Faculty Profile

Er. Surinder Singh Khurana
Assistant Professor
Centre for Computer Science Tecchnology
School of Engineering & Technology
Central University of Punjab
Bathinda- 151001
Email Id: surinder.seeker@gmail.com
Mobile:+91-9878737711

 
Education :
  • M.E. in Computer Science & Engg. from PEC University of Technology, Chandigarh, with 9.5 CGPA. (2007-09)  
  • B-Tech in Computer Science & Engg. from Punjab Technical University-Jalandhar with an aggregate of 78.8%. (2004-07)
  • Diploma in Computer Engineering with Honors from Punjab Board of Technical Education & Industrial Training – Chandigarh. With an aggregate of 76.13%.(2001-04)
Experience :
  • Presently working as Assistant Professor in Centre for Computer Science & Technology, Central University of Punjab, Bathinda.
  • 17 months as an Assistant Professor in C.S.E. Department, Panjab University SSG Regional Centre, Hoshiarpur.
  • 12 Months as a Lecturer in C.S.E. Department, PEC University of Technology (formerly Punjab Engineering College), Chandigarh.
  • 8 Months as Lecturer [Contractual] in C.S.E. Department, CCET, Sec 26, Chandigarh
  • 5 Months as Lecturer [Contractual] in C.S.E. Department, S.L.I.E.T. Longowal (Sangrur)
Teaching Assignments :
  • Algorithm Design & Analysis, Programming Fundamentals, Object Oriented Programming, Computer Networks, Data Structures, Network Security, Ethical Hacking
Research Projects :

Ongoing

  • Research Project entitled “Overcoming the WPA2-PSK's “Hole 196 Vulnerability” using RSA-Public Key based Cryptography Scheme”
  • Funded by Central University of Punjab, Bathinda.
Area specializations/Research Interest :
  • Computer Networks and Network Security
Publications :

Reasearch Papers

In International Conference – 02

  • Khurana S.S, Bansal D. & Sofat S., Detection and Auto Recovery Approach to Protect Host Based IDS, IEEE International Advance Computing Conference, Thapar University, Patiala., 2009.
  • Garg, T., & Khurana, S. S. (2014, May). Comparison of classification techniques for intrusion detection dataset using WEKA. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-5). IEEE. Available online at: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6909184

In International Journal – 01

  • Khurana S.S, Bansal D. & Sofat S.,  Time Stamping Based Protocol To Protect Log Files Related To HIDS, Journal of Emerging Technologies in Web Intelligence (a peer reviewed and indexed international journal).2009.  
Workshop/Conferences :

Attended

  • Evaluation And Setting Question Papers [1 Week]
    Conducted by Education &Educational Mangement Department, N.I.T.T.T.R.  at CCET, Sec  26, Chandigarh.
  • Mission 10x workshop [1 Week]
    Conducted by Wipro Technologies at CCET, sec 26, Chandigarh. the Course includes Dale Carnegie’s Training module on High Impact Teaching Skills.
  • Faculty Enablement Program On Business Intelligence [1 Week]
    Conducted by Infosys Technologies Limited at Infosys Development Centre, Chandigarh
  • Faculty Enablement Program On Foundation Program [1 Week]
    Conducted by Infosys Technologies Limited at Infosys Development Centre, Chandigarh