Prof. (Dr.) Himanshu Gupta

Professor

Amity Institute of Information Technology
 
  • Academic Area

    Computer Science and Applications

  • Teaching Interests

    My previous roles as a faculty, instructor, corporate trainer and mentor have been overwhelmingly positive. These multiple roles are coupled with my past academic and research experiences to frame up my teaching philosophy. In short, my teaching philosophy is to create a platform that promotes: 1) Continuous Learning 2) Enthusiasm 3) Interaction to the Real World 4) Organized Study 5) Accountability of Students and Teacher 6) Confidence Building I have great enthusiasm for science and technology and look forward to teaching both traditional and modern courses in the area of Network and Information Security. Knowing through experience the profound impact that one good faculty can have toward a student overall development, I will strive to incorporate my teaching beliefs, principles and interests into my overall teaching plan. I am committed to becoming the best faculty I can be.
  • Qualifications

    Graduation : B.SC. (Hons.)(Mathematics)-2001,Deptt. of Mathematics, Aligarh Muslim University

    Post Graduation : M.C.A.(Computer Science)-2005,Deptt. of Computer Science, Aligarh Muslim University

    Doctorate : Ph.D.(Computer Science)-2014,Deptt. of Computer Science, Gurukula Kangri University

  • Experience

    13 Nov 2007 - Present
    Professor,
    Amity Institute of Information Technology

    13 Nov 2007 - 23 Jan 2015
    FACULTY MEMBER,
    AMITY UNIVERSITY, NOIDA,
    AUUP, Noida

    27 Aug 2007 - 12 Nov 2007
    FACULTY MEMBER (SR. SCALE),
    INSTITUTE OF MANAGEMNT STUDIES (IMS), DEHRADUN,


    13 Jul 2005 - 24 Aug 2007
    FACULTY MEMBER,
    The ICFAI UNIVERSITY DEHRADUN,


    07 Jul 2005 - 12 Nov 2005
    LECTURER,
    GRAPHIC ERA UNIVERSITY, DEHRADUN,


  • Research Interests

    To implement the innovative ideas in form of patents in the area of Cyber and System Security, this will improve the performance of Security Applications as well as Security Services. To present Research Papers in various reputed International Conferences, Seminars and Workshops. To publish number of Research Papers and Articles in various reputed Conference Proceedings and Journals. To publish a Reference Book in the area of Network Security & Cryptography for Under Graduate and Post Graduate Students of Computer Science Courses. To provide consultancy as a Consultant for Govt. Sponsored Research Projects in the area of Network and Cyber Security.
  • Publications

    Cryptography: An Innovative Technique for Information Security ,
    Mac Millan

    Enterprise Resource Planning (ERP): A Technology of Effective Management ,
    ICFAI, Hyderabad

    Multiphase Encryption: A New Concept in Modern Cryptography ,
    IEEE

    Padding Oracle Attack: An Attack on Security of Web Applications ,
    ICOMAP, AUR, Jaipur

    SSA: A Cryptographic Algorithm for Integrity Scanning of Data Communication ,
    ICOMAP, AUR, Jaipur

    Enterprise Resource Planning (ERP): A Technology of Effective Management ,
    S a m b h a v a m

    Role of Multiple Encryption in Secure Electronic Transaction ,
    IJNSA, AIRCC, Australia

    Role of Speech Scrambling And Encryption in Secure Voice Communication ,
    Vayu Education of India

    Role of IT Applications in Banking Sector ,
    Vayu Education of India

    Information Security ,
    ASOEL

    Internet Censorship: Bane to Freedom ,
    JNU, Delhi

    Internet Censorship: Bane to Freedom ,
    JNU, Delhi

    Multiphase Encryption: A New Concept in Modern Cryptography ,
    International Journal of Computer Theory and Engineering (IJCTE) by IACSIT, Singapore

    Role of Multiple Encryption in Secure Voice Communication ,
    International Scientific Academy of Engineering and Technology (ISAET)

