Dr Anu Mary Chacko

Dr. Anu Mary Chacko is Assistant Professor (grade I) at NIT Calicut . She is a professor of CS department. She hold position in Students Guidance Cell of the institute as well as the Centre for Women Welfare and Empowerment
Email : anu.chacko@nitc.ac.in
website address:https://people.cse.nitc.ac.in/achacko
Google scholar link:https://scholar.google.com/citations?user=49QtwccAAAAJ&hl=en
Scopus ID: 56040154900
Orcid ID:https://orcid.org/0000-
0001-7830-8679
Educational Qualifications
- BTech Computer Science Kerala University (2002)
- MTech Computer Science ABV IIITM Gwalior (2004)
- Ph.D from NIT Calicut (2017)
Publications
Journals
2018
K, A, Zachariah R, Yousef MS, Chacko AM. 2018. Android Malware Detection a Survey, 21 Dec. IEEE International Conference on Circuits and Systems (ICCS 2017). , Trivandrum
Anu Mary Chacko, Alfredo Cuzzocrea, MKSD. 2018. Automatic Big Data Provenance Capture at Middleware Level in Advanced Big Data Frameworks . Connected Environments for the Internet of Things Challenges and Solutions . : Computer Communications and Network (CCN) series
2017
Ghanwat, P, Chacko AM. 2017. Improved Personalized Recommendation System with better user experience, 15 Friday. 6th International Conference on Advances in Computing Communications and Informatics. , Manipal
Anu Mary Chacko, Anish Gupta, MMKSSD. 2017. Improving execution speed of incremental runs of MapReduce using provenance. International Journal of Big Data Intelligence. 4(3):186-194.
2016
Chacko A.M., Fairooz M., MKSD. 2016. Provenance-aware NoSQL databases . Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science. 625, India: Springer Singapore
2015
Chacko, A.M., BKAMSD. 2015. Capturing provenance for big data analytics done using SQL interface, 4-6 Dec. 2015 IEEE UP Section Conference on Electrical Computer and Electronics, UPCON 2015 . , IIIT Allahabad
R, AD, Chacko AM, Pathari V. 2015. Implementing Message Integrity in Mobile Phones (Android platform) Using Identity Based Encryption. International Journal of Applied Engineering Research (IJAER). 10(55):.2623-2627.
2014
P., B, A.M. C, S.D. M. 2014. Making an Application Provenance-Aware through UML – A General Scheme. Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. . :451-460.: Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg
2013
Chacko, AM, Kumar S, Pathari V. 2013. Generalized architecture to capture end to end provenance in a system , 18 Dec. International Conference on IT Convergence and Security (ICITCS) . , Macau
Professional Experience
- Worked 5 years from July 2004 – June 2009 in Tata Consultancy Services Limited.
- Joined NIT Calicut as Assistant Professor in July 2009