Please ensure Javascript is enabled for purposes of website accessibility Faculty | Information Technology | University of West Florida
Skip to main content
Kalaimannan,Ezhil_211

Dr. Ezhil Kalaimannan

  • Position: Associate Professor
  • Department: Cybersecurity and Information Technology
  • Office Location: Building 4, Room 444
  • ekalaimannan@uwf.edu
  • Campus: 850.473.7005

Biography

Dr. Ezhil Kalaimannan, an Associate Professor, conducts research in the wide areas of cybersecurity and network defense. Other significant areas include wireless networking, digital forensics, algorithmic theory, graph theory, operations research, and cybersecurity education. He is currently a co-PI on a $2.3 million grant titled “Argo Cyber Emerging Scholars (ACES): Developing a Cybersecurity Community of Practice”, funded by the National Science Foundation (NSF) CyberCorps®: Scholarship for Service (SFS) program. The goals of this grant program are aligned with the U.S. strategy to develop a superior cybersecurity workforce.


Dr. Kalaimannan joined the University of West Florida’s (UWF’s) faculty in 2014 after graduating from the University of Alabama in Huntsville with a Ph.D. in Computer Engineering (concentration in Cybersecurity). He has an M.S. in Computer Engineering from the University of Alabama in Huntsville and a bachelor’s degree in Electrical and Electronics Engineering from Anna University in India. He primarily teaches undergraduate and graduate courses in Cybersecurity and Computer Science at UWF.

Degrees & Institutions

Ph.D., University of Alabama in Huntsville, 2014
M.S., University of Alabama in Huntsville, 2009
B.E., Anna University (Chennai, India), 2006

Research

Dr. Kalaimannan’s current research focuses on the security of cyber-physical systems (Electrical Smart Power Grids) and fingerprinting networked operating systems (OS’s) and Internet of Things (IoT) devices. Dr. Kalaimannan’s research has been published in prestigious journals such as Computers & Operations Research by Elsevier, Access by IEEE, Internet of Things (IoT) by IEEE, Security and Privacy by Wiley, and Security and Privacy by IEEE.

Current Courses

  • CNT4007 - Theory and Fundamentals of Computer Networking
  • CNT4403 - Computer & Network Security
  • CIS5775 - Cybersecurity Principles
  • CNT5407 - System & Network Security

Classes Taught

  • Undergraduate:
    • CNT4007 - Theory and Fundamentals of Computer Networking
    • CIS2530 - Introduction to Cybersecurity
    • COP3014 - Algorithm and Program Design
    • CNT4403 - Computer and Network Security
  • Graduate:
    • CIS5775 - Cybersecurity Principles
    • CNT5407 - System & Network Security

Publications

  • Gupta, J.N.D., Kalaimannan, E, and Yoo, S.M. “A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator," In: Choo KK., Morris T., Peterson G. (eds) National Cyber Summit (NCS) Research Track NCS 2019, Advances in Intelligent Systems and Computing, Vol 1055, Springer, Cham, 2020.
  • Mishra, A., Reichherzer, T., Kalaimannan, E., Wilde, N and Ramirez, R. “Trade-off’s involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks," International Journal of Distributed Sensor Networks, Sage Journal, Vol. 16, No. 2, pp. 1550147720908199, 2020.
  • Hopkins, S., Kalaimannan, E and John, C. “Foundations for Research in Cyber-Physical System Cyber Resilience using State Estimation," Proceedings of the 2020 IEEE SoutheastCon, pp. 1-2, Raleigh, NC, 2020.
  • Hopkins, S., Kalaimannan, E and John, C. “Sub-Erroneous Outlier Detection of Cyber Attacks in a Smart Grid State Estimation System," Proceedings of the 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0447-0454, New York, NY, 2020.
  • Tetarave, S.K., Tripathy, S., Kalaimannan, E., John, C and Srivastava, A. “A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets," Access, IEEE, Vol. 7, No. 1, pp. 67983-67995, 2019.
  • Hopkins, S, and Kalaimannan, E. “Towards establishing a security engineered SCADA framework," Journal of Cybersecurity Technology, Taylor & Francis, Vol. 3, No. 1, pp. 47-59, 2019.

 


Keywords: computer & network security, digital forensics, wireless networking, algorithmic theory, operations research, cybersecurity education