    Role of Multiple Encryption in Secure Voice Communication ,
    International Scientific Academy of Engineering and Technology (ISAET)

    Role of Multiple Encryption in E-Commerce ,
    Institute of Research and Journals

    Detection and Prevention of Network Security Threats in Mobile Phones ,
    IEEE International Conference on Reliability, Infocom Technologies and Optimization

    Timing Attack on RSA - A Survey ,
    IEEE International Conference on Reliability, Infocom Technologies and Optimization

    Protection against Penetration Attacks using Metasploit ,
    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2015)

    A Security Framework Against ARP Spoofing ,
    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2015)

    Signcryption: An Innovative Technique for the Enhancement of Data Security ,
    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2015)

    Security Issues in Virtualization Using VMware ,
    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2015)

    Network Communication Model for Steganography & Steganalysis ,
    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2015)

    Role of Multiple Encryption in E-Commerce ,
    International Journal of Advance Computational Engineering and Networking (IJACEN)

    Analysis of Elliptic Curve Cryptography ,
    in International Journal of Scientific and Engineering Research (IJSER)

    Recent Attacks on Elliptic Curve Cryptosystems (ECC) ,
    Indian Streams Research Journal (ISRJ)

    Implementation of Data Security using Biometric Encryption ,
    International Journal of Emerging Trends in Electrical and Electronics (IJETEE)

    Role of Biometric Security for the Enhancement of Data Security ,
    International Journal of Computers & Technology (IJCT)

    Anti-Phishing Techniques in Cryptography ,
    International Journal of Electrical and Computer Engineering ( IJECE)

    A New Approach for the Security of VPN ,
    ACM

    Automated Verification in Cryptography System ,
    ACM

    ID Based Encryption in Modern Cryptography ,
    ACM

    Agent based Security Model for Cloud Big Data ,
    ACM

    Role of Multiple Encryption in Biometric Devices ,
    Springer

    Application Based Intrusion Detection System ,
    SCOPUS

    A Hybrid Model on Cloud Security ,
    IEEE Xplore

    SQL Filtering: An Effective Technique to Prevent SQL Injection Attack ,
    IEEE Xplore

    A Model for Biometric Security using Visual Cryptography ,
    IEEE Xplore

    A Review of Security Issues in Mobile Banking Applications ,
    IEEE

    A Security Framework for IOT Devices Against Wireless Threats ,
    IEEE

    A Trust Model for Security and Privacy in Cloud Services ,
    IEEE

    USSD – Architecture analysis, Security threats, Issues and Enhancements ,
    IEEE

    A Cloud Security Model for IoT based E-commerce ,
    IJARCSSE

    Role and Applications of IoT in Online Transactions using Blockchain Technology ,
    IEEE

    A Security Model to Enhance Online Transactions using Blockchain Technology ,
    IEEE

    Regulatory Framework for Standardization of Online Transactions Using Cryptocurrencies ,
    Springer

    An Innovative Model for the Enhancement of IoT Device Using Lightweight Cryptography ,
    IEEE

    A Security Model for the Enhancement of Data Privacy in Cloud Computing ,
    IEEE

    A Conceptual Framework for Improving the Software Security of Self-Driven Vehicles ,
    IEEE

    Enhancement of Reading Visibility using LED Embedded Whiteboards ,
    IEEE

    UPI Based Mobile Banking Applications – Security Analysis and Enhancements ,
    IEEE

    A Proposed Framework for Controlling Cyber- Crime ,
    IEEE

    A Multi-Layer Feed Forward Network Intrusion Detection System using Individual Component Optimization Methodology for Cloud Computing ,
    Scopus

    Feature Selection Methods for Intrusion Detection Systems: A Performance Comparison ,
    Scopus

    Multiple Factor Authentication as a Security Measure in Credit Card Fraud ,
    Scopus

    Analysis of General Data Protection Regulation Compliance Requirements and Mobile Banking Application Security Challenges ,
    Scopus

