B. B. Gupta is an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes information security, cyber security, mobile/smartphone, Cloud computing, Web security, intrusion detection, computer networks and phishing.
1 Context-Aware Systems: Protecting Sensitive Information and Controlling
Network Behavior
ALBERTO HUERTAS CELDRÁN, MANUEL GIL PÉREZ,
FÉLIX J. GARCÍA CLEMENTE, AND GREGORIO MARTÍNEZ PÉREZ
2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port
ANDREA CHIAPPETTA
3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to
Measure IT Risk
BAIDYANATH BISWAS AND SUKANYA PATRA
4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in
Contemporary Security Discourse
SUSHMA DEVI AND MOHD AARIF RATHER
5 A Systematic Review of Attack Graph Generation and Analysis Techniques
URVASHI GARG, GEETA SIKKA, AND LALIT K. AWASTHI
6 Biometric-Based Authentication in Cloud Computing
POONAM SAINI AND AWADHESH KUMAR SINGH
7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETsKULDEEP SINGH, PALVI AGGARWAL, AND ANIL KUMAR VERMA
8 Security in Wireless LAN (WLAN) and WiMAX Systems
SHASHANK GUPTA AND BRIJ B. GUPTA
9 Botnet Behavior and Detection Techniques: A Review
AMMAR ALMOMANI, MOHAMMAD ALAUTHMAN, NAUMAN ASLAM, OSAMA
DORGHAM, AND MOHAMMED AL-REFAI
10 Overview of Smartphone Security: Attack and Defense Techniques
DIKSHA GOEL AND ANKIT KUMAR JAIN
11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues
MUSTAPHA HEDABOU
12 Medical Image Enhancement Techniques: A Survey
SONALI MAHARAJAN, SATYA PRAKASH GHRERA, AMIT KUMAR SINGH, AND
SIMA SAHU
13 Extraction of Malware IOCs and TTPs Mapping with CoAs
SHIZA HASAN, MASOOM ALAM, TANVEER KHAN, NADEEM JAVAID, AND ABID
KHAN
14 Implementing a Secure Web-Based Application Using Microsoft SDL
SWAPNONEEL ROY AND PAVAN S. MUDUNDI
15 Preserving Privacy for Trust-Based Unwanted Traffic Control with
Homomorphic Encryption
LIFANG ZHANG, ZHENG YAN, AND RAIMO KANTOLA
16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web
Applications on Mobile-Based Cloud Platforms
BRIJ B. GUPTA, HIMANSHU SONI, PANKAJ SIWAN, ANKIT KUMAR, AND
SHASHANK GUPTA
17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks
PARMEET KAUR AND AWADHESH KUMAR SINGH
18 Applications of Digital Signatures in Cryptography
SARVESH TANWAR AND ANIL KUMAR
19 Credit Scoring Using Birds Swarm Optimization
DAMODAR REDDY EDLA, PEDUNAYAK G, TEJASWINI K, HAREESH K, AND
RAMALINGASWAMY CHERUKU
20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and
Analysis of Crypto Secure S-Boxes
SANKHANIL DEY AND RANJAN GHOSH
21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT)
Security: Attacks and Countermeasures
MEGHA QUAMARA AND BRIJ B. GUPTA
22 Security Issues and Challenges in Online Social Networks (OSNs) Based on
User Perspective
SOMYA RANJAN SAHOO AND BRIJ B. GUPTA
23 A Compendium of Security Issues in Wireless Sensor Networks
JASMINDER KAUR SANDHU, ANIL KUMAR VERMA, AND PRASHANT SINGH RANA
24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime
ANUPAMA MISHRA, BRIJ B. GUPTA, AND DEEPAK GUPTA