Atnaujinkite slapukų nuostatas

Information Security and Optimization [Kietas viršelis]

Edited by (Assistant Professor), Edited by , Edited by , Edited by
  • Formatas: Hardback, 224 pages, aukštis x plotis: 254x178 mm, weight: 453 g, 18 Tables, black and white; 47 Illustrations, black and white
  • Išleidimo metai: 12-Jan-2021
  • Leidėjas: Chapman & Hall/CRC
  • ISBN-10: 0367493454
  • ISBN-13: 9780367493455
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 224 pages, aukštis x plotis: 254x178 mm, weight: 453 g, 18 Tables, black and white; 47 Illustrations, black and white
  • Išleidimo metai: 12-Jan-2021
  • Leidėjas: Chapman & Hall/CRC
  • ISBN-10: 0367493454
  • ISBN-13: 9780367493455
Kitos knygos pagal šią temą:
"Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques and tools that are useful for a scholar ranging from beginners to experts. What are the policy standards, what are vulnerabilities, how to patch them, How to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, optimization algorithms, and etc. are some of the possible queries that have been described effectively using examples from real life and case studies. Features: A wide range of case studies and examples that are derived from real-life scenarios that map the theoretical explanations with real incidents. Description of security tools related to digital forensic with their unique features and the working steps for hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presents real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that needs focus because of extensive use of cloud services for serving organizational and research demands including data storage and computing requirements. The book Information Security and Optimization is equally helpful for the undergraduate and postgraduate students as for the researchers working in the domain. It can be recommended as a reference or textbook for the courses related to cybersecurity"--

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies.

Features:

  • A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents.
  • Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience.
  • Novel contributions in designing organization security policies and lightweight cryptography.
  • Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems.
  • Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements.

