Programme Offered

B.E - Computer Science & Engineering (Cyber Security)

Intake - 60

About the Department

The Department of Computer Science and Engineering (Cyber Security) was established in the year 2022. It offers a 4 year B.E – Computer Science and Engineering (Cyber Security) programme. It has dedicated faculty members specialized in different areas of Computer Science and Engineering.

VISION

To develop a pool of high caliber professionals, researchers and entrepreneurs in computing and cyber security to meet the ever-changing needs of a secured society. 

MISSION

Department of Computer Science and Engineering (Cyber Security) is committed

PROGRAM EDUCATIONAL OBJECTIVES (PEOs)

The Graduates of Computer Science and Engineering (Cyber Security) will be able to

PEO 1: Core Competency: To transform the graduates as experts in the computing profession and to satisfy the needs of security in the IT industry.

PEO 2: Research, Innovation and Entrepreneurship: To empower the graduates with knowledge in computer systems and professional skills to prevent, investigate and condense attacks in cyberspace.

PEO 3: Ethics, Human values and Life-Long learning: To explore new paths through research and keep abreast with the latest technology in cyber security to curtail the malicious attacks ethically. 

PROGRAM OUTCOMES (POs) 

PO 1: Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization to the solution of complex engineering problems.

PO 2: Problem analysis: Identify, formulate, review research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences.

PO 3: Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations.

PO 4: Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.

PO 5: Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations.

PO 6: The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice.

PO 7: Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.

PO 8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.

PO 9: Individual and team work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.

PO 10: Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.

PO 11: Project management and finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments.

PO 12: Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.

The Students of Computer Science and  Engineering (Cyber Security) will be able to

PSO 1: Knowledge Proficiency: Equipped with knowledge of security in various platforms, possess computer forensic skills with secured network control and act responsibly in legal, ethical and security related issues.

PSO 2: Recent Technology:Able to apply emerging appropriate technology and programming skills to find optimal solutions for complex problems by applying domain knowledge to transform innovative ideas into reality.

MEMORANDUM OF UNDERSTANDING (MoU)

The Department has signed MoUs with the following companies.

  • csuite tech labs, Coimbatore
  • Gateway Solutions,Coimbatore
  • TechByHeart,Cochin

             

Csuite tech labs                                                                              Gateway Solutions

