Er. Ms. Kritika

Er. Ms. Kritika

Master of Technology
An interdisciplinary cybersecurity researcher expanding the horizons to all domains.

About

25
Publications
1,163
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
20
Citations
Introduction
An interdisciplinary cybersecurity researcher focussed on exploring the intersection of technology, policy and human behaviour by combining insights from computer science, social sciences, and emerging technologies like AI/ ML, neuroscience, IOT, blockchain and much more.

Publications

Publications (25)
Article
Full-text available
The rapidly evolving digital environment has changed how people think, communicate, and behave, calling for an interdisciplinary understanding of how people interact with machines. This manuscript investigates the newly-emerging discipline of cyberpsychology, which combines sociology, technology, and psychology to study how individuals interact wit...
Article
Strong and efficient defences have to be developed in response to the more-sophisticated phishing attempts is deep learning algorithms. The extensive analysis, which spans 41 research studies from 2019 to 2024, examines the state-of-the-art in deep learning for phishing URL identifica-tion. The review groups the studies according to feature enginee...
Chapter
The intersection of cybersecurity and generative artificial intelligence (AI) has become a crucial frontier as the digital landscape changes. By examining the inter- action between AI-powered attacks and defence mechanisms and concentrating on applications like anomaly detection, synthetic data generation, automated incident response, and forensics...
Article
Full-text available
The manifold rise in ransomware attacks noted highest in 2023 posing a serious trepidation for cyber professionals to be active watchdogs of the early detection techniques. Ransomware is a type of malware often used to encrypt the confidential user files and network and demanding a hefty ransome to decrypt it. The emergence of modern day technologi...
Article
The articles explores the integration of neuroscience and cybersecurity and how neuroscience can shape the future of the cybersecurity industry.
Chapter
In the cybersecurity arena, generative adversarial networks, or GANs, are a potent technique that has gained attention. Examining GANs' potential in domains such as malware analysis, adversarial defence, and anomaly detection, this book chapter explores the use of GANs to bolster defences against cyberattacks. Cybersecurity experts may create stron...
Chapter
The digital transformation in the tourism, aviation, and hospitality industries has led to unprecedented connectivity and productivity with the integration of automation and AI in operational processes. A robust and transparent industry is built on good governance and cyber security measures while understanding how effective management, security, s...
Article
Full-text available
Bad coding techniques that go against basic design principles known as code smells, have a detrimental effect on the maintainability, performance, and resource utilization of software. The usefulness of code smells for Android application energy profiling is examined in this study. Five distinct code smells are examined, namely, the use of hash map...
Article
Full-text available
The intersection of neuroscience and artificial intelligence (AI) represents a turning point in technological progress, presenting previously unheard-of chances to better comprehend and improve human cognition while also posing significant ethical issues. The ethical implications of AI-driven neuro-technologies are examined in this work, "The Neura...
Article
Full-text available
As cyber threats continue to evolve, there is growing recognition that effective security requires a deeper scientific understanding of the complex drivers of human judgment and decision-making. The emerging field of neuroeconomics, combining economics, psychology, and neuroscience, provides new theoretical frameworks, measurement techniques, and m...
Article
Full-text available
The swift progress in the fields of neuroscience and cybersecurity has presented a transformative opportunity for multidisciplinary collaboration. The use of neuroscience-informed approaches can offer fresh perspectives and tactics for bolstering cybersecurity safeguards as the digital ecosystem grows more intricate and linked. This editorial exami...
Chapter
Expanding access to quality education and mentorship are pivotal yet underutilized strategies for empowering women and girls globally. This chapter examines persistent barriers like poverty, cultural norms, and lack of female teachers inhibiting girls' education access. It highlights interventions including cash transfers, infrastructure improvemen...
Article
Full-text available
Sustainable software development practices are essential for ensuring code quality, maintainability, and security. However, traditional approaches often overlook the presence of code smells and vulnerabilities, leading to technical debt and security risks. This paper presents a comprehensive analysis of code smells and vulnerabilities in Java appli...
Article
Full-text available
The booming landscape of multidisciplinary studies, namely, neuroscience, ethics and cyber security brings into focus the emerging need of developing ethical standards for neural data to the implemented safely in the domain of cyberspace. The synergy between neuroscience and cybersecurity emphasizes the transformative potential of technologies like...
Chapter
The evolution of internet and Web 3.0 poses an ever-growing trend of remote working allowing people to work at their ease and raising concern over cyber security issues for secured transaction of work in remote environment. The necessity of implementing a thorough cybersecurity framework that includes encrypted data transmission, secure communicati...
Chapter
Full-text available
The rapidly evolving technological space in 21st century traces to the development of novelty of the metaverse, a term first coined in 1992 by Neal Stephenson. Metaverse is defined as a 3D virtual cyberspace blending the physical and digital world, facilitated by the convergence between the internet and web technologies and extended reality (XR). T...
Chapter
Full-text available
The advent of advanced technologies like blockchain, cryptocurrency, etc. has posed threats to the humongous data of the organisations at voluminous scale hindering day to day activities of the institution which paves way for governance of data at every level of the organisation defining roles and responsibilities of each and every member. Data gov...
Book
The advanced software application developed using various programming languages pose great threat to the breach of confidential data if not taken care of. Code smells and Vulnerabilities deals with identifying the lacunae in software during maintenance and after production respectively. Code smells are niggardly practices followed by developers and...
Chapter
Cyberbullying and online harassment have become pervasive issues, disproportionately affecting various demographics, with women being particularly vulnerable. This poses significant threats to individuals’ well-being, mental health, and overall safety in the digital realm. AI tools offer a multifaceted approach with the use of advanced sentiment an...
Article
Prelude: The 21 st century is an age of neurosciences in every possible field and cyber security is no exception to that. The introduction of Neurocyberpsychology as an interdisciplinary subject combining fields of neuropsychology, cognitive neurosciences and cybernetics to aid questions on the decision making process of cyber security analysts whi...
Chapter
With the National Cybercrime Reporting portal witnessing an increase of 15.3% increase in the cyber cases in second quarter of 2022, the post pandemic world has seen a tremendous rise in the number of cybercrime cases. The cases have increased many folds, 125% from 2021, and still continues beyond. The targets of crime are not limited to any age gr...
Article
Full-text available
With the advent of 6G technologies and augmentation of cyber crimes around the world, there persists an obligation for the uncompromising cyber security and laws to safeguard the confidential information from the mischiefs who threaten to knock down the nations with their alarming acts. E-governance is one such area which needs the utmost surveilla...
Article
Full-text available
The augmenting rate of digital crimes in the contemporary era has coerced the desideratum of newfangled cyber forensic technologies. With the upgradation of technological resources from web 1.0 to web 3.0,from traditional cashing methods to manoeuvre of cryptocurrencies for transactions and the perception of e-officeunder Digital India Mission, thu...
Article
The ever-advancing world in terms of technology from web 1.0 to web 3.0, the need for designing and developing software applications has increased many folds. The digitalization of everything at a quick pace from including banking applications, mobile gaming etc. has led to the negligence of the part of the software developers which has led to incr...