Information Security and Optimization

is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

The Editors xv
Contributors xvii
1 Information Security Policy and Standards
1(12)
Samir Pazvaskar
1.1 Brief Introduction
1(1)
1.2 Definitions
1(2)
1.3 Structure of Policy Documents
3(2)
1.4 Governance (Understanding the Ownership, Responsibilities, and Accountabilities)
5(1)
1.5 Writing Effective Policies (Characteristics and Attributes of an Effective Policy Document)
5(3)
1.6 Policy Life Cycle (Policy from Cradle to Grave)
8(4)
1.6.1 Development
8(1)
1.6.1.1 Needs Assessment
8(1)
1.6.1.2 Policy Drafting
8(1)
1.6.1.3 Stakeholder Review
9(1)
1.6.1.4 Identify Key Success Factors and Key Performance Indicators
9(1)
1.6.1.5 Policy Approval
9(1)
1.6.2 Implementation
9(1)
1.6.2.1 Communication and Awareness
9(1)
1.6.2.2 Create/Update Processes
10(1)
1.6.2.3 Provide Tools Where Possible
10(1)
1.6.3 Enforcement
10(1)
1.6.3.1 Monitoring Compliance
10(1)
1.6.3.2 Influencing User's Behavior (The Carrot-and-Stick Approach)
11(1)
1.6.4 Assess, Review, and Update
11(1)
1.6.5 End of Life
12(1)
References
12(1)
2 Vulnerability Management
13(12)
K.N.D. Saile
Phani Kumar Gajula
2.1 Introduction
13(1)
2.2 Background
13(1)
2.3 Vulnerability
14(1)
2.4 Areas of Risk
15(1)
2.5 Why Is Software Vulnerable?
15(1)
2.6 Vulnerability Management
15(4)
2.6.1 Discovering Vulnerabilities
16(1)
2.6.1.1 Identifying the Types of Attacks
16(1)
2.6.1.2 Inventory of Assets
17(1)
2.6.2 Assessing Vulnerabilities
17(2)
2.6.3 Reporting
19(1)
2.6.4 Remediating and Verifying
19(1)
2.7 Participants in Vulnerability Management
19(1)
2.8 Vulnerability Analysis Tools
20(1)
2.9 Best Practices for Vulnerability Management
21(1)
2.10 A Case Study in Vulnerability Management: Equifax
21(2)
2.10.1 Identifying/Discovering the Vulnerability
22(1)
2.10.2 Assessment of the Vulnerability
22(1)
2.10.3 Reporting the Vulnerability
23(1)
2.10.4 Remediating and Verifying
23(1)
References
23(2)
3 Identity Theft and Prevention
25(18)
Atefeh Tajpour
Mazdak Zamani
3.1 Introduction
25(1)
3.2 Literature Review
26(3)
3.3 Research Model and Hypothesis
29(3)
3.4 Method
32(2)
3.4.1 Ethics Statement
32(1)
3.4.2 Data Collection
32(1)
3.4.3 Instrument Development
33(1)
3.5 Result
34(3)
3.5.1 Demographics
34(1)
3.5.2 Exploratory Factor Analysis
35(1)
3.5.3 Confirmatory Factor Analysis
35(1)
3.5.4 Structural Model and Hypotheses Testing
36(1)
3.6 Discussion
37(2)
3.7 Conclusion
39(1)
References
39(4)
4 Organization Security Policies and Their After Effects
43(18)
Premkumar Chithaluru
Ravi Prakash
4.1 Introduction
43(5)
4.1.1 What Does Security Policy Mean?
43(1)
4.1.2 Why Do You Need a Security Policy?
44(1)
4.1.3 How to Develop Policy
44(2)
4.1.4 How Can Policy Operation Be Made Truthful?
46(1)
4.1.5 Personnel Issues
47(1)
4.1.6 Security Policy of Outsiders
47(1)
4.2 Background
48(4)
4.2.1 Types of Information Security Policies
48(1)
4.2.2 Development of Information Security Policy
49(1)
4.2.3 Approaches to the Implementation of Information Security Policy
50(1)
4.2.4 Policies, Standards and Practices
50(1)
4.2.5 Governance of Information Security
51(1)
4.3 Success Factors of Security Policies in Organizations
52(2)
4.3.1 Awareness and Training
52(1)
4.3.2 Management Support
53(1)
4.3.3 Budget
53(1)
4.3.4 Information Security Policy Enforcement
54(1)
4.3.5 Organizational Mission
54(1)
4.4 Case Studies of Security Policies in Organizations
54(1)
Case Study 1
54(1)
Case Study 2
55(2)
4.4.1 Organizational Objectives and Goals as Derived from the Case Studies
57(1)
4.5 Conclusion
57(1)
References
57(4)
5 Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?
61(18)
Pretnkumar Chithajuru
Rohit Tanwar
Sunil Kumar
5.1 Introduction
61(2)
5.1.1 Definition of Cyber-Attacks
61(1)
5.1.2 Cyber-Attacks in Recent Days
62(1)
5.1.3 Why Is it Essential to Prevent Cyber-Attacks?
62(1)
5.1.4 Types of Cybersecurity Attacks
62(1)
5.2 Background
63(5)
5.2.1 Use of Cyberspace
63(2)
5.2.2 The Cyber-Battlefield
65(1)
5.2.3 Effective Limitations of Cyber-Warfare
66(1)
5.2.3.1 Ground Actions
67(1)
5.2.3.2 Sea Actions
67(1)
5.2.3.3 Air Actions
67(1)
5.2.3.4 Space Actions
67(1)
5.2.3.5 Cyber Actions
67(1)
5.3 Development of Cyber-Warfare and Cyber-Conflict
68(1)
5.4 Emerging Cyber-Attacks
69(1)
5.5 Cybersecurity Attacks
69(1)
5.6 Cyber Defense Best Practices and Protection
70(1)
5.6.1 Cyber Defense for Industries
70(1)
5.6.2 Cyber Defense for Individuals
70(1)
5.6.3 Nation-State Cyber-Attacks
71(1)
5.6.4 Examples of Cyber-Warfare
71(1)
Case Study 1 Olympic Games
71(1)
Case Study 2 Ukrainian Power Grid
72(1)
Case Study 3 Russian Hackers Tracking Ukrainian Artillery
72(1)
Case Study 4 Sony Corp's Hollywood Studio
72(1)
Case Study 5 Estonian Government Attack
73(1)
5.7 Impact of the Attacks
73(2)
5.7.1 Breakdown of Cyber-Tools Used
73(1)
5.7.2 Cyber-Illegal
73(1)
5.7.3 Web Damage
74(1)
5.7.4 Advertising
74(1)
5.7.5 Confidential Data Acquisition
74(1)
5.7.6 Distributed Denial-of-Service (DDoS)
74(1)
5.7.7 Equipment Distribution
75(1)
5.7.8 Critical Infrastructure Attacks
75(1)
5.7.9 Compromised Fake Hardware
75(1)
5.7.10 Theft or Hardware Destruction
75(1)
5.8 Conclusion
75(1)
References
76(3)
6 Cryptography and Steganography Techniques
79(14)
Ninni Singh
Gunjan Chhabra
6.1 Introduction
79(1)
6.2 History
79(2)
6.2.1 The Oldest Cryptographic Technique--Hieroglyphs
80(1)
6.3 Steganography
