Department of Faculty

Akashdeep Bharadwaj

Dr. Akashdeep Bhardwaj

Senior Associate Professor  

Systemics Cluster

Post Doctoral: Project #IFP-2020-21 titled ‘Smart Water Treatment to utilize Sea Water’ under Dr. Mohammed Alshehri, sponsored by Deputyship for Research & Innovation, Ministry of Education, Saudi Arabia.

Ph.D. (Computer Science Engineering), from University of Petroleum & Energy Studies, Dehradun.

M.B.A (Management) from All India Management Association (AIMA-CME), New Delhi.

B. E. (Computer Science from Pune University, Pune.

Career Graph:

  • Senior Associate Professor (Cybersecurity) at UPES, Dehradun, India from January 2019 till date
  • Global Advisory Board Member - CHFI at EC-Council CHFI, USA since January 2019 till date
  • Subject Matter Expert (Security+) at CompTIA, Chicago, USA since July 2019 till date
  • Head of Cyber Security Operations (India) at British Telecom, Gurgaon.
  • Senior Manager – IT ERR/ETG at Fiserv India, Noida.
  • Manager – Internet Operations at Cvent India, Gurgaon.
  • Manager IT Infrastructure Operations at Motricity India, Gurgaon.
  • Manager – IT Asia Pacific at SafeNet (Gemalto), Noida.
  • Senior Associate – IT at Evalueserve, Gurgaon.
  • Network Administrator at Optech Solutions, New Delhi.
  • Senior Engineer – Technical Support Unicorp, New Delhi.

Research Interest:

  • LinkedIn: https://www.linkedin.com/in/akashbhardwaj/
  • ResearchGate: h-index 12, Citations 483.
    Link: https://www.researchgate.net/profile/Akashdeep-Bhardwaj
  • Google Scholar: h-index 14, i10-index 22 Citations 724.
    Link: https://scholar.google.com/citations?user=2oiVJ7gAAAAJ&hl=en&authuser=1

Recent Publications:

Publications

Publication Type Published
Patents & Copyrights 4
SCI-indexed papers 20
ESCI/Scopus papers 37
Authored Books 3
Edited Books 3
Book Chapters 26
Non-Scopus 15

PATENT & COPYRIGHT

  • India Patent #393525, “Safety and Health Monitoring System for use with a footwear” granted on 30th March 2022 by Patent Office, Government of India, India.
  • India Copyright #8160/2022-CO/L, “Forensic Analysis of Cyber-Attacks on Smart IoT Devices”, granted on 18th April 2022 by Copyrights Office, Government of India.
  • India Copyright #8162/2022-CO/L, “Security Assessment of IoT- based Cameras Firmware for Smart Homes”, granted on 18th April 2022 by Copyrights Office, Government of India.
  • India Copyright #12471/2022-CO/L, “Unique Taxonomy & Measures to overcome Fog Computing Challenges”, granted on 2nd November 2022 by Copyrights Office, Government of India.

RESEARCH PUBLICATIONS (SCI-indexed)

