Brij Gupta

Brij GuptaB. B. Gupta received PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for Canadian Commonwealth Scholarship and awarded by Government of Canada Award. He spent more than six months in University of Saskatchewan (UofS), Canada. He has published more than 250 research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Inderscience, etc. He has visited several countries, i.e. Canada, Japan, USA, UK, Thailand, China, Malaysia, Spain, Italy, Australia, Hong-Kong, etc to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. Dr, Gupta received International travel grant award from various organizations i.e. Microsoft Research (MSR) India, ACM Special Interest Group on Data Communication (SIGCOMM) ($525), DST, Govt. of India (Young Scientist travel grant award), CSIR, IITR-heritage fund to attend various conferences and present his research work worldwide. He is also serving many journals as editorial board member and as member, international advisory board. Moreover, he is serving as reviewer for Journals of IEEE, Springer, Wiley, Taylor & Francis, etc. Dr Gupta is senior member of IEEE, member ACM, The Society of Digital Information and Wireless Communications (SDIWC), Internet Society, Institute of Nanotechnology, Life Member, International Association of Engineers (IAENG), Life Member, International Association of Computer Science and Information Technology (IACSIT). He also worked as a post doctoral research fellow in UNB, Canada. He was also visiting researcher with Yamaguchi University, Japan in 2015 and with Guangzhou University, China in 2016, respectively. At present, Dr. Gupta is working as Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra (Institute of National Importance), India. His research interest includes Information security, Cyber Security, Mobile/Smartphone, Cloud Computing, Web security, Intrusion detection, Computer networks and Phishing.

Publications

Handbook of Research on Digitalization Solutions for Social and Economic Needs
Richard Pettinger, Brij B. Gupta, Alexandru Roja, Diana Cozmiuc. © 2023. 400 pages.
Digital solutions are sufficiently versatile and agile to shape business processes and enterprise architecture, answer the COVID-19 crisis, solve climate change, temper political...
Advances in Malware and Data-Driven Network Security
Brij B. Gupta. © 2022. 304 pages.
Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus...
Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
Brij B. Gupta, Dragan Peraković, Ahmed A. Abd El-Latif, Deepak Gupta. © 2022. 313 pages.
Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a...
Handbook of Research on Digital Transformation Management and Tools
Richard Pettinger, Brij B. Gupta, Alexandru Roja, Diana Cozmiuc. © 2022. 732 pages.
Advances in digital technologies continue to impact all areas of life, including the business sector. Digital transformation is ascertained to usher in the digitalized economy...
A Robust Authentication System With Application Anonymity in Multiple Identity Smart Cards
Varun Prajapati, Brij B. Gupta. © 2022. 21 pages.
User Authentication plays a crucial role in smart card based systems. Multi-application smart cards are easy to use as a single smart card supports more than one application....
Deep-Learning and Machine-Learning-Based Techniques for Malware Detection and Data-Driven Network Security
Praneeth Gunti, Brij B. Gupta, Francisco José García Peñalvo. © 2022. 18 pages.
A never-ending fight is taking place among malware creators and security experts as the advances in malware are daunting. The machine learning strategies are indeed the new mode...
Botnet Defense System and White-Hat Worm Launch Strategy in IoT Network
Shingo Yamaguchi, Brij Gupta. © 2022. 21 pages.
This chapter introduces a new kind of cybersecurity system named botnet defense system (BDS) that defends an IoT system against malicious botnets. This chapter consists of two...
Data Mining Approaches for Sentiment Analysis in Online Social Networks (OSNs)
Praneeth Gunti, Brij B. Gupta, Elhadj Benkhelifa. © 2022. 26 pages.
IoT technology and the widespread usage of public networking platforms and apps also made it possible to use data mining in extracting useful perspectives from unorganised...
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study
Ammar Almomani, Mohammad Alauthman, Mohd Taib Shatnawi, Mohammed Alweshah, Ayat Alrosan, Waleed Alomoush, Brij B. Gupta, Brij B. Gupta, Brij B. Gupta. © 2022. 24 pages.
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our...
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions
Anshuman Singh, Brij B. Gupta. © 2022. 43 pages.
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new...
Foreword
Brij B. Gupta. © 2021. 2 pages.
This Foreword is included in the book Fostering Communication and Learning With Underutilized Technologies in Higher Education.
Malware Threat in Internet of Things and Its Mitigation Analysis
Shingo Yamaguchi, Brij Gupta. © 2021. 17 pages.
