{"id":762,"date":"2022-04-07T05:16:05","date_gmt":"2022-04-07T05:16:05","guid":{"rendered":"http:\/\/aicybersecuritycenter.com\/?page_id=762"},"modified":"2022-12-12T13:50:58","modified_gmt":"2022-12-12T13:50:58","slug":"book-chapters","status":"publish","type":"page","link":"https:\/\/aicybersecuritycenter.com\/index.php\/book-chapters\/","title":{"rendered":"Book Chapters"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"762\" class=\"elementor elementor-762\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-767e377a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"767e377a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1bb60f98\" data-id=\"1bb60f98\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6def2dda elementor-widget elementor-widget-heading\" data-id=\"6def2dda\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Book Chapter (\u66f8\u7ae0)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f54c0bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f54c0bb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-290afd95\" data-id=\"290afd95\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-646bf04e\" data-id=\"646bf04e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4be23a elementor-widget elementor-widget-text-editor\" data-id=\"c4be23a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<ul><li>S. Gupta, B. B. Gupta, \u201cAn Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms,\u201d Book on Network and System Security, NSS 2016, Lecture Notes in Computer Science, vol 9955. Springer, 2016.<\/li><li>Chaudhary P., Gupta B.B., Gupta S. (2018) Defending the OSN-Based Web Applications from XSS Attacks Using Dynamic JavaScript Code and Content Isolation. In: Kapur P., Kumar U., Verma A. (eds) Quality, IT and Business Operations. Springer Proceedings in Business and Economics. Springer, Singapore<\/li><li>Rahul Kumar, B. B. Gupta, \u201cStepping Stone Detection Techniques: Classification and State-of-art,\u201d Proceedings of the International Conference on Recent Cognizance in Wireless Communication &amp; Image Processing, pp 523-533, Springer, 2016.DOI: 10.1007\/978-81-322-2638-3_59<\/li><li>Omkar Badve, B. B. Gupta, \u201cTaxonomy of Recent DDoS Attack Prevention, Detection and Response Schemes in Cloud Environment,\u201d Proceedings of the International Conference on Recent Cognizance in Wireless Communication &amp; Image Processing, pp 523-533, Springer, 2016. DOI: 10.1007\/978-81-322-2638-3_76<\/li><li>Omkar P. Badve, B. B. Gupta, Shashank Gupta, &#8220;Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms,&#8221; Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI-Global&#8217;s Advances in Information Security, Privacy, and Ethics (AISPE) series, USA, 2016.<\/li><li>Pooja Chaudhary, B. B. Gupta, S. Gupta, &#8220;Auditing Defense against XSS Worms in Online Social Network-Based Web Applications,&#8221; Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI-Global&#8217;s Advances in Information Security, Privacy, and Ethics (AISPE) series, USA, 2016. <\/li><li>Gou Zhaolong, Shingo Yamaguchi, B. B. Gupta, \u201cAnalysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey,\u201d Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI-Global&#8217;s Advances in Information Security, Privacy, and Ethics (AISPE) series, USA, 2016. <\/li><li>Esraa Alomari, Selvakumar Manickam, B. B. Gupta, Mohammed Anbar , Redhwan Saad, Samer Alsaleem, \u201cA Survey of Botnet-based DDoS Flooding Attacks of Application Layer Detection and Mitigation Approaches,\u201d Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI-Global&#8217;s Advances in Information Security, Privacy, and Ethics (AISPE) series, USA, 2016.<\/li><li>S. Veluru, Y. Rahulamathavan, B. B. Gupta, M. Rajarajan, \u201cPrivacy Preserving Text Analytics: Research Challenges and Strategies in Name Analysis,\u201d Book on Securing Cloud-Based Databases with Biometric Applications, IGI-Global&#8217;s Advances in Information Security, Privacy, and Ethics (AISPE) series, 2014.<\/li><li>S. Gupta, B. B. Gupta, \u201cBDXS: Browser Dependent XSS Sanitizer ,\u201d Book on Securing Cloud-Based Databases with Biometric Applications, IGI-Global&#8217;s Advances in Information Security, Privacy, and Ethics (AISPE) series, 2014.<\/li><li>B. B. Gupta, R. C. Joshi, Manoj Misra, N. Meghanathan et al. (Eds.), \u201cEstimating Strength of a DDoS Attack using Multiple Regression Analysis,\u201d Book on Advance Computing, Communications in Computer and Information Science, volume 133, part 3, LNCS, Springer-Verlag Berlin Heidelberg, pp. 280\u2013289, 2010. DOI: 10.1007\/978-3-642-17881-8_27 <\/li><li>B. B. Gupta, N. Jamali, Tansel \u00d6zyer et al. (Eds.), \u201cPredicting Number of Zombies in a DDoS Attacks Using Isotonic Regression,\u201d Book on Mining Social Networks and Security Informatics, Lecture Notes in Social Networks, Springer Netherlands, pp. 145-159, 2013. DOI: 10.1007\/978-94-007-6359-3_8<\/li><li>B. B. Gupta, R. C. Joshi and Manoj Misra, V.V. Das, G. Thomas, and F. Lumban Gaol (Eds.), \u201cPredicting Number of Zombies in a DDoS Attack using ANN Based Scheme,\u201d, Book on Information Technology and Mobile Communication, Communications in Computer and Information Science, volume CCIS 147, part 1, LNCS, Springer-Verlag Berlin Heidelberg, pp. 117-122, 2011. DOI: 