81(3)
6.3.1 Different Techniques of Steganography
82(1)
6.3.1.1 Text Steganography
82(1)
6.3.1.2 Auditory Steganography
82(1)
6.3.1.3 Cinematic Steganography
82(1)
6.3.1.4 Visual Steganography
83(1)
6.3.2 Applications of Steganography
84(1)
6.4 Cryptography Concepts
84(4)
6.4.1 Types of Cryptography
86(1)
6.4.1.1 Symmetric Cryptography
86(2)
6.5 Benefits of a Hybrid Approach: Steganography and Cryptography
88(1)
6.6 Recent Trends
89(1)
6.7 Conclusion
90(1)
References
90(3)
7 An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis
93(14)
Rajdeep Chakraborty
Jyotsna Kumar Mandal
7.1 Introduction: Background and Driving Forces
93(3)
7.1.1 Literature Review
94(2)
7.2 The Lightweight Security Architecture
96(4)
7.2.1 External Signals and Buses
96(1)
7.2.2 Internal Bus
97(1)
7.2.3 Internal Memory Registers
97(1)
7.2.4 Internal Encryption and Decryption Module
97(1)
7.2.5 Internal Mux-DeMux Module
98(1)
7.2.6 Internal Control Unit
99(1)
7.3 Key Generation
100(1)
7.4 Cryptanalysis
101(1)
7.5 Simulation-Based Results
102(1)
7.6 Applications
103(1)
7.7 Conclusion
103(1)
References
104(3)
8 An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms
107(14)
Rahul Chauhan
Preeti Mishra
R.C. Joshi
8.1 Introduction
107(2)
8.1.1 A Sequential Processing Cycle of a Digital Image
108(1)
8.2 Image Morphing
109(4)
8.2.1 Processes in Image Morphing
110(1)
8.2.2 Image Morphing Algorithms
110(1)
8.2.2.1 Mesh Warping
110(1)
8.2.2.2 Field Morphing
111(1)
8.2.2.3 Radial Basis Function (RBF) Morphing
112(1)
8.2.2.4 Energy Minimization Morphing
112(1)
8.2.3 Multilevel Free Form Deformation (MFFD)
112(1)
8.3 Traces in Image Forensics
113(1)
8.3.1 Acquisition Phase Traces
113(1)
8.3.2 Coding Phase Traces
114(1)
8.3.3 Editing Phase Traces
114(1)
8.4 Classification of Forgery Detection (Authentication) Techniques
114(2)
8.5 Copy-Move Forgery Detection Techniques
116(1)
8.6 Antiforensics
117(1)
8.7 Conclusion
118(1)
References
118(3)
9 Analysis of Classification-Based Intrusion-Detection Techniques
121(22)
S. Sridevi
R. Anandan
9.1 Introduction
121(1)
9.2 Intrusion Detection Systems (IDSs)
122(7)
9.2.1 Requirements of IDSs
123(1)
9.2.2 Categorization of the IDS
123(1)
9.2.2.1 Type of Intruder
123(1)
9.2.2.2 Types of Intrusion
124(1)
9.2.2.3 Methodologies for Detecting Attacks
124(2)
9.2.2.4 Audit Statistics Source
126(1)
9.2.2.5 Accumulated Statistics Computing Region
127(1)
9.2.2.6 Infrastructure
127(1)
9.2.2.7 Use Frequency
128(1)
9.2.3 Decision-Making Inside the IDS
128(1)
9.2.4 Intrusion Response
128(1)
9.2.5 Further Literature About WSN
129(1)
9.3 Application of IDS in MANET and WSN
129(6)
9.3.1 Primarily Agent Based Dispensed and Collaborative IDSs
129(2)
9.3.2 Clustering (Hierarchical) Based IDSs
131(1)
9.3.3 Statistical Detection Based IDSs
132(1)
9.3.4 Misuse Detection-Based IDS
132(1)
9.3.5 Reputation (Trust)-Based IDSs
132(1)
9.3.6 Watchdog Mechanism
133(1)
9.3.7 Primarily Sector Based IDS
133(1)
9.3.8 Game Idea Based IDSs
134(1)
9.3.9 Genetic Algorithm Based IDS
134(1)
9.3.10 Other Works
135(1)
9.4 Intrusion Detection System in WSN 212
135(5)
9.4.1 Restrictions and Research Challenges in WSN
136(1)
9.4.2 Differences Between MANETs and WSNs
136(1)
9.4.3 Proposed Schemes
137(1)
9.4.3.1 Grouping Based IDSs
137(1)
9.4.3.2 Centralized and Collaborative IDSs
138(1)
9.4.3.3 Statistical Detection Based IDSs
138(1)
9.4.3.4 IDSs Based on Game Theory
139(1)
9.4.3.5 Anomaly Based Detection of IDSs
139(1)
9.4.3.6 Totally IDS Based Watchdog
139(1)
9.4.3.7 Reputation (Trust) Based IDS
139(1)
9.5 Future Directions in the Selection of IDS for WSN
140(1)
9.6 Conclusion
140(1)
References
140(3)
10 Cryptocurrency and Blockchain
143(16)
Premkumar Chithaluru
Kulvinder Singh
Manish Kumar Sharma
10.1 Introduction--Definition of Blockchain: A Multiple Faced Technology
143(1)
10.2 The Basic Working of Blockchain
144(1)
10.2.1 A Distributed Database: Blockchain
144(1)
10.2.2 Bye-Bye Middleman?
144(1)
10.3 The Blockchain Agreement Mechanisms
144(1)
10.3.1 Cryptographic Offers Proof of Work
145(1)
10.3.2 Proof of Stake
145(1)
10.3.3 Additional Mechanisms
145(1)
10.4 What Are Cryptocurrencies?
145(3)
10.4.1 International Monetary Fund (IMF)
146(1)
10.4.2 Bank for International Settlements
146(1)
10.4.3 European Banking Authority (EBA)
146(1)
10.4.4 European Securities and Markets Authority (ESMA)
147(1)
10.4.5 World Bank
147(1)
10.4.6 Financial Action Task Force
147(1)
10.4.7 Framework
147(1)
10.5 Advanced Types of Money--Tokens--Cryptosecurities
148(1)
10.5.1 Computerized Monetary Requirements--Tokens
148(1)
10.5.2 Advanced Kinds of Money--Cryptosecurities
148(1)
10.6 Computerized Kinds of Cash--Blockchain
148(2)
10.6.1 Who Are the Players Being Referred To?
148(1)
10.6.2 Cryptographic Cash Customers
149(1)
10.6.3 Excavators
149(1)
10.6.4 Computerized Money Exchanges
149(1)
10.6.5 Trading Tiers
150(1)
10.6.6 Wallet Providers
150(1)
10.7 Orchestrating CRYPTOCURRENCIES--Checking the Crypto-Market
150(1)
10.8 Bitcoin and Beyond: Virtual Styles of Money with the Highest Market Capitalization
151(1)
10.8.1 Wave (XRP) Is Legitimately Adaptable into Fiat Coins
152(1)
10.8.2 Wave (XRP) Is a Vehicle of Trade
152(1)
10.8.3 Wave (XRP)
152(1)
10.9 Stellar (XLM)
152(1)
10.9.1 What Is Stellar?
152(1)
10.9.2 Stellar Runs on a Permissionless Blockchain
152(1)
10.9.3 Lumens Are Pseudo-Processed Coins
153(1)
10.10 Cardano
153(1)