This chapter introduces malware's threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs' web...
A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server
Brij B. Gupta, Shaifali Narayan. © 2021. 16 pages.
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole...
An Auction-Based Incentivized Solution Against DDoS Attacks
B. B. Gupta, Amrita Dahiya. © 2021. 19 pages.
There has been a giant growth in complexity and severity of DDoS attacks from the last past decade. Major research has focused solely on technical solutions. Economic solutions...
Harness the Global Impact of Big Data in Nurturing Social Entrepreneurship: A Systematic Literature Review
Nur Azreen Zulkefly, Norjihan Abdul Ghani, Suraya Hamid, Muneer Ahmad, Brij B. Gupta. © 2021. 19 pages.
The global impact of social values, norms, and cultures set the growth and future dimensions of most businesses. In global business governess, the sustainability of social...
Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems
Ammar Almomani, Ahmad Al-Nawasrah, Waleed Alomoush, Mustafa Al-Abweh, Ayat Alrosan, Brij B. Gupta. © 2021. 23 pages.
Information management collects data from several online systems. They analyze the information. They issue reports about information for supporting decision-making management....
Feature Based Approach for Detection of Smishing Messages in the Mobile Environment
Ankit Kumar Jain, B. B. Gupta. © 2021. 21 pages.
Smishing is a security attack that is performed by sending a fake message intending to steal personal credentials of mobile users. Nowadays, smishing attack becomes popular due...
Security, Privacy, and Forensics Issues in Big Data
Ramesh C. Joshi, Brij B. Gupta. © 2020. 456 pages.
With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings...
International Journal of Digital Strategy, Governance, and Business Transformation (IJDSGBT)
Brij Gupta. Est. 2020.
The International Journal of Digital Strategy, Governance, and Business Transformation (IJDSGBT) focuses on digital strategy and governance issues within organizations in support...
Modern Principles, Practices, and Algorithms for Cloud Security
Brij B. Gupta. © 2020. 344 pages.
In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven...
Malware Threat in Internet of Things and Its Mitigation Analysis
Shingo Yamaguchi, Brij Gupta. © 2020. 17 pages.
This chapter introduces malware's threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs' web...
Handbook of Research on Intrusion Detection Systems
Brij B. Gupta, Srivathsan Srinivasagopalan. © 2020. 407 pages.
Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses...
Handbook of Research on Multimedia Cyber Security
Brij B. Gupta, Deepak Gupta. © 2020. 372 pages.
Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In...
Security Threats and Recent Countermeasures in Cloud Computing
Anupama Mishra, Neena Gupta, Brij B. Gupta. © 2020. 17 pages.
The cloud is an appealing innovation that has driven, in record time, an extraordinary interest. It is right now one of the busiest regions of research in IT, due to its...
Taxonomy of Payment Structures and Economic Incentive Schemes in Internet
Brij B. Gupta, Prachi Gulihar. © 2020. 17 pages.
Recently the study of economics of internet has emerged as an emerging field of study. The workstations being distributed across the network along with the users having varied...
Phishing Attack Detection using a Search Engine and Heuristics-based Technique
Brij B. Gupta, Ankit Kumar Jain. © 2020. 16 pages.
The language used in the textual content of the webpage is the barrier in most of the existing anti-phishing methods. Most of the existing anti-phishing methods can identify the...
A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
Brij B. Gupta, Amrita Dahiya, Chivesh Upneja, Aditi Garg, Ruby Choudhary. © 2020. 33 pages.
DDoS attack always takes advantage of structure of Internet and imbalance of resources between defender and attacker. DDoS attacks are driven by factors like interdependency of...
Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs
Brij B. Gupta, Somya Ranjan Sahoo, Vaibhav Bhatia, Adil Arafat, Abhik Setia. © 2020. 26 pages.
This chapter discusses a model that allows the user to access social networking sites through login using smart phone-based biometric authentication. Currently, social networking...
An Attribute-Based Searchable Encryption Scheme for Non-Monotonic Access Structure
Mamta ­, Brij B. Gupta. © 2020. 21 pages.
Attribute based encryption (ABE) is a widely used technique with tremendous application in cloud computing because it provides fine-grained access control capability. Owing to...
Cloud Computing Security: Taxonomy of Issues, Challenges, Case Studies, and Solutions
Chhavi Chaturvedi, Brij B. Gupta. © 2020. 20 pages.