  • Projects

    Designing Some Multiple & Multi-phase Encryption Techniques for the Enhancement of Data Security(Gurukula Kangri University, Haridwar)
    Multi-phase encryption aims to provide a truly improved and very robust security platform for strong protection against the security threats, required in today’s defense strategies.by (AIIT)

  • Consultancies

    Axis Bang Young Managers Training Programme(Axis Bank)
    P G Diploma in Banking Managementby (Axis Bank)

  • Affiliations

    Computer Society of India Since 01 Sep 2005

    CSTA, USA Since 01 Sep 2005

    International Association of Computer Science and Information Technology (IACSIT), Singapore Since 26 Oct 2010

    IEEE Computer Society, California (USA) Since 01 Aug 2008

    Universal Association of Computer & Electronics Engineers Since 27 Jun 2013

    World Association of Young Scientists, UNESCO, Paris Since 28 Mar 2010

    Cryptology Research Society of India Since 29 Oct 2012

    International Association of Engineers (IAENG), Hong Kong Since 31 Oct 2016

    Institute of Electrical and Electronics Engineers (IEEE), USA Since 21 Jul 2016

  • Activities

    Presented Research Paper in IEEE International Conference on Intelligent Network Computing (ICINC 2010) organized by International Association of Computer Science & Information Technology (IACSIT) at Kuala Lumpur, Malaysia on 26-28 November, 2010.

    Academic Visit to Nayang Academy of Information Technology, Nayang Technological University, Singapore on 29th November, 2010.

    Academic Visit to participate and deliver Technical Sessions on “Green Information Technology” in Energy Efficiency Summit 2011 on 12-13 July, 2011 at Bangkok (Thailand).

    Academic Visit to Srinakharinwirot University, Bangkok (Thailand) on 13th July, 2011.

    Academic Visit to deliver Guest Lecture/Technical Sessions on “Network Security & Cryptography” in International Lecture Series 2012 on 3rd August, 2012 at Panha Chiet University, Phnom Penh, Cambodia.

    Academic visit to deliver Invited Talk on “Role of Multiple Encryption in Secure Voice Communication” in the International Conference of Cryptography and Network Security (ICCNS-2013) organized by International Scientific Academy of Engineering and Technology in Pattaya, Thailand on 23-24 April, 2013.

    Academic Visit to deliver Technical Sessions as an Invited Speaker on “Role and Applications of Information Security” in International Lecture Series-2013 on 25th April, 2013 at National University of Information Technology, Ho Chi Minh, Vietnam.

    Academic Visit to deliver Technical Sessions as an Invited Speaker on “Role of Information Security in Information Technology” in International Seminar at Udayana University, Bali, Indonesia on 2nd August, 2013.

    Academic Visit as a Visiting Professor to deliver Technical Session on “Emerging Trends in Cyber Crime and Cyber Security" in the International Seminar organized by Hong Kong University of Science and Technology in Hong Kong on 4th August, 2017.

    Academic Visit as a Visiting Professor to deliver Technical Session on "Role of Cyber Security against Cyber Crimes in Modern Era" in the International Seminar cum Workshop organized by University of Macau in Macau on 5th August, 2017.

    Academic Visit as a Visiting Professor to deliver Technical Session on "Emerging Trends and Applications in Cyber Security" in the International Seminar organized by Bangkok University, Bangkok on 31st January, 2018.

    Academic & Research Visit as a Session Chair for chairing aTechnical Session on "Cyber & Information Security" in the IEEE International Conference "AICAI-2019" organized by Amity University, Dubai on 4th February, 2019.