10.10.1 Cardano's Operations
153(1)
10.11 NEO
153(1)
10.11.1 What Is NEO?
153(1)
10.11.2 NEO's GAS Offers Digital Coins
153(1)
10.12 Monero
154(1)
10.12.1 Monero's Operations
154(1)
10.12.2 Monero Is a Permissionless Blockchain
154(1)
10.12.3 Monero Is Obviously Convertible into Fiat Cash
154(1)
10.12.4 Monero Is a Digital Trade
154(1)
10.12.5 Monero Is an Exchange Coin
154(1)
10.12.5.1 Ring Secret Transactions
154(1)
10.12.5.2 Stealth Addresses
155(1)
10.12.5.3 The Project--Kovri
155(1)
10.13 Dash
155(1)
10.13.1 Dash's Operations
155(1)
10.13.2 Dash Is Unmistakably Convertible into Fiat Cash
156(1)
10.13.3 Dash Is a Vehicle of Trade
156(1)
10.13.4 Dash Is a (Discretionary) Confusing Coin
156(1)
10.14 Conclusion: A Taxonomy and Time Frame of Cryptocurrencies
156(2)
10.14.1 Conclusion
156(2)
References
158(1)
11 Cyber Security in Cloud Platforms
159(12)
Shiv Dutta Mishra
Bhupesh Kumar Dewangan
Tanupriya Choudhury
11.1 Introduction to Cloud Infrastructure
159(1)
11.2 Cloud Deployment and Services Models
159(2)
11.2.1 Public Cloud
160(1)
11.2.2 Private Cloud
160(1)
11.2.3 Hybrid Cloud
160(1)
11.2.4 Infrastructure as a Service (IaaS)
160(1)
11.2.5 Platform as a Service (PaaS)
161(1)
11.2.6 Software as a Service (SaaS)
161(1)
11.3 Benefits of Cloud Computing
161(1)
11.4 Literature Review
162(1)
11.5 Issues and Challenges
163(1)
11.5.1 Exfiltration of Encrypted Data
163(1)
11.5.2 Lance Phishing Campaign
163(1)
11.5.3 Ransomware
163(1)
11.5.4 Accidental Email
163(1)
11.5.5 Lost Laptop
163(1)
11.5.6 Privilege Misuse
163(1)
11.5.7 Eavesdropping
164(1)
11.6 Cyber Security Mechanism
164(1)
11.7 Solution: Proposed Framework for Security in Cloud Platform
165(4)
11.7.1 Identify
166(1)
11.7.2 Protect
166(1)
11.7.2.1 User Access Control
167(1)
11.7.3 Detection Systems
167(1)
11.7.3.1 Monitoring
167(1)
11.7.3.2 Event Detection
167(1)
11.7.3.3 Mitigation
168(1)
11.7.3.4 Logging
168(1)
11.7.3.5 Reporting
168(1)
11.7.4 Breach Response
168(1)
11.7.5 Recovery
169(1)
11.8 Conclusion
169(1)
References
169(2)
12 Biometrics-Unique Identity Verification System
171(10)
Gunjan Chhabra
Varun Sapra
Ninni Singh
12.1 Introduction to Biometrics
171(1)
12.2 Authentication vs Verification
172(1)
12.3 Types of Biometrics: Physical and Behavioral Biometrics
172(3)
12.3.1 Physical Biometrics
174(1)
12.3.2 Behavioral Biometrics
174(1)
12.4 Types of Biometric Systems
175(1)
12.5 Biometrics System Performance: False Acceptance and False Rejection
175(2)
12.6 Issues and Concerns
177(1)
12.7 Performance Enhancement of Biometrics Systems
177(1)
12.8 Applications of Biometrics
178(1)
12.9 Conclusion
179(1)
References
179(2)
13 Security Tools
181(8)
Keshav Kaushik
Rohit Tanwar
A.K. Awasthi
13.1 Introduction: Background and Driving Forces
181(1)
13.2 Cybersecurity Tools and Methods
181(6)
13.2.1 Wire-shark--A Packet Sniffing and Packet Capturing Tool
182(3)
13.2.2 Autopsy--A Packet Sniffing and Packet Capturing Tool
185(1)
13.2.2.1 Download and Installation
185(1)
13.2.2.2 Features and Working
186(1)
13.2.2.3 Advantages of Using Autopsy
187(1)
13.3 Conclusion
187(1)
References
188(1)
14 Introduction to Optimization Algorithms-Bio Inspired
189(12)
Rakesh Kumar Saini
Shailee L. Choudhary
Anupam Singh
Amit Verma
14.1 Introduction
189(1)
14.2 Evolutionary Algorithms (EA)
189(1)
14.3 EA in Practice
190(2)
14.4 Genetic Algorithm
192(2)
14.5 Genetic Programming
194(3)
14.5.1 Genetic Programming Algorithm
195(1)
14.5.2 Basic Terminology Used in Genetic Programming
196(1)
14.5.3 Advantages of Genetic Programming over Genetic Algorithms
196(1)
14.6 Particle Swarm C)ptimization (PSO)
197(2)
14.7 Comparison": Genetic Algorithm, Genetic Programming and Particle Swarm Optimization
199(1)
14.8 Conclusion
200(1)
References
200(1)
Appendix 201(2)
Index 203
Dr. Rohit Tanwar received his bachelors degree in CSE from Kurukshetra University, Kurukshetra, India, and masters Degree in CSE from YMCA University of Science and Technology, Faridabad, India. He received his PhD from Kurukshetra University in 2019. He has more than 10 years of experience in teaching. Currently, he is working as an Assistant Professor in dept. of CSE at UPES Dehradun. His areas of interests include Network Security, Optimization Techniques, Human computing, Soft computing, Cloud computing, Data Mining, etc. He has more than twenty publications to his credit in different reputed journals and conferences. He has been associated with many conferences throughout India as TPC member and session chair etc. Dr. Tanwar is associated as an editor of two forthcoming books with CRC Press and Scrivener Publishing (Wiley) respectively. He is a special issues editor in the journal EAI Endorsed on Transactions on Pervasive Health and Technology (Scopus Indexed). He is associated with International Journal of Communication Systems (SCIE) (WILEY), and International Journal of Information Security and Privacy (IJISP) (Scopus, ESCI), IGI Global as an active reviewer. He is supervising two PhD research scholar in the fields of security and optimization. He is a lifetime member of Indian Engineering Teachers Association, India and other renowned technical societies. He is holding the post of Joint Secretary, Faridabad Chapter of INDO-UK Confederation of Science Technology and Research, London. He is a certified Microsoft Technology Associate for Introduction to Programming using Python.

