aicybersecuritycenter

Book Chapter (書章)

  • S. Gupta, B. B. Gupta, “An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms,” Book on Network and System Security, NSS 2016, Lecture Notes in Computer Science, vol 9955. Springer, 2016.
  • Chaudhary P., Gupta B.B., Gupta S. (2018) Defending the OSN-Based Web Applications from XSS Attacks Using Dynamic JavaScript Code and Content Isolation. In: Kapur P., Kumar U., Verma A. (eds) Quality, IT and Business Operations. Springer Proceedings in Business and Economics. Springer, Singapore
  • Rahul Kumar, B. B. Gupta, “Stepping Stone Detection Techniques: Classification and State-of-art,” Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, pp 523-533, Springer, 2016.DOI: 10.1007/978-81-322-2638-3_59
  • Omkar Badve, B. B. Gupta, “Taxonomy of Recent DDoS Attack Prevention, Detection and Response Schemes in Cloud Environment,” Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, pp 523-533, Springer, 2016. DOI: 10.1007/978-81-322-2638-3_76
  • Omkar P. Badve, B. B. Gupta, Shashank Gupta, “Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms,” Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI-Global’s Advances in Information Security, Privacy, and Ethics (AISPE) series, USA, 2016.
  • Pooja Chaudhary, B. B. Gupta, S. Gupta, “Auditing Defense against XSS Worms in Online Social Network-Based Web Applications,” Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI-Global’s Advances in Information Security, Privacy, and Ethics (AISPE) series, USA, 2016.
  • Gou Zhaolong, Shingo Yamaguchi, B. B. Gupta, “Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey,” Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI-Global’s Advances in Information Security, Privacy, and Ethics (AISPE) series, USA, 2016.
  • Esraa Alomari, Selvakumar Manickam, B. B. Gupta, Mohammed Anbar , Redhwan Saad, Samer Alsaleem, “A Survey of Botnet-based DDoS Flooding Attacks of Application Layer Detection and Mitigation Approaches,” Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI-Global’s Advances in Information Security, Privacy, and Ethics (AISPE) series, USA, 2016.
  • S. Veluru, Y. Rahulamathavan, B. B. Gupta, M. Rajarajan, “Privacy Preserving Text Analytics: Research Challenges and Strategies in Name Analysis,” Book on Securing Cloud-Based Databases with Biometric Applications, IGI-Global’s Advances in Information Security, Privacy, and Ethics (AISPE) series, 2014.
  • S. Gupta, B. B. Gupta, “BDXS: Browser Dependent XSS Sanitizer ,” Book on Securing Cloud-Based Databases with Biometric Applications, IGI-Global’s Advances in Information Security, Privacy, and Ethics (AISPE) series, 2014.
  • B. B. Gupta, R. C. Joshi, Manoj Misra, N. Meghanathan et al. (Eds.), “Estimating Strength of a DDoS Attack using Multiple Regression Analysis,” Book on Advance Computing, Communications in Computer and Information Science, volume 133, part 3, LNCS, Springer-Verlag Berlin Heidelberg, pp. 280–289, 2010. DOI: 10.1007/978-3-642-17881-8_27
  • B. B. Gupta, N. Jamali, Tansel Özyer et al. (Eds.), “Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression,” Book on Mining Social Networks and Security Informatics, Lecture Notes in Social Networks, Springer Netherlands, pp. 145-159, 2013. DOI: 10.1007/978-94-007-6359-3_8
  • B. B. Gupta, R. C. Joshi and Manoj Misra, V.V. Das, G. Thomas, and F. Lumban Gaol (Eds.), “Predicting Number of Zombies in a DDoS Attack using ANN Based Scheme,”, Book on Information Technology and Mobile Communication, Communications in Computer and Information Science, volume CCIS 147, part 1, LNCS, Springer-Verlag Berlin Heidelberg, pp. 117-122, 2011. DOI: 10.1007/978-3-642-20573-6_19