    Shortlisted for Honorary Award from India and Appointed as Visiting Professor in American Heritage College (A Center of Academic Excellence) in California, United States of America (USA) appointed by Mr. Abdi Lajevardi, Chancellor-American Heritage College, USA

    Appointed as Official Reviewer & Evaluater for the UGC Research Grant Proposals by the University Grant Commission (UGC), Govt. of India for the Year 2022-23

  • Patents

    A Technique & Device for Multiphase Encryption ,Delhi,India - Complete ( 1318/DEL/2009 A )

    An Improved Method and System for Enhancing Security Using Hybrid Key Encryption Algorithm ,Delhi,India - Complete ( 2548/DEL/2014 )

    An Advanced Model for Secure Electronic Transaction ,Delhi,India - Complete ( 201711000187 )

  • Conferences attended

    Faculty Development Workshop
    Organized By :ICFAI, Hyderabad

    International Conference ELCOMP 06
    Organized By :Govt. of India

    Global Conference on India R & D 2006 “Mind to Market”
    Organized By :Govt. of India

    Faculty Development Program
    Organized By :Amity University, Noida

    Building Skill Capacity with CISCO Curricula
    Organized By :AIIT

    Entrepreneurship, Innovation & Incubation
    Organized By :IIIT, Allahabad

    Next Generation Wireless Networks
    Organized By :IIIT, Allahabad

    CA Spectrum: A Network Management Tool
    Organized By :Computer Associates, US

    International Conference on Management Sciences & Arts
    Organized By :Gurukula Kangri University, Haridwar

    Advance Developer Technologies
    Organized By :Microsoft Corporation

    Statistical Analysis Software (SAS)
    Organized By :AUUP, Noida

    Campus Connect” Infosys Industry-Academia Partnership Program
    Organized By :Infosys Technologies Limited

    CISCO EDUCATION DAY MEET 2010
    Organized By :CISCO

    VLSI, MEMS and NEMS” (VMN’2010)
    Organized By :ASET

    International Conference on Intelligent Network Computing
    Organized By :IACSIT, Singapore

    International Conference on Management Perspective
    Organized By :AUR, Jaipur

    Cyber Threat:Challenges & Issues
    Organized By :ITS, G. Noida

    World Energy Efficiency Summit
    Organized By :Govt. of Thailand

    International Conference on Computational Electronics And Technology
    Organized By :Amity University, Rajasthan

    CompTIA Trainer Workshop
    Organized By :CompTIA Inc. (USA)

    International Lecture Series 2012
    Organized By :Panha Chiet University, Phnom Penh, Cambodia

    International Conference on Reliability, Infocom Technology and Optimization (ICRITO 2013)
    Organized By :AIIT

    International Conference on Cryptography and Network Security (ICCNS – 2013)
    Organized By :International Scientific Academy of Engineering and Technology (ISAET)

    International Lecture Series-2013
    Organized By :National University of Information Technology, Ho Chi Minh, Vietnam

    Role of Information Security in Information Technology
    Organized By :Udayana University, Bali, Indonesia

    CIO IT Summit & Training Program
    Organized By :IT Next and 9.9 Media

    International Corporate Meet "TieCon-2013"
    Organized By :The Indus Entrepreneurs

    Engineering & Science Innovation Summit
    Organized By :National Instruments India

    CIO IT Workshop “My Next Cloud Project”
    Organized By :IT Next and 9.9 Media

    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2013)
    Organized By :Amity University, Noida

    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2014)
    Organized By :Amity University, Noida

    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2014)
    Organized By :Amity University, Noida

    International Conference of Cryptography and Network Security (ICCNS-2013)
    Organized By :International Scientific Academy of Engineering and Technology

    IEEE International Conference on Research in Computational Intelligence and Communication Networks
    Organized By :IEEE Young Professionals Affinity Group, Kolkata Section, India and RCC Institute of Information Technology, Kolkata

    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2015)
    Organized By :Amity University, Noida

    50th Golden Jublee CSI Annual Convention -2015
    Organized By :Computer Society of India (CSI)

    ACM Second International Conference ICTCS-2016
    Organized By :ACM & CSI Udaipur Chapter

    IEEE International Conference on Telecommunication and Network (TELNET’2017)
    Organized By :AITEM

    IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2017)
    Organized By :AIIT

    Global Conference on Cyber Space (GCCS)
    Organized By :Govt. of India

    IEEE International Conference on Machine Learning and Data Science (ICMLDS-2017)
    Organized By :Bennett University

    2nd IoT India 2018 expo& Conference
    Organized By :NASSCOM, Govt. of India

    AITF Expert Session on Next Generation Challenges
    Organized By :Amity University

    CSI Golden Jubilee Summit
    Organized By :CSI

    National Instructional Workshop in Cryptology 2015
    Organized By :CRSI

    Faculty Development Workshop on “Awareness of Intellectual Property Rights”
    Organized By :AIIT

    in International Conference on Cyberlaw, Cybercrime & Cybersecurity (ICCC’2015)
    Organized By :Cyberlaws.Net

    Short Term Course on Open Source Technologies through ICT
    Organized By :NITTR, Chandigarh

    AWSome Day Workshop (AWS-2016)
    Organized By :Amazon

    CSO Conference on Cybersecurity Roadmap
    Organized By :9.9 Media

    International Geospatial Consortium-2016
    Organized By :The University of Iowa, USA

    Guest Lecture titled as “Emerging Challenges in Cyber Security”
    Organized By :AIIT

    National Workshop on STC (ICT Based)
    Organized By :NITTR, Chandigarh

    Short Term Course on “Recent Trends in Network Security (NetSec-2016)
    Organized By :IIT-Roorkee

    Guest Lecture titled as "Managing Cyber Security Risk in a Regulated Environment"
    Organized By :AIIT

    ASSOCHAM Security Workshop titled as “Securing a Cashless Economy”
    Organized By :ASSOCHAM India

    Cyber Security Summit & Hacker Cup - 2017
    Organized By :Amity University

    Regional Cyber Security Summit
    Organized By :Dynamic CISO Forum

    National Instructional Workshop in Cryptology 2017
    Organized By :CRSI

  • Scholary Activities

    International Lecture Series-2013
    Organized By :National University of Information Technology, Ho Chi Minh, Vietnam

    CIO IT Summit & Training Program
    Organized By :IT Next and 9.9 Media

    International Corporate Meet "TieCon-2013"
    Organized By :The Indus Entrepreneurs

    Engineering & Science Innovation Summit
    Organized By :National Instruments India

    AITF Expert Session on Next Generation Challenges
    Organized By :Amity University

    CSI Golden Jubilee Summit
    Organized By :CSI

    Short Term Course on Open Source Technologies through ICT
    Organized By :NITTR, Chandigarh

    International Geospatial Consortium-2016
    Organized By :The University of Iowa, USA

    Guest Lecture titled as “Emerging Challenges in Cyber Security”
    Organized By :AIIT

    Short Term Course on “Recent Trends in Network Security (NetSec-2016)
    Organized By :IIT-Roorkee

    Guest Lecture titled as "Managing Cyber Security Risk in a Regulated Environment"
    Organized By :AIIT

    Cyber Security Summit & Hacker Cup - 2017
    Organized By :Amity University

    Regional Cyber Security Summit
    Organized By :Dynamic CISO Forum

  • Short Description

    Dr. Himanshu Gupta is working as a Senior Faculty Member in the well reputed Indian university Amity University Uttar Pradesh, Noida. He completed all his academic as well as professional education from reputed central university Aligarh Muslim University, Aligarh (Uttar Pradesh) India. He has visited Malaysia, Singapore, Thailand, Cambodia, Vietnam and Indonesia for his academic and research work. He has delivered many Technical Sessions on “Network Security & Cryptography” in the field of Information Technology in various reputed International Conferences, World Summit and other foreign universities as an Invited Speaker. He has many Research Papers and Articles in the field of Information Technology, which have been published in various reputed Conference Proceedings and Journals. He has first successfully completed Patent in Network Security as an Inventor, which has been published in the International Journal of Patents by Patent Department, Govt. of India in month of De