Sneha Sudhakaran - Ph.D
Cyber Operations Concentration
Room No 324, L3Harris Center for Assured Information
West Melbourne, FL 32901
Assistant Professor - Fall 2022 - Present
Department of Computer Science
Florida Institute of Technology, Melbourne, Florida
Email : ssudha1@lsu.edu, snehakalliat@gmail.com, ssudhakaran@fit.edu
Dissertation: Performing Memory Forensics for Object Recovery from Android Application Memory
Advisors : Dr. Golden G Richard III, Dr. Aisha Ali-Gombe, Andrew Case( Applied Cyber Security La, LSU
Sneha Sudhakaran - Ph.D
Cyber Operations Concentration
Room No 324, L3Harris Center for Assured Information
West Melbourne, FL 32901
Assistant Professor - Fall 2022 - Present
Department of Computer Science
Florida Institute of Technology, Melbourne, Florida
Email : ssudha1@lsu.edu, snehakalliat@gmail.com, ssudhakaran@fit.edu
Dissertation: Performing Memory Forensics for Object Recovery from Android Application Memory
Advisors : Dr. Golden G Richard III, Dr. Aisha Ali-Gombe, Andrew Case( Applied Cyber Security La, LSU
Research Topics: Current Topics of Research :Drone Security, Cyber Security education, Cyber Forensics, Applied Cyber Security
*Peer Reviewed @Student Papers
2025
@*Journal and Conference: Panakkadan, RR, Meher P, More, S.A, Sudhakaran, S”Enhancing Cyber Security Education with Simulated Learning”, INTED , IATED Digital Library(Topic of research : Cyber Security Education)
@*Conference: More, S.A, Sudhakaran,S, OConnor, T. J. , Carvalho, M”Vulnerability assessment of HolyStone Drones ICCWS 2025(Topic of research : Drone Security)
2024
@*Conference: OConnor, T. J., Schmith, A., Stricklan, C., Carvalho, M., Sudhakaran, S. (2024, March). Pwn Lessons Made Easy With Docker: Toward an Undergraduate Vulnerability Research Cybersecurity Class. In Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1 (pp. 986-992) (Topic of research : Cyber Security Education)
@*Conference: Suarez, L., Alshubrumi, D., O’Connor, T.,Sudhakaran, S. (2024). Unsafe at any bandwidth: Towards understanding risk factors for Ransomware in higher education. Procedia Computer Science, 238, 815-820(Topic of research : Cyber Security Education)
@*Journal: Sudhakaran, S., Nur, N., & Zarraa, A. (2024). NAVIGATING THE CHALLENGES: UNDERSTANDING ANXIETY AMONG INTERNATIONAL GRADUATE STUDENTS IN THE UNITED STATES. In INTED2024 Proceedings (pp. 7664-7672). IATED. (Topic of research : Cyber Security Education)
2023
*Conference: Ali-Gombe, Aisha, Sudhakaran S, Vijayakanthan, R" Leveraging Memory Forensics Artifacts for Android™ Malware Classification 75th AAFS Annual Scientific Meeting; 2023
*Journal and Conference: A Ali-Gombe, S Sudhakaran, R Vijayakanthan, GG Richacd III, cRGB_Mem: At the intersection of memory forensics and machine learning- Forensic Science International: Digital Investigation, DFRWS 2023(Topic of research : Memory Forensics)
@*Conference:Lightweight Symphony: K Fernalld, TJ OConnor, S Sudhakaran, N Nur ,Towards Reducing Computer Science Student Anxiety with Standardized Docker Environments;
- SIGITE 2023(Topic of research : Cyber Security Education)
2022
*Conference:S. Sudhakaran, A Ali-Gombe, Andrew Case, G. G Richard III, The Correlation of Garbage Collection and Object Recovery in Userland Forensic Analysis; , 74th AAFS Annual Scientific Meeting; 2022(Topic of research : Memory Forensics)
*Conference:S. Sudhakaran, A Ali-Gombe, Andrew Case, G. G Richard IIIEvaluating the Reliability of Android Userland Memory Forensics; 17th International Conference on Cyber Warfare and Security, March 2022(Topic of research : Memory Forensics)
2021
*Conference: POSTER: S Sudhakaran, A Ali-Gombe, G G.Richard III; On Reliability of Userland Memory Forensics; Women in CyberSecurity(WiCys 2021)
*Conference: S Sudhakaran, A Ali-Gombe, G G. Richard III,Examining the Impact of Garbage Collection and Process States in Userland Memory Forensics;; 73rd AAFS Annual Scientific Meeting; 2021
2020
*Conference: S Sudhakaran, A Ali-Gombe, A Orgah, A Case, GG Richard, AmpleDroid recovering large object files from Android application memory;
; IEEE International Workshop on Information Forensics and Security (WIFS 2020)
*Conference:POSTER: Non-Moving Large Object Extraction from Process Dumps; S Sudhakaran, A Ali-Gombe, A Case, G G.Richard III; Women in CyberSecurity(WiCys 2020)
2019
*Conference:Proving Database Tampering Through In-Memory Object Reconstruction; A Ali-Gombe, S Sudhakaran, A Case, GG Richard III; 71st AAFS Annual Scientific Meeting; 2019
*Conference:DroidScraper: a tool for Android in-memory object recovery and reconstruction; A Ali-Gombe, S Sudhakaran, A Case, GG Richard III; 22nd International Symposium on Research in Attacks, Intrusions and Defenses 2019---USENIX
2017
*Journal:Programmable logic controller forensics; I Ahmed, S Obermeier, S Sudhakaran, V Roussev;IEEE Security & Privacy 15 (6), 18-24;2017
2016
*Conference:A scada system testbed for cybersecurity and forensic research and pedagogy; I Ahmed, V Roussev, W Johnson, S Senthivel, S Sudhakaran; Proceedings of the 2nd Annual Industrial Control System Security Workshop(ACSAC), 1-9; 2016
2015
*Conference:A New Cyber Forensic Philosophy for Digital Watermarks in the Context of Copyright Laws; PV Bhattathiripad, S Sudhakaran, R Khalid; Association for Digital Forensics Security and Law; 2015
2014
*Journal:Use of Machine Learning Techniques for Log Data Analysis; K Muniasamy, S Sudhakaran, M Sethumadhavan; Information Security Education and Awareness- INFOSEC DEPOT; 2014
*Journal:Comparison in Honda Algorithm and Neural Network for Anti Cruise Collision Avoidance System; N Ajayakumar,S Sudhakaran; International Journal of Digital Application & Contemporary research 3; 2014
*Journal:An Advanced Approach towards Shadow Detection and Restoration in VHR Images; N Soman, S Sudhakaran; International Journal of Engineering Research and Technology 3 (10); 2014