Vikas Sihag

Vikas Sihag
Sardar Patel University of Police, Security and Criminal Justice, Jodhpur · Department of Cyber Security

Professor (Assistant)
Looking for potential collaborators in cyber forensics and malware analysis.

About

49
Publications
41,348
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
501
Citations

Publications

Publications (49)
Chapter
rone usage has increased significantly in the current digital era, including not just criminal activity but also military and supply chain logistics. These illicit uses include espionage, drug trafficking, the delivery of illicit weapons, and state-sponsored terror acts. In these kinds of situations, finding and identifying drones has become crucia...
Conference Paper
The Internet is abuzz with opportunities and challenges for youth wherein challenges assume the form of threats and risks at times. Online grooming is one such risk faced by youth that can be detrimental to their physical, mental, and sexual well-being. Using suitable concepts from risk studies, information security and cyber sociology, this study...
Chapter
The use of blockchain technology has become increasingly popular for protecting data storage and transmission through decentralised, peer-to-peer networks. This technology is essentially a synchronised decentralised database managed by Distributed Ledger Technology (DLT), which shifts trust from a centralised network to a completely decentralised n...
Chapter
Android is the most popular widely accessible smartphone operating system, yet its permission declaration and access control systems cannot detect malicious activities. Advanced malware uses cutting-edge obfuscation techniques to mask its true intentions from scanning engines, and traditional malware detection approaches are no longer effective in...
Article
Full-text available
Cyber Security and forensics for Unmanned Aerial Vehicles (UAVs) pose unique requirements, solutions, and challenges. As UAVs become increasingly prevalent for legitimate and illegal use, ensuring their security and data integrity is important. Solutions have been developed to tackle these security requirements. Drone forensics enables the investig...
Article
Full-text available
From the Iranian green movement (2009) through the London riots (2011) and the recent anti-hijab protests in Iran, protest movements have been accompanied by considerable social media activity globally. Social media users have been involved in the quick production and distribution of audio-visuals online with protest hashtags, rumors, and sometimes...
Chapter
The digital era is proliferating, and we are in a time where we interact with lots of information in many ways. Life has become more sensitive with social media, and in the present scenario, users’ activity on social media has become more frequent. The impact of social media and the news shared over it directly impacts the user. Social media is a p...
Chapter
Full-text available
In the current decade, the use of cloud storage services is drastically increasing because it provides large data storage with various functionalities. Consequently, it is easier for someone to download, upload, change, and share data on multiple platforms. Meanwhile, cloud storage forensics is of paramount importance for service providers to recti...
Chapter
Full-text available
With the widespread adoption of handheld smartphones, the number of malware targeting them has grown dramatically. Because of the widespread use of cell phones, the quantity of malware has grown dramatically. Because of their ubiquity, android smartphones are the most sought-after targets among smart gadgets. We provide an unique image-based deep l...
Chapter
User Authentication is crucial for every application. Initially, session variables were used. If a session ID was compromised, lost, or stolen, the user’s identity was compromised. This resulted from session IDs having a long lifespan and the tendency of most users not to log out of their accounts. JSON web tokens (JWTs) Tokens were introduced to o...
Chapter
As businesses are moving toward digitalization, their essential operation on Web Applications is also increased. The complexity and the size of Web Applications are growing, and so is the concern of Web Application Security. The dynamic nature of Web Applications calls for a dynamic and robust testing methodology, a Dynamic Web Application testing,...
Article
Full-text available
Aim: As the aviation industry grows more digital and reliant on wireless technology, it has grown more appealing to cyber criminals, including nation-state actors and terrorists. Vulnerabilities in a wide range of networked devices and (sub)systems, as well as their implementations and design defects, can be used to carry out malicious operations....
Preprint
The explosion in IoT devices' growth becomes the primary target to attackers. It provides a large attack surface to attackers for Distributed Denial of Service (DDoS), Eavesdropping, Privilege Escalation, etc. There is an open requirement for solutions to analyze the advanced malware in a secure environment to understand IoT malware behavior. This...
Conference Paper
Full-text available
