M. Thangavel

M. Thangavel is an Assistant Professor, Department of Information Technology at Thiagarajar college of Engineering, Madurai. He is pursuing a PhD under the faculty of Information and Communication, Anna University. He completed his M.E in Computer Science & Engineering at J.J College of Engineering. His research interests include Cryptography &Network security, Compiler Design and Data Structures.

Publications

Blockchain Technology for IoT: An Information Security Perspective
Sasikumar R., Karthikeyan P., Thangavel M.. © 2023. 26 pages.
In the internet era, data is considered to be the primary asset, and the host or applications in a network are vulnerable to various attacks. Traditional network architectures...
Industrial Automation Using Mobile Cyber Physical Systems
Thangavel M., Abhijith V. S., Sudersan S.. © 2022. 28 pages.
In recent years, the rise in the demand for quality products and services along with systems that could integrate the control mechanisms with high computational capabilities led...
Threats and Vulnerabilities of Mobile Applications
Thangavel M., Divyaprabha M., Abinaya C.. © 2021. 20 pages.
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have...
Denial of Service (DoS) Attacks Over Cloud Environment: A Literature Survey
Thangavel M., Nithya S, Sindhuja R. © 2021. 31 pages.
Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services...
Detection of Worms Over Cloud Environment: A Literature Survey
Thangavel M., Jeyapriya B., Suriya K. S.. © 2021. 24 pages.
In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are...
Threats and Vulnerabilities of Mobile Applications
Thangavel M., Divyaprabha M., Abinaya C.. © 2021. 21 pages.
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have...
Blockchain Technology for IoT: An Information Security Perspective
Sasikumar R., Karthikeyan P., Thangavel M.. © 2021. 26 pages.
In the internet era, data is considered to be the primary asset, and the host or applications in a network are vulnerable to various attacks. Traditional network architectures...
A Case Study on Improving Learner Engagement by Incorporating ICT Tool Usage and Active Learning Strategies in Engineering Courses
S. Julius Fusic, Anandh N., M. Thangavel. © 2020. 23 pages.
In the present scenario, the innovation in teaching is necessary to engage the students for the course of 36 to 40 hours. At the end of the course, the average student's...
Network Manipulation Using Network Scanning in SDN
Thangavel M., Pavithra V., Guru Roja R.. © 2019. 39 pages.
Network scanning commonly implies the use of the computer network to collect information about the target systems. This type of scanning is performed by hackers for attacking the...
Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management
P. Karthikeyan, M. Thangavel. © 2018. 300 pages.
From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed...
Green Cloud Computing
Indira K., Thangavel M.. © 2018. 23 pages.
Cloud computing is a highly scalable and cost-effective infrastructure for running HPC, enterprise and Web applications. However, the growing demand of Cloud infrastructure has...
Detection of Worms Over Cloud Environment: A Literature Survey
Thangavel M., Jeyapriya B., Suriya K. S.. © 2018. 29 pages.
In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are...
A Comparative Study on DNA-Based Cryptosystem
Thangavel M., Varalakshmi P, Sindhuja R. © 2018. 32 pages.
Information security plays a vital role in almost every application that we handle in our day-to-day life since the communication needs to be protected in terms of the messages...
A Comparative Study on DNA-Based Cryptosystem
Thangavel M., Varalakshmi P, Sindhuja R. © 2017. 33 pages.
Information security plays a vital role in almost every application that we handle in our day-to-day life since the communication needs to be protected in terms of the messages...
Denial of Service (DoS) Attacks Over Cloud Environment: A Literature Survey
Thangavel M., Nithya S, Sindhuja R. © 2017. 31 pages.
Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services...
Session Hijacking over Cloud Environment: A Literature Survey
Thangavel M., Pandiselvi K, Sindhuja R. © 2017. 29 pages.
Cloud computing is a technology that offers an enterprise model to provide resources made available to the client and network access to a shared pool of configurable computing...
A Review on Digital Sphere Threats and Vulnerabilities
Muthuramalingam S., Thangavel M., Sridhar S.. © 2016. 21 pages.
Digital Sphere is a global network which consists of all the resources that are required for the users, who connected with the digital network. It connects the entire world...