Dr. Tanupriya Choudhury received his bachelors degree in CSE from West Bengal University of Technology, Kolkata, India, and masters Degree in CSE from Dr. M.G.R University, Chennai, India. He received his PhD in the year 2016. He has 10 years of experience in teaching as well as in research. He is currently working as an Associate Professor in dept. of CSE at UPES Dehradun. He received Global Outreach Education Award for Excellence in best Young researcher Award in GOECA 2018. His areas of interests include Human computing, Soft computing, Cloud computing, Data Mining etc. He has filed 14 patents till date and received 16 copyrights from MHRD for his own softwares. He has been associated with many conferences in India and abroad. He has authored more than 85 research papers till date. He has delivered invited talk and guest lectures in Jamia Millia Islamia University, Maharaja Agersen college of Delhi University, Duy Tan University Vietnam etc. He has been associated with many conferences throughout India as TPC member and session chair etc. He is a lifetime member of IETA, member of IEEE, and member of IET(UK) and other renowned technical societies. He is associated with Corporate and he is Technical Adviser of DeetyaSoft Pvt. Ltd. Noida , IVRGURU ,and Mydigital360 etc.He is holding the post of Secretary in IETA (Indian Engineering Teachers Association-India), He is also holding the Advisor Position in INDO-UK Confederation of Science, Technology and Research Ltd., London, UK and International Association of Professional and Fellow Engineers-Delaware-USA.

