Publications & Patents
Photo by Gabriella Clare Marino / Unsplash

Publications & Patents

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media

Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages researchers to explore the key concepts of data mining, such as how they can be utilized on online social media platforms and provides advances on data mining for big data and sentiment analysis in online social media, as well as future research directions. Covering a range of concepts from machine learning methods to data mining for big data analytics, this book is ideal for graduate students, academicians, faculty members, scientists, researchers, data analysts, social media analysts, managers, and software developers who are seeking to learn and carry out research in the area of data mining for big data and sentiment.

Release Date: December 2021

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow.

Power of Digital Identity

Winning Consumer Trust and Transforming Experience

Book Cover


The world is going digital to deliver things and services in moments instead of days. Digital identities have become the foundation of consumer-brand relationships. And, Trust and Experience are the pillar of modern digital relationships i.e. consumers expect amazing and secure digital experiences where privacy is protected.

It is a strategy book for c-suite to understand the role of digital identity in consumer relationships and build the kind of CIAM strategy that drives growth.

Power of Digital Identity - Winning Consumer Trust and Transforming Experience
The world is going digital to deliver things and services in moments instead of days. Digital identities have become the foundation of consumer-brand relationships. And, Trust and Experience are the pillar of modern digital relationships i.e. consumers expect amazing and secure digital experience wh…

Special Issue "Recent Advances on Deep Learning for Safety and Security of Multimedia Data in the Critical Infrastructure"

There are some systems and networks that make up the infrastructure of society. Some of these infrastructures are of utmost importance and are related to each other. If one of these is critically damaged, then it can cause huge disturbances and losses for a nation. These are known as critical infrastructures.

This Special Issue mainly focuses on deep learning for the safety and security of multimedia data in critical infrastructure, addressing both original algorithmic development and new applications. We are soliciting original contributions, of leading researchers and practitioners from academia as well as industry, which address a wide range of theoretical and application issues in this domain.

Recent Advances on Deep Learning for Safety and Security of Multimedia Data in the Critical Infrastructure
There are some systems and networks that make up the infrastructure of society. Some of these infrastructures are of utmost importance and are related to each other.

Method and system for defense against Distributed Denial-of-Service attack

The present disclosure relates to a method for defense mechanisms against DDoS attack based on entropy in software defined network cloud. The present disclosure also relates to a defensive mechanism for DDoS attacks that is based on variations in entropy between DDoS attack and a normal traffic with a low computational overhead and a mitigation technique to reduce the severity of the attack. On comparing with the existing DDoS mechanisms, there are three advantages of the proposed method and those advantages are, detection rate is high, false positive rate is low, and the mitigation ability. Simulations are carried out in mininet emulator with POX controller and open flow switches at different attack strength.

Method and system for defense against Distributed Denial-of-Service attack
The present disclosure relates to a method for defense mechanisms against DDoS attack based on entropy in software defined network cloud.

Method and system of performing a fine-grained searchable encryption for resource-constrained devices in m-health network

The present disclosure relates to an existing attribute-based keyword search method with constant-size secret keys and ciphertexts. The method consists of a system and the system comprises of a trusted authority (TA), a data owner, a data use, and a cloud server. The present disclosure proposes a searchable encryption scheme based on ABE in which access control is used to determine the searching capability of a user. The scheme provides constant size for the user's secret key and ciphertext of the keyword. The scheme supports fast search as the number of pairing operations are constant. The scheme used a ciphertext-policy (CP) design framework and supports an AND gate access structure. Further, the proposed CP-ABKS scheme is secure in the selective security model under augmented multi-sequence of exponents decisional DiffieHellman assumption.

Method and system of performing a fine-grained searchable encryption for resource-constrained devices in m-health network
IntroductionThe present disclosure relates to an existing attribute-based keyword search method with constant-size secret keys and ciphertexts. The method consists of a system and the system comprises of a trusted authority (TA), a data owner, a data use, and a cloud server. The present disclosure p…

Handbook of Computer Networks and Cyber Security - Principles and Paradigms

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented.

Handbook of Computer Networks and Cyber Security
Presents a comprehensive collection of up-to-date computer network and cyber security issues and analysis. Provides refreshing, informative, and easy to follow subject matter. Includes valuable insight into security aspects, current trends, and case studies/use cases.

Handbook of Research on Multimedia Cyber Security

The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

Handbook of Research on Multimedia Cyber Security
Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data.

Computer and Cyber Security - Principles, Algorithms, Applications and Perspectives

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Computer and Cyber Security
This chapter discusses the cyber security, consumers are genius and overconfident in their security skills