Atheeq C

Atheeq C

Assistant Professor

Education

Ph. D.

C. Atheeq is from Hyderabad and holds a Ph.D. in Computer Science Engineering from BS Abdur Rahman Crescent Institute of Science and Technology and has over 14 years of experience in academia. He specializes in network security and machine learning. His research focuses on providing security for IoT and MANET environments. Atheeq is passionate about mentoring students, fostering innovation, and advancing research in emerging technologies.

Research Publications

  • C. Atheeq, Zameer Gulzar, Mana Saleh Al Reshan, Adel Sulaiman, Hani Alshahrani, and Asadullah Shaikh, “Securing UAV Networks: A Lightweight Chaotic-Frequency Hopping Approach to Counter Jamming Attacks”, IEEE Access, Vol 12, 2024.
  • C Atheeq, Ruhiat Sultana, Syeda Asfiya Sabahath, Murtuza Ahmed Khan Mohammed, “Advancing IoT Cybersecurity: Adaptive Threat Identification with Deep Learning in Cyber-Physical Systems”, Engineering, Technology & Applied Science Research, Vol 14, No 2, pp. 13559-13566, 2024.
  • Ahsan Saud Qadri Syed, C. Atheeq, Layak Ali, Mohammad Tabrez Quasim, “Α Chaotic Map-based Approach to Reduce Black Hole Attacks and Authentication Computational Time in MANETs”, Engineering, Technology & Applied Science Research, Vol 14, No 3, pp. 13909-13915, 2024.
  • C. Atheeq, Altaf C, Mohammad Mohammad, Mohammed Aleem, “An Effective Mechanism to Mitigate Packet Dropping Attack from MANETs using Chaotic Map based Authentication Technique”, Recent Patents on Engineering, Volume 18, Number 3, pp. 66-76(11), 2024
  • Mohammad Khaja Nizamuddin, Zunaira Begum, C. Atheeq, Ruhiat Sultana, Ahsan Saud Qadri, “Cloud Computing Framework for Vehicle Multimedia with Dynamic Priority-based Efficient Resource Allocation”, SSRG International Journal of Electrical and Electronics Engineering, Vol 11, No 6, pp. 22-30, 2024.

Ongoing Research Projects

  • Check Icon Nil

Expertise

  • Check Icon Networks
  • Check Icon Security
  • Check Icon Artificial Intelligence

Authored Books

  • Check Icon A study on Mitigation of Attacks from MANETS based on Authentication Mechanism
Scroll to top