10.1007\/978-3-642-20573-6_19 <\/li><li>B. B. Gupta, Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, and Sabu M. Thampi (Eds.), \u201cOn Estimating Strength of a DDoS Attack using Polynomial Regression Model,\u201d, Book on Advances in computing and communications, Communications in Computer and Information Science (CCIS), LNCS, Springer-Verlag Berlin Heidelberg, CCIS 193, Part 2, 244-249, DOI: 10.1007\/978-3-642-22726-4_26 <\/li><li>P. K. Agrawal, B. B. Gupta, K. R. Venugopal,, L. M. Patnaik (Eds.), \u201cEstimating Strength of a DDoS Attack in Real Time using ANN Based Scheme,\u201d Book on Computer Networks and Intelligent Computing, Communications in Computer and Information Science (CCIS), LNCS, Springer-Verlag Berlin Heidelberg, CCIS 157, pp. 301-310, DOI: 10.1007\/978-3-642-22786-8_38 <\/li><li>A. Srivastava, B. B. Gupta, Nagamalai, Dhinaharan; Renault, Eric; Dhanuskodi, Murugan (Eds.)., \u201cA Recent Survey on DDoS Attacks and Defense Mechanisms,\u201d Book on Advances in Parallel, Distributed Computing, Communications in Computer and Information Science (CCIS), LNCS, Springer-Verlag Berlin Heidelberg, CCIS 203, pp. 570-580, 2011, DOI: 10.1007\/978-3-642-24037-9_57 <\/li><li>B. B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta, DOM-Guard: Defeating DOM-Based Injection XSS Worms in Mobile-Based HTML5 Web Applications on Cloud Platforms\u201d, CCS 2018, CRC press, Taylor &amp; Francis (Accepted, in press)<\/li><li>Shashank Gupta, B. B. Gupta, \u201cSecurity in Wireless LAN (WLAN) and WiMAX Systems\u201d, CCS 2018, CRC press, Taylor &amp; Francis, 2018.<\/li><li>B. B. Gupta, Megha Quamara, \u201cRole of Software Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures,\u201d CCS 2018, CRC press, Taylor &amp; Francis, 2018. <\/li><li>Somya Ranjan Sahoo, B. B. Gupta, \u201cSecurity issues and analysis in different online social networks (OSNs) based on their use,\u201d CCS 2018, CRC press, Taylor &amp; Francis, 2018.<\/li><li>Anupama Mishra, B. B. Gupta, Deepak Gupta, Identity Theft, Malware and Social Engineering in Dealing with Cyber Crime\u201d, CCS 2018, CRC press, Taylor &amp; Francis, 2018.<\/li><li>B. B. Gupta, Shashank Gupta, Shubham Goel, Nihit Bhardwaj, Jaiveer Singh, \u201cA Prototype Method to Discover Malwares in Android-Based Smart Phones through System Calls\u201d, MLCCS, CRC press, Taylor &amp; Francis, 2019. <\/li><li>Prachi Gulihar, B. B. Gupta, \u201cA Taxonomy of Bitcoin Security Issues and Defense Mechanisms,\u201d MLCCS, CRC press, Taylor &amp; Francis, 2019.<\/li><li>A. Dhahiya, B. B. Gupta, \u201cImportance of Providing Incentives and Economic Solutions in IT Security,\u201d MLCCS, CRC press, Taylor &amp; Francis, 2019.<\/li><li>Prachi Gulihar, B. B. Gupta, \u201cClassification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes,\u201d CNCS, Springer, 2019, 2020.<\/li><li>Aakanksha Tewari, B. B. Gupta, \u201cAn analysis of Provable Security Frameworks for RFID Security,\u201d CNCS, Springer, 2019, 2020.<\/li><li>B. B. Gupta, Amrita Dahiya, Chivesh Upneja, Aditi Garg, Ruby Choudhary, \u201cA Comprehensive Survey on DDoS Attacks and Recent Defense mechanisms,\u201d Handbook on IDS, IGI Global, USA, 2020.<\/li><li>Shaifali Narayan, B. B. Gupta, &#8220;Study of Smartcards Technology: Structure, Standards, Threats, Solutions and Applications,\u201d Handbook on IDS, IGI Global, USA, 2020. <\/li><li>B. B. Gupta, Somya Ranjan Sahoo, Prashant Chugh, Vijay Iota, Anupam Shukla, \u201cDefending Multimedia Contents Embedded on Online Social Networks (OSNs) using Digital Watermarking,\u201d Handbook on Multimedia Security, IGI Global, USA, 2020.<\/li><li>B. B. Gupta, Somya Ranjan Sahoo, Vaibhav Bhatia, Adil Arafat, Abhik Setia, \u201cAuto Fill Security Solution using Biometric Authentication for Fake Profile Detection in OSNs,\u201d Handbook on IDS, IGI Global, USA, 2020.<\/li><li>Chhavi Chaturvedi, B. B. Gupta, \u201cCloud Computing Security: Taxonomy of Issues, Challenges, Case Studies and Solutions,&#8221; Handbook on IDS, IGI Global, USA, 2020.<\/li><li>Mamta, B B Gupta, \u201cAn Attribute Based Searchable Encryption Scheme for Non-Monotonic Access Structure,\u201d Handbook on IDS, IGI Global, USA, 2020.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-205b7d5\" data-id=\"205b7d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Book Chapter (\u66f8\u7ae0) S. Gupta, B. B. Gupta, \u201cAn Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms,\u201d Book on Network and System Security, NSS 2016, Lecture Notes in Computer Science, vol 9955. Springer, 2016. Chaudhary P., Gupta B.B., Gupta S. (2018) Defending the OSN-Based Web Applications from XSS<a class=\"more-link\" href=\"https:\/\/aicybersecuritycenter.com\/index.php\/book-chapters\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Book Chapters&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/762"}],"collection":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/comments?post=762"}],"version-history":[{"count":7,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/762\/revisions"}],"predecessor-version":[{"id":1735,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/762\/revisions\/1735"}],"wp:attachment":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/media?parent=762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}