Akashdeep Bhardwaj
YOU?
Author Swipe
View article: Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks
Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks Open
Malicious actors often exploit persistence mechanisms, such as unauthorized modifications to Windows startup directories or registry keys, to achieve privilege escalation and maintain access on compromised systems. While information techno…
View article: Correlational Study of Perceived Stress, Sleep Quality, and Ergonomic Factors among Office Workers
Correlational Study of Perceived Stress, Sleep Quality, and Ergonomic Factors among Office Workers Open
Office workers today are increasingly struggling with stress and poor sleep; poor ergonomic conditions are a big reason for this. Workspaces that aren’t designed well can interrupt a person’s circadian rhythm, increasing stress levels and …
View article: Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection
Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection Open
There are serious security issues with the quick growth of IoT devices, which are increasingly essential to Industry 4.0. These gadgets frequently function in challenging environments with little energy and processing power, leaving them o…
View article: Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation Open
The convergence of data security and operational efficiency across various sectors, such as manufacturing, industry, logistics, agriculture, healthcare, and internet services, has been significantly enhanced using robotic-driven platforms …
View article: Residual Network-Based Deep Learning Framework for Diabetic Retinopathy Detection
Residual Network-Based Deep Learning Framework for Diabetic Retinopathy Detection Open
Artificial intelligence and machine learning have been transforming the health care industry in many areas such as disease diagnosis with medical imaging, surgical robots, and maximizing hospital efficiency. The Healthcare service market u…
View article: Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch
Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch Open
This research investigates the elusive tactic of lateral movement employed by adversaries within a compromised network. The focus is on identifying the mechanisms and techniques used for lateral movement, with a particular emphasis on cred…
View article: Framework to analyze and exploit the smart home IoT firmware
Framework to analyze and exploit the smart home IoT firmware Open
Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. Currently, there are around 8 billion devices online, and by the beginning …
View article: Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics
Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics Open
The concept of the Internet of Things (IoT) threat surface refers to the overall susceptibility of smart devices to potential security risks. This vulnerability includes the combined impact of security weaknesses, gaps in protective measur…
View article: Proactive threat hunting to detect persistent behaviour-based advanced adversaries
Proactive threat hunting to detect persistent behaviour-based advanced adversaries Open
Persistence behavior is a tactic advanced adversaries use to maintain unauthorized access and control of compromised assets over extended periods. Organizations can efficiently detect persistent adversaries and reduce the growing risks pos…
View article: Evolving Threat Landscape in IoT and IIoT Environments
Evolving Threat Landscape in IoT and IIoT Environments Open
The meteoric rise of the internet of things (IoT) and industrial internet of things (IIoT) is reshaping our world, ushering in an era of hyper-connectivity and automation. This interconnected landscape, however, presents a significant para…
View article: Cybercrime, Digital Terrorism, and 5G Paradigm
Cybercrime, Digital Terrorism, and 5G Paradigm Open
In this digital era, fears about cybercrime and digital terrorism are rising. A coordinated effort will be required to keep ahead of the threat as the world grows more digitally connected. The threat posed by cybercrime and digital terrori…
View article: Diabetic Retinopathy Detection Using Deep Learning with Optimized Feature Selection
Diabetic Retinopathy Detection Using Deep Learning with Optimized Feature Selection Open
According to the International Diabetes Federation, there are 463 million diabetics worldwide.Due to alterations in lifestyle, the disease has had a significant negative influence on the quality of life for many people and is now seen as a…
View article: Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities Open
Smart home devices have brought in a disruptive, revolutionary Internet-based ecosystem that enhanced our daily lives but has pushed private data from inside our homes to external public sources. Threats and attacks mounted against IoT dep…
View article: Framework to perform taint analysis and security assessment of IoT devices in smart cities
Framework to perform taint analysis and security assessment of IoT devices in smart cities Open
The Internet of Things has a bootloader and applications responsible for initializing the device’s hardware and loading the operating system or firmware. Ensuring the security of the bootloader is crucial to protect against malicious firmw…
View article: Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures
Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures Open
In the arms race between attackers and defenders, the significance of proactive security measures was evident. The implementation of well-considered countermeasures, which may encompass stringent access controls, regular system updates, in…
View article: Forensic analysis and security assessment of IoT camera firmware for smart homes
Forensic analysis and security assessment of IoT camera firmware for smart homes Open
Ease of flexibility, convenience, and smartness have made the Internet of Things (IoT) the industry, and user favorite device has recently piqued the industry's interest. With the widespread use of this technology, an unprecedented number …
View article: Securing the Cloud: An In-depth Exploration of Conceptual Models, Emerging Trends, and Forward-looking Insights
Securing the Cloud: An In-depth Exploration of Conceptual Models, Emerging Trends, and Forward-looking Insights Open
The ascendancy of cloud computing, while praising scalability and flexibility, simultaneously unveils a convoluted security panorama. This review talks about the complicated ideas behind security models in cloud environments. It combines i…
View article: An Empirical Study on Cyber Crimes and Cybersecurity Awareness
An Empirical Study on Cyber Crimes and Cybersecurity Awareness Open
With the boom in the digital world today, cybercriminals have taken the Internet as their playground. The Internet's crimes have increased compared to previous years, and cybersecurity awareness must be paramount. This paper uses statistic…
View article: Integrated approach using deep neural network and CBR for detecting severity of coronary artery disease
Integrated approach using deep neural network and CBR for detecting severity of coronary artery disease Open
Despite major diagnostic progress and treatment progress, cardiovascular diseases (CVD) continue to be the world's leading cause of disease and mortality. Artificial intelligence methods provide the ability to drastically alter cardiology …
View article: ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware
ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware Open
The applications and services offered by the Internet of Things (IoT) have grown significantly during the past few years. Device makers and corporate suppliers have taken notice of this, which has led to a sudden inflow of new-age firms. C…
View article: A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses
A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses Open
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues. Nevertheless, the choice o…
View article: IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices
IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices Open
The Internet of Things (IoT) has redefined several aspects of our daily lives, including automation and control of the living environment, innovative healthcare services, and much more. Digital IoT devices and sensors, when integrated with…
View article: Comparison of IoT Communication Protocols Using Anomaly Detection with Security Assessments of Smart Devices
Comparison of IoT Communication Protocols Using Anomaly Detection with Security Assessments of Smart Devices Open
The authors implemented an attack scenario that involved simulating attacks to compromise node and sensor data. This research proposes a framework with algorithms that generates automated malicious commands which conform to device protocol…
View article: Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts
Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts Open
Microsoft’s file system, NTFS, is the most utilised file system by Windows OS versions XP, Vista, 7, and 10. These systems have a little-known file attribute feature known as alternate data streams (ADS) which allows each file in the NTFS …
View article: Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices
Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices Open
Businesses need to use sentiment analysis, powered by artificial intelligence and machine learning to forecast accurately whether or not consumers are satisfied with their offerings. This paper uses a deep learning model to analyze thousan…
View article: A Machine Learning-Based Framework for the Prediction of Cervical Cancer Risk in Women
A Machine Learning-Based Framework for the Prediction of Cervical Cancer Risk in Women Open
One of the most common types of cancer in women is cervical cancer, a disease which is the most prevalent in poor nations, with one woman dying from it every two minutes. It has a major impact on the cancer burden in all cultures and econo…