  • Bhardwaj, A., Al-Turjman, F., Kumar, M., Stephan, T., Mostarda, L. Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems. IEEE Access, vol. 8, pp. 104956-104966, 2020, doi: 10.1109/ACCESS.2020.2998983. Impact Factor: 3.745.
  • Bhardwaj, A., Shah, S., Shankar, Kumar, M. Penetration testing framework for Smart Contract Blockchain. Peer-to-Peer Networking & Applications. 14, 2635–2650, 2021, doi: 10.1007/s12083-020-00991-6. Impact Factor: 4.488.
  • Alshehri, M., Bhardwaj, A., Kumar, M., Mishra, S., Gyani, J. Cloud and IoT based smart architecture for desalination water treatment. Environmental Research, vol 195, 2021, 110812, doi: 10.1016/j.envres.2021.110812. Impact Factor: 6.498.
  • Alshehri, M., Kumar, M., Bhardwaj, A., Mishra, S. Deep Learning Based Approach to Classify Saline Particles in Sea Water. MDPI Water 2021, vol 13, 1251. doi: 10.3390/w13091251. Impact Factor: 3.530.
  • Bhardwaj, A., Alshehri, M., Kumar, M., Abugabah, A. Real-time privacy preserving framework for covid-19 contact tracing. Computers, Materials & Continua, vol. 70(1), pp. 1017–1032, 2022.  Impact Factor: 1.278.
  • Bhardwaj, A., Kumar, M., Stephan, T., Shankar, A., Ghalib, M. R., Abujar, S. IAF: IoT Attack Framework and Unique Taxonomy. Journal of Circuits, Systems and Computers, vol 31(2), doi: 10.1142/s0218126622500293. Impact Factor: 1.278.
  • Bhardwaj, A., Al-Turjman, F., Sapra, V., Kumar, M., Stephan, T. Privacy-aware detection framework to mitigate new-age phishing attacks. Computers & Electrical Engineering, vol 96(A), 2021, 107546, doi: 10.1016/j.compeleceng.2021.107546. Impact Factor: 4.152.
  • Bhardwaj, A., Kumar, M., Alshehri, M., Keshta, I., Abugabah A., Sharma S. Smart water management framework for irrigation in agriculture. Environmental Technology, 2022. Impact Factor: 3.427.
  • Bhardwaj, A., Dagar, V., Khan, M.O.Smart IoT and Machine Learning-based Framework for Water Quality Assessment and Device Component Monitoring. Environmental Science and Pollution Research, 2022, doi: 10.1007/s11356-022-19014-3. Impact Factor: 3.056.
  • Bhardwaj, A., Alshehri, M., Kaushik, K., Alyamani, H., Kumar, M. Secure framework against cyberattacks on cyber-physical robotic systems. Journal of Electronic Imaging, vol 31(6), 2022. Impact Factor: 0.945.
  • Kaushik, K., Bhardwaj, A., Dwivedi, A., Singh, R. Machine Learning-based Regression Framework to predict Health Insurance Premiums. MDPI International Journal of Environmental Research & Public Health, 2022, 19(13), doi: 10.3390/ijerph19137898. Impact Factor: 3.39.
  • Kaushik S, Bhardwaj A, Alomari A, Bharany S, Alsirhani A, Mujib Alshahrani M. Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm. Computers. 2022; 11(10):142. Doi: https://doi.org/10.3390/computers11100142. Impact factor: 3.7.
  • Kaushik, K.; Bhardwaj, A.; Bharany, S.; Alsharabi, N.; Rehman, A.U.; Eldin, E.T.; Ghamry, N.A. A Machine Learning-Based Framework for the Prediction of Cervical Cancer Risk in Women. Sustainability 2022, 14, 11947. doi: https://doi.org/10.3390/su141911947. Impact factor: 3.889.
  • Bhardwaj, A.; Kaushik, K.; Alomari, A.; Alsirhani, A.; Alshahrani, M.; Bharany, S. BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries. Electronics 2022, 11(19), 2992. doi: https://doi.org/10.3390/electronics11192992. Impact factor: 2.690.
  • Bhardwaj, A., Kaushik, K. Investigate Financial Crime Patterns using Graph Databases. IEEE Professional. Impact Factor: 2.626.
  • Kaushik, K.; Bhardwaj, A.; Dahiya, S.; Maashi, M.S.; Al Moteri, M.; Aljebreen, M.; Bharany, S. Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices. Sensors 2022, 22, 7318. https://doi.org/10.3390/s22197318. Impact Factor: 3.8.47.
  • Bhardwaj, A.; Kaushik, K.; Maashi, M.S.; Aljebreen, M.; Bharany, S. Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts. Sustainability 2022, 14, 12288. https://doi.org/10.3390/su141912288. Impact Factor: 3.889
  • Bhardwaj, A.; Kaushik, K.; Bharany, S.; Elnaggar, M.F.; Mossad, M.I.; Kamel, S. Comparison of IoT Communication Protocols Using Anomaly Detection with Security Assessments of Smart Devices. Processes 2022, 10, 1952. https://doi.org/10.3390/pr10101952. Impact Factor: 3.352.
  • Kaushik, K., Bhardwaj, A., Kumar, M., Gupta, S., Gupta, A. A novel machine learning‐based framework for detecting fake Instagram profiles. Concurrency and Computation: Practice and Experience, 2022, doi: 10.1002/cpe.7349. Impact Factor: 1.831.
  • Bhardwaj, A.; Kaushik, K.; Bharany, S.; Rehman, A.U.; Hu, Y.-C.; Eldin, E.T.; Ghamry, N.A. IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices. Sustainability 2022, 14, 14645. Impact Factor: 3.889

RESEARCH PUBLICATIONS (ESCI/WoS/Scopus indexed)

