Ms. Kritika | Cybersecurity Awards | Best Researcher Award

Ms. Kritika | Cybersecurity Awards | Best Researcher Award

Ms. Kritika, India

šŸŽ“ Ms. Kritika, a dynamic Computer Science postgraduate šŸ–„ļø, holds both a Master’s and Bachelor’s degree from GGSIP University in New Delhi, India šŸ‡®šŸ‡³. As an Independent Researcher based in Delhi, her expertise in cybersecurity is evident through her extensive contributions, including peer-reviewed articles and book chapters šŸ“š. Kritika’s research interests span interdisciplinary cybersecurity domains, code smell detection in software šŸ§¾, and vulnerability analysis and mitigation strategies šŸ›”ļø. Her ambition and dedication drive her to uncover new insights and best practices in the ever-evolving landscape of cybersecurity.

šŸŒ Professional Profile:

Orcid

šŸŽ“ Educational Background

  • Master of Technology in Computer Science and Engineering (2022) – GGSIP University, New Delhi, India
  • Bachelor of Technology in Information Technology (2019) – GGSIP University, New Delhi, India

šŸ¢ Professional Experience

  • Independent Researcher – Delhi, India

šŸ“ Research Interests

  • Interdisciplinary cybersecurity domains
  • Code smell detection in software
  • Vulnerability analysis and mitigation strategies

Publication Top Notes:

1.Ā  Cyber Security and its cognitive ramifications on E-Governance
2.Ā  Correlating propensity between code smell and vulnerability in java applications
3.Ā  A Deep Dive into Code Smell and Vulnerability Using Machine Learning and Deep Learning Techniques
4.Ā  A review on harmonizing psychological factors into cyber space
5.Ā  Corollary of digital forensics in e governance

 

 

 

 

 

Dr. Negalign Wake Hundera | Network Security and Cryptography | Best Researcher Award

Dr. Negalign Wake Hundera | Network Security and Cryptography | Best Researcher Award

Dr. Negalign Wake Hundera, Zhejiang Normal University, China

Dr. Negalign Wake Hundera is an accomplished academician and researcher with expertise in network security, cryptography, and cloud computing. Holding a Ph.D. in Software Engineering from the University of Electronic Science and Technology of China, and prior degrees from esteemed institutions in both China and Ethiopia, he has a strong foundation in academia. Currently serving as a Postdoctoral Research Fellow at Zhejiang Normal University, his contributions extend beyond research to mentoring students and securing funding for projects. With a passion for exploring the intersection of technology and real-world applications, he seeks to leverage his skills in innovative environments. Outside academia, he enjoys reading, cooking, and sports like football and table tennis. šŸŒšŸ”’šŸ–„ļø

Professional Profile:

Google Scholar

Orcid

šŸŽ“ Education:

Negalign holds a Ph.D. in Software Engineering from the University of Electronic Science and Technology of China, along with an M.Sc. in Computer Science and Technology from the same institution. He earned his Bachelor’s degree in Information Technology from Jimma University, Ethiopia. His research interests span various areas including network security, public key cryptography, IoT, cloud computing, and deep learning.

šŸ’¼ Employment History:

Currently serving as a Postdoctoral Research Fellow at Zhejiang Normal University, Negalign has been actively engaged in research and academic activities. Prior to this, he worked as an Assistance Professor for Computer Science at Wolkite University, Ethiopia, and as a Lecturer for Computer Science Department at the same university. He also served as an Information Communication and Network Infrastructure Team Leader at Wolkite University.

šŸ”§ Skills:

Negalign possesses expertise in academic writing, teaching, programming languages such as Python, C, and Java, network administration and designing, LANs/WANs, and Internet/Intranet management. He is proficient in troubleshooting network connectivity issues and is well-versed in various protocols and security measures.

šŸ“š Publications:

Negalign has numerous publications in esteemed journals and conferences, covering topics like network security, cloud computing, IoT, and cryptography. His research contributions have been recognized in various academic circles.

