- Security and Verification in Computing
- Distributed systems and fault tolerance
- Advanced Database Systems and Queries
- Web Application Security Vulnerabilities
- Advanced Malware Detection Techniques
- scientometrics and bibliometrics research
- Software System Performance and Reliability
- Software Engineering Research
- Software Testing and Debugging Techniques
- Face and Expression Recognition
- Parallel Computing and Optimization Techniques
- Doctoral Education Challenges and Solutions
- Complex Network Analysis Techniques
- Recommender Systems and Techniques
- Service-Oriented Architecture and Web Services
- IoT and Edge/Fog Computing
- Advanced Graph Neural Networks
- Misinformation and Its Impacts
- Software Reliability and Analysis Research
- Cloud Computing and Resource Management
- Opportunistic and Delay-Tolerant Networks
- Subtitles and Audiovisual Media
- Sentiment Analysis and Opinion Mining
- Distributed and Parallel Computing Systems
- Machine Learning and ELM
Indian Institute of Information Technology Guwahati
2020-2024
Indian Institute of Technology Patna
2015-2018
National Institute of Technology Durgapur
2014
In today's world the art of sending & displaying hidden information especially in public places, has received much attention and faced many challenges. Therefore, different methods have been proposed so far for hiding various cover media. Steganography is method to hide a message inside another without drawing any suspicion others that can only be detected by its intended recipient. With other steganography such as Image, Audio, Video, number text algorithms introduced. This paper presents...
Dependency information (data-and/or control-dependencies) among program variables and statements is playing crucial roles in a wide range of software-engineering activities, e.g. slicing, flow security analysis, debugging, code-optimization, code-reuse, code-understanding.Most existing dependency analyzers focus on mainstream languages they do not support database applications embedding queries data-manipulation commands.The first extension to the for relational management systems, proposed...
SQL injection attack is one of the serious security threat for a database application. It permits attackers to get unauthorized access by inserting malicious code into application through user input parameters. In this paper, we propose input-based analysis approach detect and prevent Injection Attacks (SQLIA), as an alternative existing solutions. This technique has two part (i) categorization (ii) verifier. We provide brief discussion proposal w.r.t literature on time cost point view.
In scientific research work, collaboration always plays an important role. Although the development of new is mostly aligned among established researchers. However, need for Early Career-stage Researcher (ECR) a crucial role in his career and growth works concerned domain. this we address ECR co-authorship network characterize their behavior. We analyze pub-lication pattern ECRs first ten years compare same with early stage period Note that, use h-index distributions authors to find...
In the realm of scientific research, collaboration plays a pivotal role. Identifying and supporting Early Career-stage Researchers (ECRs) is crucial for fostering their career development ensuring growth knowledge in respective fields. this paper, we present machine learning-based approach to identify ECRs from large-scale bibliographic datasets. Our proposed framework leverages various features extracted dataset, including publication records, citation patterns, academic affiliations,...
Now-a-days web applications are everywhere. Usually these developed by database program which often written in popular host programming languages such as C, C++, C#, Java, etc., with embedded Structured Query Language (SQL). These used to access and process crucial data the help of Database Management System (DBMS). Preserving sensitive from any kind attacks is one prime factors that needs be maintained applications. The SQL injection important security threat for In this paper, we propose a...