  • Bhardwaj, A., Avasthi, V., Sastry, H., Subrahmanyam, G.V.B. Ransomware Digital Extortion - A Rising New Age Threat. (April 2016). Indian Journal of Science and Technology (INDJST), 9(14).
  • Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H. Design a resilient Network Infrastructure Security Policy Framework. (May 2016). Indian Journal of Science and Technology (INDJST), 9(19).
  • Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H. Security Algorithms for Cloud Computing. (May 2016). Elsevier Procedia Science Direct, 85(2016), 535-542.
  • Bhardwaj, A., Goundar, S. Designing a Framework for Cloud Service Agreement for Cloud Environments. International Journal of Cloud Applications and Computing, 6(4), pp.83-96, 2016.
  • Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H. Solutions for DDoS Attacks on Clouds. (July 2016). IEEE International Conference, 978(1), 4673-8203-8/16.
  • Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H. Three Tier Network Architecture to Mitigate DDoS Attacks on Hybrid Clouds. (September 2016). ACM Digital Library.
  • Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H. Review of Solutions for Securing End User Data over Cloud Applications. (October 2016). International Journal of Advanced Computer Research (IJACR), 6(27).
  • Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H., Goundar, S. DDoS Attacks, New DDoS Taxonomy and Mitigation Solutions – A Survey. (October 2016). IEEE Xplore Digital Library, 78-1-5090-4620-1/16.
  • Bhardwaj, A., Goundar, S. Designing a Framework for Cloud Service Agreement for Cloud Environments. (December 2016). International Journal of Cloud Applications and Computing (IJCAC), 6(4)
  • Bhardwaj, A., Goundar, S. Comparing Traditional Security Solutions with secure Data Centre Architecture to mitigate DDoS. (Sept 2017). International Journal of Cloud Applications and Computing (IJCAC), 7(3), 3.
  • Bhardwaj, A., Goundar, S. Security Challenges for Cloud based Email Infrastructure. (November 2017). Elsevier Network Security Journal (NSW), 2017 (11), 8-15. Scopus indexed.
  • Bhardwaj, A., Goundar, S. Reducing the threat surface to minimize the impact of Cyber-attacks.(April 2018). Elsevier Network Security Journal (NSW), 2018 (4), 15-19.
  • Goundar, S., Bhardwaj, A., Efficient Fault Tolerance on Cloud Environments. International Journal of Cloud Applications and Computing, 8(3), pp.20-31, 2018.
  • Bhardwaj, A., Goundar, S. Unique Taxonomy for Evaluating Fog Computing Services. International Journal of e-Business Research, vol.14 (4), 2018, pp.78-90. http://doi.org/10.4018/IJEBR.2018100105
  • Bhardwaj, A., Goundar, S. Algorithm for Secure Hybrid Cloud Design against DDoS attacks. (July 2018). International Journal of Information Technology & Web Engineering (IJITWE), 13(4), 4.
  • Bhardwaj, A., Goundar, S. Framework to define relationship between Cyber Security and Cloud Performance. (February 2019). Elsevier Computer Fraud and Security (CFS), 2019 (2), 12-19.
  • Bhardwaj, A., Goundar, S IoT based Smart Fog Computing for Vehicular Control. (December 2019). EAI Endorsed Transactions on Internet of Things (IoT), 19.
  • Bhardwaj, A., Goundar, S. Framework for Effective Threat Hunting. (June 2019). Elsevier Network Security Journal (NSW), 2019 (6), 15-19.