šŸ† Awards & Certifications:

He has received several academic achievement certificates and awards from the University of Electronic Science and Technology of China. Additionally, he holds certifications in Cisco instruction, maintenance and networking training, and SPSS.

Publication Top Notes:

  1. Title: Permission-based separation of duty in dynamic role-based access control model
    • Journal: Symmetry
    • Year: 2019
    • Citations: 24
  2. Title: A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing
    • Journal: KSII Transactions on Internet and Information Systems (TIIS)
    • Year: 2020
    • Citations: 18
  3. Title: A hybrid cnn-lstm model for virtual machine workload forecasting in cloud data center
    • Conference: 2021 18th International Computer Conference on Wavelet Active Media
    • Year: 2021
    • Citations: 11
  4. Title: The Internet of vehicles and smart cities
    • Journal: Annals of Telecommunications
    • Year: 2021
    • Citations: 10
  5. Title: DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography
    • Journal: Frontiers of Computer Science
    • Year: 2024

 

 

 

 

 

Dr. Pushpinder Chouhan | Deception Technology Award | Women Researcher Award

Dr. Pushpinder Chouhan | Deception Technology Award | Women Researcher Award

Dr. Pushpinder Chouhan, British Telecommunications plc, United Kingdom

šŸŒŸ Dr. Pushpinder Chouhan is a seasoned Senior Research Scientist at BT Plc, specializing in cybersecurity and data science with over 20 years of experience. Leading innovative projects in continuous authentication and cybersecurity deception, he has developed cutting-edge solutions ensuring network security. With a background in distributed high-performance computing and AI/IoT, he has led multiple medium to large-scale projects, including those at Ulster University and Queens University Belfast. Dr. Chouhan holds a Ph.D. in Computer Science from ENS Lyon, France, and is recognized for his exceptional contributions with numerous patents and accolades, including being ranked in the top 10% of authors in the International Journal of Communication Systems. šŸ›”ļøšŸ”¬

Professional Profile:

Scopus

šŸŽ“ Education:

Dr. Chouhan holds a Ph.D. in Computer Science from ENS Lyon, France, with a focus on automatic deployment techniques. Her academic journey includes an impressive track record of research and innovation.

šŸ¢ Work Experience:

Currently serving as a Senior Research Scientist at BT Plc, Dr. Chouhan leads groundbreaking projects in continuous authentication and deception-based cybersecurity. Previously, she held key roles at Ulster University, Queens University Belfast, and Marturion Ltd, managing and directing medium to large-scale projects.

šŸ’» Skills:

Proficient in various programming languages including R, Python, C++, and Java, Dr. Chouhan also possesses strong leadership and project management skills. Her expertise extends to database management, web technologies, and operating systems.

šŸ† Accomplishments:

Recognized as an accomplished engineer by BT and awarded the TechWomen100 Individual Winner title in 2023, Dr. Chouhan’s contributions to academia and industry are highly esteemed.

Scopus Metrics:

  • šŸ“Ā Publications: 12 documents indexed in Scopus.
  • šŸ“ŠĀ Citations: A total of 897 citations for his publications, reflecting the widespread impact and recognition of Dr. Pushpinderā€™s research within the academic community.

Publications Top Notes :

  1. A comprehensive survey on software-defined networking for smart communities
    • Published in the International Journal of Communication Systems in 2022.
    • Cited by 5 articles.
  2. Evaluation of an IoT framework for a workplace wellbeing application
    • Conference paper presented at the 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019, in 2019.
    • Cited by 5 articles.
  3. Cryptography for security in IoT
    • Conference paper presented at the 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, in 2018.
    • Cited by 19 articles.
  4. Situation assessment to secure IoT applications
    • Conference paper presented at the 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, in 2018.
    • Cited by 16 articles.
  5. Software as a service: Understanding security issues
    • Conference paper presented at the Proceedings of the 2015 Science and Information Conference, SAI 2015, in 2015.
    • Cited by 16 articles.