Sunita Vikrant Dhavale

Dr. Sunita Vikrant Dhavale, BE, ME, PhD(CSE), C|EH is currently working as Assistant Professor in Department of Computer Engineering, Defense Institute of Advanced Technology (DIAT), Pune. Her research area includes cyber security, artificial intelligence, image/audio/video security, bio metric, deep learning. She is EC-Council’s Certified Ethical Hacker (CEH-v9). She has authored two books and more than 30 papers in reputed international journals and conference proceedings. She is member of various professional bodies including IEEE, ACM, ISACA,IETE, IAENG. She is recipient of 1) NVIDIA Hardware Research Grant - TITAN V GPU for Jan 2019, 2) IETE-M N Saha Memorial Award -2016, 3) Outstanding Women Achiever Award for Engineering Category by VENUS International Women Awards (VIWA-2016), 4) Top performer in Four Week online FDP titled “FDP301x : Mentoring Educators in Educational Technology”, organized by Pandit Madan Mohan Malaviya National Mission for Teachers and Teaching (PMMMNMTT), MHRD, GoI, IIT Bombay, May 2018 5) Top performer in Four Week AICTE approved online FDP by IIT Bombay on - Use of ICT in Education for Online and Blended Learning, May 2016.

Publications

Why One Should Learn Ethical Hacking
Sunita Vikrant Dhavale. © 2022. 42 pages.
This chapter presents the importance of learning hacking techniques by each and every person dealing with cyber operations. The chapter explains various basic terminologies used...
AI-Driven COVID-19 Patient Screening With Design Thinking Approach- C3IA Tool: A Case Study
Sunita Vikrant Dhavale. © 2022. 11 pages.
In this chapter, the authors discuss a brief literature review on AI-driven COVID-19 patient screening technologies along with their pros and cons. Next, they discuss the need of...
Motivational Quotes-Based Intelligent Insider Threat Prediction Model
Sunita Vikrant Dhavale. © 2021. 13 pages.
Insiders are considered as the weakest link. The digital records of a person's Facebook likes against motivational quotes can be used for automatic and accurate prediction of...
Video Saliency Detection for Visual Cryptography-Based Watermarking
Adrita Barari, Sunita V. Dhavale. © 2020. 39 pages.
The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also...
Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention
Sunita Vikrant Dhavale. © 2019. 281 pages.
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on...
Insider Attack Analysis in Building Effective Cyber Security for an Organization
Sunita Vikrant Dhavale. © 2019. 18 pages.
Recent studies have shown that, despite being equipped with highly secure technical controls, a broad range of cyber security attacks were carried out successfully on many...
Insider Attack Analysis in Building Effective Cyber Security for an Organization
Sunita Vikrant Dhavale. © 2018. 17 pages.
Recent studies have shown that, despite being equipped with highly secure technical controls, a broad range of cyber security attacks were carried out successfully on many...
Advanced Image-Based Spam Detection and Filtering Techniques
Sunita Vikrant Dhavale. © 2017. 213 pages.
Security technologies have advanced at an accelerated pace in the past few decades. These advancements in cyber security have benefitted many organizations and companies...
Video Saliency Detection for Visual Cryptography-Based Watermarking
Adrita Barari, Sunita V. Dhavale. © 2016. 39 pages.
The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also...