  • Bhardwaj, A., Avasthi, V., Goundar, S. Cybersecurity Attacks on Robotic Platforms. (October 2019). Elsevier Network Security Journal (NSW), 2019 (10), 13-19.
  • Bhardwaj, A., Goundar, S. Keylogger: Silent Cybersecurity Weapons. (February 2020). Elsevier Network Security Journal (NSW), 20202(2).
  • Bhardwaj, A., Kaushik, S., Compressing Effort & Schedule in ERP Implementations with Iterative Methodologies.(March 2020). International Journal of Innovative Technology and Exploring Engineering, 9(5).
  • Goundar, S., Prakash, S., Sandal, P., Bhardwaj, A. Health Insurance Claim Prediction Using Artificial Neural Networks. International Journal of System Dynamics Applications (IJSDA), 9(3), 2020.
  • Bhardwaj, A., Sapra, V., Kumar, A., Kumar N., Arathi., S. Why is Phishing still successful? (September 2020). Elsevier Computer Fraud and Security, 2020(9).
  • Kaushik, S., Bhardwaj, A., Sapra, L. Predicting Annual Rainfall for the Indian State of Punjab Using Machine Learning Techniques. (March 2021). IEEE Conference on Advances in Computing, Communication Control & Networking.
  • Bhardwaj, A., Bhushan, B. Model to enhance security posture of IoT Devices and Components using Private APN. (April 2021). International Journal of Intelligent Systems Technologies & Applications, 20(10).
  • Goundar, S., Bhardwaj, A., Chand, C. Task Offloading Concepts using Cloud Simulations in Mobile Computing. (May 2021). International Journal of Systems, Control and Communications.
  • Goundar, S., Bhardwaj, A. Property Valuation Using Linear Regression and Random Forest Algorithm. International Journal of System Dynamics Applications, 10(5), 13, 2021.
  • Bhardwaj, A., Kaushik, K. Predictive Analytics based Cybersecurity Framework for Cloud Infrastructure. (February 2022). International Journal of Cloud Applications & Computing (IJCAC), 12(1).
  • Kaushik, S., Bhardwaj, A. Designing Intelligent Intrusion Detection System for Industry 4.0 using Feature Learning techniques. (February 2022). Elsevier SSRN.
  • Kaushik, S., Bhardwaj, A. Enhancing Accuracy of Industrial IIDS using Robust Machine Learning Techniques. (February 2022). Elsevier International Conference on Innovative Computing & Communication (ICICC).
  • Kaushik, K, Bhardwaj, A. Unique Zero-width Text Steganography approach in Cybercrime Attacks. (December 2021). Elsevier Computer Fraud and Security, 2021(12).
  • Goundar, S., Bhardwaj, A. Use of Artificial Neural Network for Forecasting Health Insurance Entitlements. (April 2022). Journal of Information Technology Research (JITR), 15(1).
  • Kaushik, S. and Bhardwaj, A. Enhancing Accuracy of Industrial IIDS using Robust Machine Learning Techniques. SSRN.
  • Goundar, S., Bhardwaj, A. Internet of Things, and Its Significance on Smart Homes/Cities. Journal of Information Technology Research (JITR), vol (15), 1.
  • Goundar, S., Bhardwaj, A. Determinants of Mobile Cloud Computing Adoption by Financial Services Firms. Journal of Information Technology Research (JITR), vol (15), 1.
  • Kaushik, S., Bhardwaj, A. Assessing Deep and Ensembled Shallow Techniques. Elsevier SSRN, 2022.
  • Gounder, S., Bhardwaj, A., Bandhana, D., Prasad, M., Chand, K. Internet of Things and Its Significance on Smart Homes/Cities. Journal of Information Technology Research (JITR), vol 15(1).

