Select Country: UK India Malaysia
View all staff
Profile shot of Rajesh Yadav

Dr Rajesh Yadav BE, MTech, PhD

Dr Rajesh Yadav is a seasoned educator with over 20 years of experience in creating innovative and engaging learning environments. Specializing in Cybersecurity, Cyber Threat Intelligence, Digital Forensics, Malware Analysis, Threat Detection, and Ethical Hacking, he combines hands-on experiential teaching with curriculum design to enhance critical thinking and problem-solving skills. He holds a BE, MTech, and PhD in Computer Science and Engineering and has contributed to both national and international academic institutions. He serves as a Lecturer at the University of Southampton Delhi, having previously held diverse academic roles across multiple institutions. Yadav’s teaching excellence and contributions to the cybersecurity domain have been recognized with the Excellence in Teaching Award from the University of Southampton Malaysia and the International Educational Achievements Award for his outstanding contributions to the Cybersecurity domain.

  • Role: Lecturer
  • Research Interests:
    • Analyse malware behaviour, detect infections, support incident response
    • Gather threat data, identify patterns, provide actionable insights, enhance security posture.
    • Protect data, enforce security policies, ensure compliance, monitor for threats
  • Department: Computing academics

Academic profile

Dr Rajesh Yadav is an accomplished educator with 20 years of academic and professional experience in computer science, specializing in cybersecurity, cyber threat intelligence, digital forensics, malware analysis, and ethical hacking. He has a proven track record of developing innovative curricula, establishing advanced cybersecurity labs, and mentoring students at leading institutions in India and abroad. His teaching philosophy emphasizes experiential and project-based learning, helping students enhance critical thinking and problem-solving skills.

In addition to teaching, Dr Yadav has held leadership roles such as Group Head of Cyber Security Hub, Industry Connect Lead, and Coordinator of Cyber Security Labs, where he successfully established funded laboratories in collaboration with industry partners. He has actively contributed to curriculum design, accreditation processes, and academic advising, while also providing professional training and consultancy services to industry sectors. His commitment to excellence has been recognized with multiple teaching awards, along with international recognition for his contributions to cybersecurity education and research.

Dr Yadav’s research focuses on malware analysis, threat detection, and cybersecurity frameworks, aiming to develop robust solutions for modern digital threats. He has published in reputed international journals (Scopus, Web of Science, and SCI indexed) and presented at global conferences, with notable contributions to areas like botnet detection, AI-based security solutions, and 5G network protocols. His academic excellence is supported by numerous certifications in advanced cybersecurity domains and active memberships in international professional bodies such as ACM, AAAS, IAENG, and ASIS, underscoring his dedication to advancing the field of cybersecurity.

Publications

Enhancing cognitive radio networks for education systems

Read more

Shalini S., Yadav, R. et al., The present study focuses on improving Cognitive Radio Networks (CRNs) based on applying machine learning to spectrum sensing in remote learning scenarios. Remote education requires connection dependability and continuity that can be affected by the scarcity of the amount of usable spectrum and suboptimal spectrum usage. Journal of Infrastructure, Policy and Development 2025, 9(1), 10466, Jan 2025.

Identification and Improvement of Image Similarity using Autoencoder

Read more

Merugu,S.,Yadav,R., Pathi,V. Raj,H., This study presents a deep learning approach to the image similarity problem as an unsupervised learning task. Journal of Engineering Technology and Applied Science Research, vol. 14, no. 4, pp. 15541–15546, Aug. 2024.

Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective

Read more

Nicho, M., Yadav, R., Singh, D., The increasing use of powerful evasive ransomware malware in cyber warfare and targeted attacks is a persistent and growing challenge for nations, corporations, and small and medium-sized enterprises., (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 14, No. 4, April 2023.

International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

Read more

Yadav, R., During 2020, Covid-19 was declared as a pandemic, affecting almost every part of societies, because of its impacts economy worldwide faced a big loss which included most of the economic sectors. During that time, technology played a very crucial role worldwide in keeping people connected.”, International Transaction Journal of Engineering, Management and Applied Sciences and Technologies, vol.12, No. 3, March 2021.

Cyber Security Challenges

Read more

Yadav, R., Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day, International Journal of Advanced Research in Science and Engineering, vol.09, No.4, April 2020.

Botnet Threats/Attacks and Botnet Detection, Prevention Methods

Read more

Yadav, R., Today botnets have become one of the biggest risks in the network and security world and have been an infrastructure to carry out nearly every type of cyber-attacks as they provide a distributed platform for different illegal activities like launching the distributed denial of service attacks (DDoS), International Journal of Advanced Technology in Engineering and Science, vol 08, No.3, March 2020.

5G Authentication Protocol

Yadav, R., “5G Authentication Protocol”, International Journal of Advanced Research in Science and Engineering, vol. 08, No.12, Dec 2019.

Analysis of Security Protocols in Mobile Wimax

Read more

Yadav, R., Srinivasan, S., For wide area wireless networks, Mobile WiMAX has come up as an emerging technology. Based on Orthogonal Frequency Division Multiple Access (OFDMA), mobile wimax provides high speed Internet access to the subscribers within a coverage area of several kilometres in radius International. Journal of Engineering Research and Technology, vol. 3, No. 12, Dec 2014.