Mazdak Zamani received his Ph.D. in Computer Science from Universiti Teknologi Malaysia in 2011. He was a Research Student Grant in 2008-2010. He has been an active contributor to his field of research for more than nine years by teaching several courses, designing several courses, serving as leader and researcher in several grants, supervision of students in PhD and Master degree, serving as chair in a research track, serving as external/ internal examiner in PhD/Master thesis assessment, coordinator Research and Development, participating in industrial collaboration, Memorandum of Understanding with other university, and Letter of Intent with government section. Dr. Zamani has published more than 100 journal papers, conference proceeding papers, book chapters, and books on related topics to his area of interest, including Cybersecurity, Multimedia Security, Network Security, and Information Technology. He also has been very active as chair/ technical committee/ program committee in more than 100 international conferences. He has acted as reviewer and editor in more than 50 international journals.

Dr. Sunil Gupta has over more than 19 Years of experience in teaching, research and industry in the field of Computer science and Engineering. Prior to joining UPES as a Professor, he has worked with, BML Munjal University, Delhi Technical Campus, IP University, Northern India Engineering College, IP University, IIMT, Baddi University of Emerging Science, IFTM University and Physical Laboratory. He is an active member of IEEE Society, Computer Society of India, Member, Computer Science Teacher Association, Life Member, International Association of Engineers, Member, International Association of Computer Science and Information Technology, Member, and Internet Society (ISOC). He has conducted various workshops, conferences and FDP. He Guides various students for research and project work. He is an authored 69 research papers, Six Patents and 2 textbooks, Cryptography and Network Security and Wireless Sensor Networks. His academic interest includes Security, Cloud Computing, Big Data, Sensor, Wireless Networks, and Healthcare. He has successfully completed various research projects and consultancy from government and private organization like, Department of Science and technology, Xcrino business solutions and more. He is a reviewer of international journals namely Journal of Supercomputing, published by Springer Netherlands., International Journal of Wireless Networks by Springer, International Journal Computer and Electrical Engineering, Singapore and Member of Scientific Committee and Editorial Review Board on Engineering and Physical Sciences for World Academy of Science, Engineering and Technology and many more.