« Go Back

Ms. Jomina John
M.Tech. In Computer Science With Specialization In Data Security, B.Tech in Computer Science and Engineering
Asst Professor
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

Jomina John has completed her  M.Tech in Computer Science with Specialization in data security, from CUSAT in 2011.She  did her B.Tech in Computer science and Engineering at College of Engineering ,Cherthala CUSAT in the year 2009. After M.Tech she  joined Rajagiri School of Engineering And Technology on 06-06-2011 and has been working here to date

RSET Unique Id: 31612
Area of Interest: DATA SECURITY AND CRYPTOGRAPHY
Memberships(If Any) IEEE membership
COURSES HANDLED
Sl No Year Stream Sem Branch Subject
1 2024 B.Tech. S8 CS BLOCKCHAIN TECHNOLOGIES
2 2024 B.Tech. S8 CS BLOCKCHAIN TECHNOLOGIES
3 2024 B.Tech. S8 CS PROJECT PHASE II
4 2024 B.Tech. S8 CS DISTRIBUTED COMPUTING
5 2024 B.Tech. S8 CS BLOCKCHAIN TECHNOLOGIES
6 2024 B.Tech. S7 CS WEB PROGRAMMING-B1
7 2024 B.Tech. S3 CS OBJECT ORIENTED PROGRAMMING CONCEPTS USING JAVA
8 2024 B.Tech. S3 CS OBJECT ORIENTED PROGRAMMING CONCEPTS USING JAVA
9 2023 B.Tech. S8 CS DISTRIBUTED COMPUTING
10 2023 B.Tech. S8 CS INTERNET OF THINGS- B1
11 2023 B.Tech. S6 CS COMPREHENSIVE COURSE WORK
12 2023 B.Tech. S3 CS OBJECT ORIENTED PROGRAMMING LAB
13 2023 B.Tech. S3 CS OBJECT ORIENTED PROGRAMMING LAB
14 2023 B.Tech. S3 CS SUSTAINABLE ENGINEERING
15 2023 B.Tech. S3 CS OBJECT ORIENTED PROGRAMMING LAB
16 2023 B.Tech. S3 CS SUSTAINABLE ENGINEERING
17 2022 B.Tech. S8 CS PROJECT
18 2022 B.Tech. S3 CS OBJECT ORIENTED PROGRAMMING LAB
19 2022 B.Tech. S3 CS LINUX ADMINISTRATION AND NETWORKING
20 2022 B.Tech. S3 CS OBJECT ORIENTED PROGRAMMING USING JAVA
21 2022 B.Tech. S2 ME PROGRAMMING IN C
22 2021 B.Tech. S6 CS COMPUTER NETWORKS
23 2021 B.Tech. S3 CS OBJECT ORIENTED PROGRAMMING USING JAVA
24 2020 B.Tech. S6 CS WEB TECHNOLOGIES
25 2020 B.Tech. S5 EE OBJECT ORIENTED PROGRAMMING
PUBLICATION-CONFERENCE/JOURNAL DETAILS
Year Title of the Paper-Conference/Journal Details
2024 Trust value evaluation of cloud service providers using fuzzy inference based analytical process
Scientific Reports( Q1 journal)
2024 Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation
Journal of cloud computing
2023 Vulnerability scanning and analysis tool
International conference on smart computing and communications
2023 A comprehensive survey of malware detection approaches in cloud computing environments
International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)
2018 Major Vulnerabilities and their prevention methods in cloud computing
Advances in Intelligent systems and computing
2017 Major vulnerabilities and their prevention meth-ods in cloud computing
2015 ANALYSIS OF WORM ATTACKS DETECTION METHODS IN CLOUD COMPUTING
2014 SECURE DATA DISSEMINATION PROTOCOL IN WIRELESS SENSOR NETWORKS USING XOR NETWORK CODING
2014 Data Dissemination Protocols in Wireless Sensor Networks - a Survey
2014 A Review on Secure Data Dissemination Protocols in Wireless Sensor Networks
2014 Confidential Se-Drip:A Secure Data Discovery and Dissemination Protocol for Wireless Sensor Networks
2014 Techniques to achieve Data Security During Communication in Networked Critical Infrastructures – A Survey
2013 Data Dissemination Protocols in Wireless Sensor Networks - a Survey
2013 A review on secure data dissemination protocols in wireless sensor networks
2013 Confidential Se-Drip:A Secure Data Discovery and Dissemination Protocol for Wireless Sensor Networks