Malware Analysis and Detection

Yadav, R. Merugu, S., Nikaukar, Y., Raj, H., “Malware Analysis and Detection”, Springer 7th International Conference on Smart Computing and Informatics, April 8-9, 2025, Sunway University, Malaysia.

Malware Analysis and Reverse Engineering: Unraveling the Digital Threat Landscape

Yadav, , Singh, D.,“ Malware Analysis and Reverse Engineering: Unraveling the Digital Threat Landscape”, International Conference on Recent Advancement in Engineering Management and Technology(ICRAEMT- 2024), 20 January, 2024,Uttar Pradesh, India.

AI in Healthcare: Navigating the Ethical, Legal, and Social Implications for Improved Patient Outcomes

Saini, , Yadav, R., et al. ,”AI in Healthcare: Navigating the Ethical, Legal, and Social Implications for Improved Patient Outcomes”, 2023 International Conference on Data Science and Network Security (ICDSNS), IEEE, 28- 29 July, 2023,Karnataka, India.

A Comprehensive Study and Implementation of Memory Malware Analysis with its application for the case study of CRIDEX

Yadav, R., Singh, D., “A Comprehensive Study and Implementation of Memory Malware Analysis with its application for the case study of CRIDEX”, International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI 2022), springer “Engineering Cyber-Physical Systems and Critical Infrastructures”, 11- 12 August 2022.

Botnet Threats/Attacks and Botnet Detection, Prevention Methods

Yadav, , “Botnet Threats/Attacks and Botnet Detection, Prevention Methods”, Proceedings of Virtual International Award Conference on Multi-Disciplinary Research and Innovation, November 2020, Punjab, India.

Cyber Security Challenges

Yadav, R., “Cyber Security Challenges”, Proceedings of Fourth International Conference on New Horizons in Science, Engineering, Management & Humanities, 27 March, 2020, Greater Noida, India.

5G Authentication Protocol

Yadav, R., “5G Authentication Protocol”, Proceedings of International Conference on Substantial Development in the field of Engineering and Management, Dec 29, 2019, Pune, India.

Secure D2D Communication in 5G Networks

Yadav, R., Sanyal, S., “Secure D2D Communication in 5G Networks”, Proceedings of the World Congress on Engineering 2018, July 4-6, 2018, London.

5G Nano core Technologies

Yadav, ,”5G Nano core Technologies”, 4th International Conference on Recent Advances in Engineering, Science and Management, Institution of Electronics and Telecommunication Engineers, Nov. 26, 2017, Chandigarh, India.

5G Wireless Communication Technology

Yadav, R.,”5G Wireless Communication Technology”, 4th International Conference on “Innovative Trends in Science, Engineering and Management” (ICITESM-17), Centre for Development of Advanced Computing, June 17,

Challenges and Evolution of Next Generation Wireless Communication

Yadav, R., “Challenges and Evolution of Next Generation Wireless Communication“, The 2017 IAENG International Conference on Communication Systems and Applications, Hong Kong, 15-17 March 2017.

Research groups

Cyber Security

Read more

The research provides the core capabilities and leadership to support the University’s broader security activities. We focus on everything from hardware security to the protection of critical infrastructures. Our industry partners include the Defence Science and Technology Laboratory, Northrop Grumman and Roke Manor Research.

Cyber Security Academy

Read more

The Cyber Security Academy (CSA) is a hub for advancing security research and providing professional training and consultancy services. We have world-class expertise in all areas related to cyber and physical systems security. This includes chips security, digital forensics, artificial intelligence, and blockchain, which we use to build countermeasures to secure our clients’ infrastructure and educate the next generation of cyber security professionals.

ECS Education Group

Read more

The ECS Education Group brings together all the Teaching Fellows within Electronics and Computer Science; our aim is to support a culture of excellence in ECS teaching, create an educational environment of continuous improvement, and foster innovation in our teaching and assessment methods.

Cookie Setting

We use some essential cookies to make this website work. We'd like to set additional cookies to understand how you use our website, remember your settings and provide you with the best possible experience. We also use cookies set by other sites to help us deliver content form their services.

Cookie Preferences

We use some essential cookies to make this website work. We’d like to set additional cookies to understand how you use our website, remember your settings and provide you with the best possible experience. We also use cookies set by other sites to help us deliver content form their services.

Essential

Essential Cookies are crucial for the basic functioning of a website. They enable core features like navigation, security, and access to protected areas of the site, ensuring users can move through pages and use services without issues.

Functional

Functional Cookies enhance the user experience by remembering preferences and settings. For example, they may store language preferences or login details, allowing a website to provide personalized content without requiring users to re-enter information.

Functional Cookie Options

Analytical

Analytical Cookies collect data about how visitors use a website, helping website owners improve functionality and performance. These cookies track metrics like the number of visitors, pages viewed, and user interactions.

Analytical Cookie Options