The applications and software using cloud computing as a base have significantly increased, and cloud computing is nowadays developed as a scalable and cost-effective technique....
Study of Smartcards Technology: Structure, Standards, Threats, Solutions, and Applications
Shaifali Narayan, Brij B. Gupta. © 2020. 16 pages.
Smart cards have gained popularity in many domains by providing different facilities in every domain. Such cards are beneficial for storing credentials and access information....
Defending Multimedia Content Embedded in Online Social Networks (OSNs) Using Digital Watermarking
Brij B. Gupta, Somya Rajan Sahoo, Prashant Chugh, Vijay Iota, Anupam Shukla. © 2020. 24 pages.
In global internet usage, increasing multimedia message, which includes video, audio, images, and text documents, on the web raised a lot of consequences related to copyright....
An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
Amrita Dahiya, Brij B. Gupta. © 2020. 25 pages.
Volumetric DDoS attacks are continued to be an immense threat to e-commerce and other online businesses from the last decade as attackers have much resources to amplify scale and...
Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags
Aakanksha Tewari, Brij B. Gupta. © 2020. 15 pages.
Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household...
A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures
Brij B. Gupta, Shaifali Narayan. © 2020. 25 pages.
In recent years, contactless transactions have risen rapidly. It includes NFC, MST, contactless cards, and many other payment methods. These payment methods have certain security...
Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure
Brij B. Gupta, Pooja Chaudhary, Shashank Gupta. © 2020. 27 pages.
Cross-site scripting is one of the notable exceptions effecting almost every web application. Hence, this article proposed a framework to negate the impact of the XSS attack on...
Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud
Mamta, Brij B. Gupta. © 2020. 26 pages.
Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to...
Handbook of Research on Cloud Computing and Big Data Applications in IoT
B. B. Gupta, Dharma P. Agrawal. © 2019. 609 pages.
Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information...
A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network
Pooja Chaudhary, B. B. Gupta, Shashank Gupta. © 2019. 27 pages.
This article presents a hybrid framework i.e. OXSSD (Online Social Network-Based XSS-Defender) that explores cross-site scripting (XSS) attack vectors at the vulnerable points in...
Feature Based Approach for Detection of Smishing Messages in the Mobile Environment
Ankit Kumar Jain, B. B. Gupta. © 2019. 19 pages.
Smishing is a security attack that is performed by sending a fake message intending to steal personal credentials of mobile users. Nowadays, smishing attack becomes popular due...
ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor
Mamta, Brij B. Gupta, Syed Taqi Ali. © 2019. 21 pages.
Public-key encryption with keyword search (PEKS) is a well-known technique which allows searching on encrypted data using the public key system. However, this technique suffers...
Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search
Mamta, Brij B. Gupta, Syed Taqi Ali. © 2019. 23 pages.
Attribute based encryption (ABE) is an encryption technique which provides a good solution to the security issues in the cloud environment. Through ABE, a data owner can achieve...
Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud
B. B. Gupta, Shashank Gupta, Pooja Chaudhary. © 2017. 31 pages.
This article presents a cloud-based framework that thwarts the DOM-based XSS vulnerabilities caused due to the injection of advanced HTML5 attack vectors in the HTML5 web...
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Brij Gupta, Dharma P. Agrawal, Shingo Yamaguchi. © 2016. 589 pages.
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed...
International Journal of Cloud Applications and Computing (IJCAC)
B. B. Gupta, Miltiadis D. Lytras. Est. 2011.
The International Journal of Cloud Applications and Computing (IJCAC) is a peer-reviewed journal that focuses on and publishes research on all aspects of Cloud Computing...
International Journal of Software Science and Computational Intelligence (IJSSCI)
Brij Gupta, Andrew W.H. Ip. Est. 2009.
The latest developments in computer science, theoretical software engineering, cognitive science, cognitive informatics, intelligence science, and the crystallization of...
International Journal on Semantic Web and Information Systems (IJSWIS)
Miltiadis D. Lytras, Brij Gupta. Est. 2005.
The International Journal on Semantic Web and Information Systems (IJSWIS) promotes a knowledge transfer channel where academics, practitioners, and researchers can discuss...
Journal of Organizational and End User Computing (JOEUC)
Sang-Bing Tsai. Est. 1989.
The Journal of Organizational and End User Computing (JOEUC) , which has been published for more than 30 years, provides high impact research in all areas of organizational and...