TechByHeart

S.No

Name of the Faculty

Project Title

Funding Agency

Amount

1

Dr.S.Prabhu

Billing Software Development and Digital Marketing

PlanetB Family Restaurant

102,550

2

Dr.S.Prabhu ,

Ms.S.Krithika

Social Media Handling, SEO Services, and Meta Ads Management

Sarva Sweets

54,750

3

Mr.M.Santhosh Kumar,

Ms.B.Raja Rajeswari

Website Development

Sharief Bhai Biryani

101,320

4

Ms.A.Priyadharshini

Website Development

Mahith Traders

51,450

5

Mr.Klothungasuryapandi,

Dr.S.K.mahalingam,

Dr.S.prabhu

Website for construction Advisory

Tamil Associates

101,230

6

Ms.L.Nanthini,

Mr.P.Sathish

Digital transformation and Automation services

Sri Vaari store

104,350

S.NoCalender yearName of the author(s)Name of the NEC FacultyTitle of paperName of journalMonth & Year of publicationISSN numberDocument TypeType of Indexing
12025Raja M.S.; Ganesh Babu L.; Meinathan S.; Krithika S.; Hussain B.I.; Kumar A.; Kalai Selvi T.Ms.Krithika SReal-Time Monitoring of Fatigue-Induced Damage in Stainless Steel through Acoustical Emission and ML Techniques4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025 – ProceedingsJan-2510.1109/ICMLAS64557.2025.10968939Conference paperScopus
22025Dhinesh M.; Geetha B.; Sathish P.; Saravanakumar L.; Jude P.S.V.; Balaram A.Mr.Sathish PImageGuard: Advanced User Authentication via Dynamic Graphical Password Manipulation and Secured Image Sequences4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025 – ProceedingsMar-2510.1109/ICSADL65848.2025.10933219Conference paperScopus
32025Revathy G.; Mary R.A.; Kumar M.S.; Sivakumar G.Mr.Santhoshkumar MDeep Learning for Tomato Leaf Disease Detection: A Counting Sort-Enhanced Approach2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025 – ProceedingsMar-2510.1109/ICMLAS64557.2025.10968939Conference paperScopus
42025Krithika S.; Jayachandran T.; Raghapriya N.R.; Ruba M.; Janani C.; Sathiyavathi S.Ms.Krithika SAn Effective Denial of Service Texture Features from Malware Grayscale Image3rd International Conference on Artificial Intelligence and Machine Learning Applications: Healthcare and Internet of Things, AIMLA 2025Jun-2510.1109/AIMLA63829.2025.11041501Conference paperScopus
52025Velumani J.; Obbayed S.; Kotagi V.; Sathish P.; Karthick P.V.Mr.Sathish PAnomaly Detection in Semiconductor Processing using Convolutional Neural Network with Bidirectional Long Short-Term Memory3rd International Conference on Data Science and Information System, ICDSIS 2025Jul-2510.1109/ICDSIS65355.2025.11071162Conference paperScopus
62025Alikhan J.S.; Naveenkumar R.; Sharma Y.; Sathish P.; Raja Ch.; Kayalvizhi R.Mr.Sathish PSecureVaultChain: A Blockchain-Based Hybrid Model for Comprehensive Threat Mitigation in Network SystemsProceedings of the 2025 3rd International Conference on Inventive Computing and Informatics, ICICI 2025Jul-2510.1109/ICICI65870.2025.11069620Conference paperScopus
72025B., Narmada, B.; K., Banuroopa, K.; P., Anthony, Priyadharshini; D., Suganthi, D.; A.S., Kumar, A. Sasi; A.V., Deepan Chakravarthi, A. V.Ms.Priyadharshini AEnhanced Health Information Management with Blockchain-Assisted FL-CNNs and Autoencoders in the Internet of Medical Things2025 International Conference on Advances in Modern Age Technologies for Health and Engineering Science (AMATHE)Jul-2510.1109/AMATHE65477.2025.11081243Conference paperScopus
82025K.P., Vaishnavi, Kumar P.; S., Chattopadhyay, Shouvik; S., Kumar, Sanjay; null; B., Krishnasamy, Balasubramanian; R.P., Pujar, Rajlaxmi PramodMr.Santhoshkumar MA Novel Method for Predicting Consumer Purchase Behaviour on E-Commerce Platforms through Graph Neural Network Model2025 International Conference on Intelligent Computing and Knowledge Extraction (ICICKE)Aug-2510.1109/ICICKE65317.2025.11136707Conference paperScopus
92025Sreelatha, B.; Rajesh Kumar, A.; Kousar, S.A.; Nanthini, L.; Priya, S.; Lakshmi, A.J.Ms.Nanthini LAccurate Fake News Detection in Text-Based Content Using K-Nearest Neighbor, LSTM, MLP and CNN Models2025 International Conference on Computing Technologies & Data Communication (ICCTDC)Sep-2510.1109/ICCTDC64446.2025.11158216Conference paperScopus
102025Sridevi, M.; Madhava Sarma, P.; Stanly, J.J.; Santhosh, K.M.Mr.Santhoshkumar MDeepfakes Unleashed: Exploring the Role of Blockchain in Managing AI- Generated Content2025 8th International Conference on Circuit, Power & Computing Technologies (ICCPCT)Sep-2510.4018/979-8-3373-6481-0.ch010Book chapterScopus
112025S. Prabhu, P. V. Jothikantham, R. Asha Mary, M. ThirunavukkarasuDr.S. PrabhuAI in Finance: Predictive Analytics for Fraud Detection and Risk ManagementTaylor and Francis Oct-25ISBN:9781003543527Book chapterScopus
122025Nithiya, C.; Revathy, G.; Menaha, R.; S. PrabhuDr.Prabhu SDecentralized Digital Media Generation: A Blockchain-Based Multimodal Generative AI FrameworkIGI GlobalOct-2510.4018/979-8-3373-1504-1.ch005Book chapterScopus
132025Revathy, G.; Jayapratha, T.; Albert Paulin Michael, R.; M.SanthoshkumarMr.Santhoshkumar MCreating Without Limits: Multimodal Generative AI in Digital MediaIGI GlobalOct-2510.4018/979-8-3373-1504-1.ch006Book chapterScopus

Supporting Staff Members

Mr.Gokul S

Mr.Prabhu B

Department Laboratory


The Department of Computer Science and Engineering (Cyber Security) owns excellent laboratories which are extensively utilized round the year. These cater to the needs of students, research scholars and faculty members pursuing research in the area of Information and Communication Engineering.

Problem Solving and C Programming Laboratory

The Problem Solving and C Programming Laboratory is designed to help students develop strong analytical and logical thinking skills through hands-on programming experience. Aligned with the Program Specific Curriculum, this laboratory focuses on building a solid foundation in algorithmic problem-solving and procedural programming using the C language.

Java Programming Laboratory

The Java Programming Laboratory is designed to provide a strong foundation in object-oriented programming and application development using Java. The lab is equipped with high-performance systems and the latest versions of integrated development environments (IDEs) such as Eclipse, NetBeans, and IntelliJ IDEA, along with JDK and JavaFX libraries to facilitate effective programming practice.

Ethical Hacking Laboratory

The Ethical Hacking Laboratory is designed to provide a secure and controlled environment for students to explore and understand the techniques used in identifying vulnerabilities and securing modern IT infrastructures. Equipped with state-of-the-art hardware and licensed tools such as Kali Linux, Wireshark, Metasploit, Nmap, Burp Suite, and Nessus, the lab supports hands-on learning aligned with the Program Specific Curriculum.

Advanced Java Programming Laboratory

The Advanced Java Programming Laboratory is structured to provide students with practical exposure to dynamic and enterprise-level web application development. This lab integrates both front-end and back-end technologies, aligning with the Program Specific Curriculum that includes HTML, CSS, JavaScript, Java Collections, JDBC, Servlets, and XML.

Cyber Forensics Laboratory

The Cyber Forensics Laboratory is established to provide students with the technical skills and investigative techniques required to identify, preserve, analyze, and present digital evidence. This laboratory supports the Program Specific Curriculum with a focus on real-world cybercrime investigation procedures and legal aspects of digital evidence handling. Equipped with dedicated forensic workstations and licensed tools such as Autopsy, FTK Imager, EnCase, Sleuth Kit, and Wireshark, the lab offers a secure environment to simulate and analyze various cybercrime scenarios.

Department Library

The Department of Computer Science and Engineering owns excellent laboratories which are extensively utilized round the year. These cater to the needs of students, research scholars and faculty members pursuing research in the area of Information and Communication Engineering.

Highlights of Department

Awards & Achievements