Blockchain is a chain of blocks that are linked to each other via the Hash of the previous block. Digitalized Education sector has a lot of benefits for the student like providing one to one learning experience, flexibility in learning, etc. The Future Scope of the Education sector is vast, and new technology will be invented in the future for stud...
Chapter
Full-text available
People these days are getting more and more digitized. Every other person is using a smartphone and wearing smartwatches. These days cell phones and wearable devices have been used in many different ways. It keeps track of the location used for payment, keeps track of health conditions, etc. These types of information are stored in the database of...
Chapter
Full-text available
It is difficult to be anonymous online with user activities always under the scanner. Multiple identifiers and their combinatories are used for user identification. While browsing, trackers keep a record of artifacts such as OS version, screen resolution, and fonts enabled. Browser fingerprinting tries to identify a user’s browser uniquely, without...
Article
Full-text available
Named-entity recognition (NER) is one of the primary components in various natural language processing tasks such as relation extraction, information retrieval, question answering, etc. The majority of the research work deals with flat entities. However, it was observed that the entities were often embedded within other entities. Most of the curren...
Article
Full-text available
As the aviation sector becomes digitized and increasingly reliant on wireless technology, so has its attractiveness to cyber attackers including nation-state actors and terrorists. For example, vulnerabilities in the broad range of interconnected devices and (sub)systems, their implementations, as well as design flaws, can be exploited to carry out...
Chapter
Full-text available
The explosion in IoT devices’ growth becomes the primary target to attackers. It provides a large attack surface to attackers for Distributed Denial of Service (DDoS), Eavesdropping, Privilege Escalation, etc. With a lack of research in IoT security, there are lake solutions to analyze the advanced malware in a secure environment to understand IoT...
Article
Full-text available
The post-COVID epidemic world has increased dependence on online businesses for day-to-day life transactions over the Internet, especially using the smartphone or handheld devices. This increased dependence has led to new attack surfaces which need to be evaluated by security researchers. The large market share of Android attracts malware authors t...
Preprint
Full-text available
It is difficult to be anonymous online with user activities always under the scanner. Multiple identi-fiers and their combinatories are used for user identification. While browsing, trackers keep a record of artifacts such as OS version, screen resolution, and fonts enabled. Browser fingerprinting tries to identify a user's browser uniquely, withou...
Preprint
Full-text available
People these days are getting more and more digitized. Every other person is using smartphone and wearing smart watches. These days cell phones and wearable devices has been used in many different ways. It keeps the track of the location, used for payment, keeps the track of health condition, etc. These type of information are stored in the databas...
Article
Full-text available
Android OS popularity has given significant rise to malicious apps targeting it. Malware use state of the art obfuscation methods to hide their functionality and evade anti-malware engines. We present BLADE, a novel obfuscation resilient system based on Opcode Segments for detection. It makes three contributions: Firstly, a novel Opcode Segment Doc...
Article
Full-text available
Since the invention of the Blockchain technology in 2008, it has been used in many domains to ensure high security and reliability of data, like from the use of Bitcoin to BaaS (Blockchain as a Service) which is a new blockchain trend and is a sort of cloud-based network for the organizations in the business of building blockchain-based application...
Article
Full-text available
The growth of wireless network systems is expanding deploying techniques to drive more network capacity and enabling low device complexity with low energy consumption to improve Quality of Service also a proper balance between data transmission and data integrity. Market Growth of Wireless Network System is expected at 62.8 million USD and is likel...
Article
Full-text available
The growth of wireless network systems is expanding deploying techniques to drive more networkcapacity and enabling low device complexity with low energy consumption to improve Quality ofService also a proper balance between data transmission and data integrity. Market Growth of WirelessNetwork System is expected at 62.8 million USD and is likely t...
Conference Paper
Full-text available
While fileless and file-based malware attacks are two completely different approaches, even their assistance and detection tools vary. Fileless malware executes in a non-traditional way without leaving traces on the file system, thus evading detection engines. They are powerful because of their persistence and evasion methods. To analyze such malwa...
Article
Full-text available