  • B. B. Gupta, Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, and Sabu M. Thampi (Eds.), “On Estimating Strength of a DDoS Attack using Polynomial Regression Model,”, Book on Advances in computing and communications, Communications in Computer and Information Science (CCIS), LNCS, Springer-Verlag Berlin Heidelberg, CCIS 193, Part 2, 244-249, DOI: 10.1007/978-3-642-22726-4_26
  • P. K. Agrawal, B. B. Gupta, K. R. Venugopal,, L. M. Patnaik (Eds.), “Estimating Strength of a DDoS Attack in Real Time using ANN Based Scheme,” Book on Computer Networks and Intelligent Computing, Communications in Computer and Information Science (CCIS), LNCS, Springer-Verlag Berlin Heidelberg, CCIS 157, pp. 301-310, DOI: 10.1007/978-3-642-22786-8_38
  • A. Srivastava, B. B. Gupta, Nagamalai, Dhinaharan; Renault, Eric; Dhanuskodi, Murugan (Eds.)., “A Recent Survey on DDoS Attacks and Defense Mechanisms,” Book on Advances in Parallel, Distributed Computing, Communications in Computer and Information Science (CCIS), LNCS, Springer-Verlag Berlin Heidelberg, CCIS 203, pp. 570-580, 2011, DOI: 10.1007/978-3-642-24037-9_57
  • B. B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta, DOM-Guard: Defeating DOM-Based Injection XSS Worms in Mobile-Based HTML5 Web Applications on Cloud Platforms”, CCS 2018, CRC press, Taylor & Francis (Accepted, in press)
  • Shashank Gupta, B. B. Gupta, “Security in Wireless LAN (WLAN) and WiMAX Systems”, CCS 2018, CRC press, Taylor & Francis, 2018.
  • B. B. Gupta, Megha Quamara, “Role of Software Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures,” CCS 2018, CRC press, Taylor & Francis, 2018.
  • Somya Ranjan Sahoo, B. B. Gupta, “Security issues and analysis in different online social networks (OSNs) based on their use,” CCS 2018, CRC press, Taylor & Francis, 2018.
  • Anupama Mishra, B. B. Gupta, Deepak Gupta, Identity Theft, Malware and Social Engineering in Dealing with Cyber Crime”, CCS 2018, CRC press, Taylor & Francis, 2018.
  • B. B. Gupta, Shashank Gupta, Shubham Goel, Nihit Bhardwaj, Jaiveer Singh, “A Prototype Method to Discover Malwares in Android-Based Smart Phones through System Calls”, MLCCS, CRC press, Taylor & Francis, 2019.
  • Prachi Gulihar, B. B. Gupta, “A Taxonomy of Bitcoin Security Issues and Defense Mechanisms,” MLCCS, CRC press, Taylor & Francis, 2019.
  • A. Dhahiya, B. B. Gupta, “Importance of Providing Incentives and Economic Solutions in IT Security,” MLCCS, CRC press, Taylor & Francis, 2019.
  • Prachi Gulihar, B. B. Gupta, “Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes,” CNCS, Springer, 2019, 2020.
  • Aakanksha Tewari, B. B. Gupta, “An analysis of Provable Security Frameworks for RFID Security,” CNCS, Springer, 2019, 2020.
  • B. B. Gupta, Amrita Dahiya, Chivesh Upneja, Aditi Garg, Ruby Choudhary, “A Comprehensive Survey on DDoS Attacks and Recent Defense mechanisms,” Handbook on IDS, IGI Global, USA, 2020.
  • Shaifali Narayan, B. B. Gupta, “Study of Smartcards Technology: Structure, Standards, Threats, Solutions and Applications,” Handbook on IDS, IGI Global, USA, 2020.
  • B. B. Gupta, Somya Ranjan Sahoo, Prashant Chugh, Vijay Iota, Anupam Shukla, “Defending Multimedia Contents Embedded on Online Social Networks (OSNs) using Digital Watermarking,” Handbook on Multimedia Security, IGI Global, USA, 2020.
  • B. B. Gupta, Somya Ranjan Sahoo, Vaibhav Bhatia, Adil Arafat, Abhik Setia, “Auto Fill Security Solution using Biometric Authentication for Fake Profile Detection in OSNs,” Handbook on IDS, IGI Global, USA, 2020.
  • Chhavi Chaturvedi, B. B. Gupta, “Cloud Computing Security: Taxonomy of Issues, Challenges, Case Studies and Solutions,” Handbook on IDS, IGI Global, USA, 2020.
  • Mamta, B B Gupta, “An Attribute Based Searchable Encryption Scheme for Non-Monotonic Access Structure,” Handbook on IDS, IGI Global, USA, 2020.