Er. Ms. Kritika
Er. Ms. Kritika
Master of Technology
An interdisciplinary cybersecurity researcher expanding the horizons to all domains.
About
25
Publications
1,163
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
20
Citations
Introduction
An interdisciplinary cybersecurity researcher focussed on exploring the intersection of technology, policy and human behaviour by combining insights from computer science, social sciences, and emerging technologies like AI/ ML, neuroscience, IOT, blockchain and much more.
Skills and Expertise
Publications
Publications (25)
The rapidly evolving digital environment has changed how people think, communicate, and behave, calling for an interdisciplinary understanding of how people interact with machines. This manuscript investigates the newly-emerging discipline of cyberpsychology, which combines sociology, technology, and psychology to study how individuals interact wit...
Strong and efficient defences have to be developed in response to the more-sophisticated phishing attempts is deep learning algorithms. The extensive analysis, which spans 41 research studies from 2019 to 2024, examines the state-of-the-art in deep learning for phishing URL identifica-tion. The review groups the studies according to feature enginee...
The intersection of cybersecurity and generative artificial intelligence (AI) has become a crucial frontier as the digital landscape changes. By examining the inter- action between AI-powered attacks and defence mechanisms and concentrating on applications like anomaly detection, synthetic data generation, automated incident response, and forensics...
The manifold rise in ransomware attacks noted highest in 2023 posing a serious trepidation for cyber professionals to be active watchdogs of the early detection techniques. Ransomware is a type of malware often used to encrypt the confidential user files and network and demanding a hefty ransome to decrypt it. The emergence of modern day technologi...
The articles explores the integration of neuroscience and cybersecurity and how neuroscience can shape the future of the cybersecurity industry.
In the cybersecurity arena, generative adversarial networks, or GANs, are a potent technique that has gained attention. Examining GANs' potential in domains such as malware analysis, adversarial defence, and anomaly detection, this book chapter explores the use of GANs to bolster defences against cyberattacks. Cybersecurity experts may create stron...
The digital transformation in the tourism, aviation, and hospitality industries has led to unprecedented connectivity and productivity with the integration of automation and AI in operational processes. A robust and transparent industry is built on good governance and cyber security measures while understanding how effective management, security, s...
Bad coding techniques that go against basic design principles known as code smells, have a detrimental effect on the maintainability, performance, and resource utilization of software. The usefulness of code smells for Android application energy profiling is examined in this study. Five distinct code smells are examined, namely, the use of hash map...
The intersection of neuroscience and artificial intelligence (AI) represents a turning point in technological
progress, presenting previously unheard-of chances to better comprehend and improve human cognition while also posing
significant ethical issues. The ethical implications of AI-driven neuro-technologies are examined in this work, "The Neura...
As cyber threats continue to evolve, there is growing recognition that effective security requires a deeper scientific understanding of the complex drivers of human judgment and decision-making. The emerging field of neuroeconomics, combining economics, psychology, and neuroscience, provides new theoretical frameworks, measurement techniques, and m...
The swift progress in the fields of neuroscience and cybersecurity has presented a transformative opportunity for multidisciplinary collaboration. The use of neuroscience-informed approaches can offer fresh perspectives and tactics for bolstering cybersecurity safeguards as the digital ecosystem grows more intricate and linked. This editorial exami...
Expanding access to quality education and mentorship are pivotal yet underutilized strategies for empowering women and girls globally. This chapter examines persistent barriers like poverty, cultural norms, and lack of female teachers inhibiting girls' education access. It highlights interventions including cash transfers, infrastructure improvemen...
Sustainable software development practices are essential for ensuring code quality, maintainability, and security. However, traditional approaches often overlook the presence of code smells and vulnerabilities, leading to technical debt and security risks. This paper presents a comprehensive analysis of code smells and vulnerabilities in Java appli...
The booming landscape of multidisciplinary studies, namely, neuroscience, ethics and cyber security brings into focus the emerging need of developing ethical standards for neural data to the implemented safely in the domain of cyberspace. The synergy between neuroscience and cybersecurity emphasizes the transformative potential of technologies like...
The evolution of internet and Web 3.0 poses an ever-growing trend of remote working allowing people to work at their ease and raising concern over cyber security issues for secured transaction of work in remote environment. The necessity of implementing a thorough cybersecurity framework that includes encrypted data transmission, secure communicati...
The rapidly evolving technological space in 21st century traces to the development of novelty of the metaverse, a term first coined in 1992 by Neal Stephenson. Metaverse is defined as a 3D virtual cyberspace blending the physical and digital world, facilitated by the convergence between the internet and web technologies and extended reality (XR). T...
The advent of advanced technologies like blockchain, cryptocurrency, etc. has posed threats to the humongous data of the organisations at voluminous scale hindering day to day activities of the institution which paves way for governance of data at every level of the organisation defining roles and responsibilities of each and every member. Data gov...
The advanced software application developed using various programming languages pose great threat to the breach of confidential data if not taken care of. Code smells and Vulnerabilities deals with identifying the lacunae in software during maintenance and after production respectively. Code smells are niggardly practices followed by developers and...
Cyberbullying and online harassment have become pervasive issues, disproportionately affecting various demographics, with women being particularly vulnerable. This poses significant threats to individuals’ well-being, mental health, and overall safety in the digital realm. AI tools offer a multifaceted approach with the use of advanced sentiment an...
Prelude: The 21 st century is an age of neurosciences in every possible field and cyber security is no exception to that. The introduction of Neurocyberpsychology as an interdisciplinary subject combining fields of neuropsychology, cognitive neurosciences and cybernetics to aid questions on the decision making process of cyber security analysts whi...
With the National Cybercrime Reporting portal witnessing an increase of 15.3% increase in the cyber cases in second quarter of 2022, the post pandemic world has seen a tremendous rise in the number of cybercrime cases. The cases have increased many folds, 125% from 2021, and still continues beyond. The targets of crime are not limited to any age gr...
With the advent of 6G technologies and augmentation of cyber crimes around the world, there persists an obligation for the uncompromising cyber security and laws to safeguard the confidential information from the mischiefs who threaten to knock down the nations with their alarming acts. E-governance is one such area which needs the utmost surveilla...
The augmenting rate of digital crimes in the contemporary era has coerced the desideratum of newfangled cyber forensic technologies. With the upgradation of technological resources from web 1.0 to web 3.0,from traditional cashing methods to manoeuvre of cryptocurrencies for transactions and the perception of e-officeunder Digital India Mission, thu...
The ever-advancing world in terms of technology from web 1.0 to web 3.0, the need for designing and developing software applications has increased many folds. The digitalization of everything at a quick pace from including banking applications, mobile gaming etc. has led to the negligence of the part of the software developers which has led to incr...