Since the invention of the Blockchain technology in 2008, it has been used in many domains to ensurehigh security and reliability of data, like from the use of Bitcoin to BaaS (Blockchain as a Service)which is a new blockchain trend and is a sort of cloud-based network for the organizations in thebusiness of building blockchain-based applications....
Article
Full-text available
Popularity and market share of Android operating system has given significant rise to malicious apps targeting it. Traditional malware detection methods are obsolete as current malwares are equipped with state of the art obfuscation methods to hide their intent from scanning engines. In this paper, we propose De-LADY (Deep Learning based Android ma...
Article
Full-text available
In the age of increasing mobile and smart connectivity, malware poses an ever evolving threat to individuals, societies and nations. Anti-malware companies are often the first and only line of defense for mobile users. Driven by economic benefits, quantity and complexity of Android malware are increasing, thus making them difficult to detect. Malwa...
Article
Full-text available
The problem of violence against women is pervasive, ubiquitous and widespread, It is assuming new dimensions with the changing forms of society globally. The new forms of violence against women are equally alarming as the old ones, with an exponential rise in the former. Cybercrime is the new age crime of knowledge and information society which is...
Article
Full-text available
In today's world of digitization, online electronic payment systems, and banking authentication have an important role in everyone's life. Banks use different ways of authentication at a different level to maintain the security of the hard-earned money. The security issues in the e-payment system, ATM, websites that store data or details of the car...
Article
Full-text available
In today’s world of digitization, online electronic payment systems, and banking authentication havean important role in everyone’s life. Banks use different ways of authentication at a different level tomaintain the security of the hard-earned money. The security issues in the e-payment system, ATM,websites that store data or details of the cardho...
Chapter
Full-text available
User’s security and privacy are of increasing concern with the popularity of Android and its applications. Apps of malicious nature attempts to perform activities like information leakage and user profiling, detection of which is a challenge for security researchers. In this paper, we try to solve this problem by proposing a behavior based approach...
Chapter
Full-text available
Android devices are not just phones, they are necessity for its users. Android’s open-source nature leads to massive development of applications for end users to use which also create lots of vulnerable applications that are ready to be exploited. In this paper we discuss and analyse the OnlineCabBookings Android application which is used for booki...
Conference Paper
Full-text available
In the study of networks, such as complex network, social network or biological network; number of different characteristics of many nodes are found common. These characteristics includes small-world property, clustering and community structure, among others. In the context of networks, community structure refers to occurrence of groups of nodes in...
Conference Paper
Full-text available
Internet today is also a medium of sharing immeasurable amount of information for widespread Peer to Peer (P2P) environments. Various application domains such as file sharing, distributed computing and e community based applications adopted the P2P technology as underlying network structure. A fairly open structure of P2P network applications, also...
Article
Full-text available
Finding community structure in networks has been always the prerequisite for the analysis of network structure and its properties. Based on node traffic, an efficient method for calculating betweenness measure is proposed. It is used iteratively to remove edges with high betweenness score from the network, thus splitting network into communities. T...
Article
Full-text available
Document clustering is used in information retrieval to organize a large collection of text documents into some meaningful clusters. k-means clustering algorithm of pratitional category, performs well on document clustering. k-means organizes a large collection of items into k clusters so that a criterion function is optimized. As it is sensitive t...
Conference Paper
Full-text available
With an abundance of social network data being released, the need to protect sensitive information within these networks has become an important concern of data publishers. One of privacy preserving approaches often used is anonymization. This paper focuses on the popular notion of k-anonymization, where k is the required threshold of structural an...
Article
There are many existing algorithms efficiently using the immense bandwidth of optical fiber switching by providing a contention free environment. These algorithms use either the hardware based or the software based approaches. Optical routing & buffering and wavelength converters are often employed to provide a solution to the same. In this article...

Network

Cited By