AUTHORED BOOKS

  • DDoS Attack Mitigation Architecture. (May 2020). Lambert Academic Publications, USA, IBSN: 978-620-2-55517-3.
  • CompTIA CASP+ CAS-004 Exam Guide. (June 2022). BPB Publications, ISBN: 9789355512697 SKU: 9789355512703
  • Zero to Advanced: Practical Digital Forensic Investigations. BPB Publications. (Pre-print stage).

EDITED BOOKS

  • Security Incidents & Response against Cyber Attacks. (July 2021). Springer Publications. ISBN: 978-3-030-69174-5.
  • Advanced Smart Computing Technologies in Cybersecurity and Forensics. (December 2021). CRC Press. ISBN 9780367686505.
  • Evolving Role of AI and IoMT in the Healthcare Market. (December 2021). Springer Publications. ISBN: 978-3-030-82079-4

BOOK CHAPTERS

  • Ransomware: A Rising Threat of New Age Digital Extortion. (February 2016). Online Banking Security Measures and Data Protection. Scopus Indexed.
  • Solutions for Securing End User Data over the Cloud Deployed Applications. (March 2016). Cybersecurity Breaches and Issues Surrounding Online Threat Protection. Scopus Indexed.
  • Unique Fog Computing Taxonomy for evaluating Cloud Services. (October 2019). Advancing Consumer-Centric Fog Computing Architectures.
  • Analyzing Ethical Issues of a Patient Information Systems Using the PAPA Model. (February 2020). Impact of Digital Transformation on Security Policies and Standards.
  • Digital Transformation of Diplomacy: The Way Forward for Small Island States. (March 2020). Impact of Digital Transformation on Security Policies and Standards.
  • Network Security Evaluation & Threat Assessments in Enterprise Systems. (April 2020). Impact of Digital Transformation on Security Policies and Standards.
  • Attack Vectors for Smart Contract based Blockchain Technologies. (April 2020). World Scientific Publishing, Blockchain Technologies, Applications & Cryptocurrencies. Scopus indexed.
  • Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks.(July 2020). Research Anthology on Combating Denial-of-Service Attacks.
  • Cloud Computing Security Services to Mitigate DDoS Attacks. (July 2020). InTech Open Publications. Cloud Computing Security - Concepts and Practice.
  • A Taxonomy of Blockchain Applications. (September 2020). World Scientific Publication. Blockchain Technologies, Applications and Cryptocurrencies.
  • Attack Vectors for Blockchain & OWASP Vulnerabilities to Smart Contracts. (September 2020). World Scientific Publication. Blockchain Technologies, Applications and Cryptocurrencies.
  • Industrial Internet of Things: Benefit, Applications, and Challenges. (January 2021). Innovations in the Industrial Internet of Things (IIoT) and Smart Factory.
  • Analyzing Human Resource Information System in Organizations. (February 2021). Enterprise Systems and Technological Convergence – Research & Practice, Information Age Publishing.
  • Big Data and Big Data Analytics: A Review of Tools and its Application. (March 2021). Applications of Big Data in Large- and Small-Scale Systems, IGI Global.
  • Big Data Analytics in Healthcare: A Developing Country Survey. (March 2021). Applications of Big Data in Large- and Small-Scale Systems, IGI Global.
  • Unique Taxonomy for Evaluating Fog Computing Services. (March 2021). Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing. IGI Global.
  • Efficient Fault Tolerance on Cloud Environments. (March 2021). Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, IGI Global.
  • Unique Fog Computing Taxonomy for Evaluating Cloud Services. (March 2021). Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing. IGI Global.
  • Novel taxonomy to select fog products & challenges faced in fog environments. (March 2021). Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing.
  • Infrastructure Design to Secure Cloud Environments against DDoS-Based Attacks. (July 2021). Springer Innovations in Communications and Computing
  • Cybersecurity Incident Response against Advanced Persistent Threats (APTs). (August 2021). Springer Innovations in Communications and Computing.
  • Network Intrusion Detection System using Naïve Bayes Classification Technique for Anomaly Detection. (December 2021). Taylor and Francis, CRC Publication.
  • Data Security Analysis in Mobile Cloud Computing for Cyber Security. (December 2021). Taylor and Francis, CRC Publication.
  • Health Insurance Claim Prediction Using Artificial Neural Networks. (January 2022). Research Anthology on Artificial Neural Network Applications, IGI-Global.
  • Taxonomy of Security Attacks on Internet of Things. (August 2022). Security & Privacy in Cyber Space, Springer.
  • Designing Intelligent Intrusion Detection System for Industry 4.0 Using Feature Learning Techniques. (October 2022). Springer Lecture Notes.

RESEARCH PUBLICATIONS (Non-Scopus)

  • Impact of Social Networking on Indian Youth – A Survey. (September 2017). International Journal of Electronics and Information Engineering ((IJEIE), 7(1), 41-51. EBSCO indexed.
  • Novel Taxonomy to Select Fog Products and Challenges faced in Fog Environments. (February 2018). International Journal of Fog Computing (IJFC), 1(1), 3, 35-49.  
  • Comparing Sequential and Simultaneous Menus for e-commerce Web Portals. (November 2018). International Journal of Computer Science and Engineering (IJCSE), 7(5). UGC indexed.
  • Student’s Perspective of eLearning and the Future of Education with MOOCs. (October 2018). International Journal of Computer Science and Engineering (IJCSE), 7(5). UGC indexed.
  • Hacking Career Jumpstart: OWASP Mobile Top10. (March 2021). Hakin9 IT Security Magazine, 16(3), pp 194-208.
  • Android Hacking: DIVA (Damm Insecure & Vulnerable Application). (April 2021). Hakin9 IT Security Magazine, 16(4), pp 68-90.
  • SOCMint for Hackers: Majestic Meterpreter. (May 2021). Hakin9 IT Security Magazine, 16(5) pp 106-114.
  • Ransomware & Vulnerability Management: Cracking WPA2 Wireless Passwords - the new HXA way. (June 2021). Hakin9 IT Security Magazine, 16(6), pp 124-132
  • Burp Suite for Hackers; Juice Shop OWASP Penetration Testing. (July 2021).Hakin9 IT Security Magazine, 16(7) pp 97-122
  • Burp Suite for Hackers: Forensic Investigations of Recycle Bin. (July 2021).Hakin9 IT Security Magazine, 16(7), pp 146-157.
  • Best Hacking Techniques: Grab Wifi Password without actually cracking it. (August 2021).Hakin9 IT Security Magazine, 16(8), pp 91-100.
  • Best Hacking Techniques: Hunt Social Media Account by Username. (August 2021).Hakin9 IT Security Magazine, 16(8), pp 117-126.
  • IoT & Raspberry Pi Hackers Toolkit: Crack Password Protected Microsoft Office Documents. (September 2021). Hakin9 IT Security Magazine, 16(9), pp 102-106
  • Investigate Financial Fraud Crimes: Wifi Hacking Rogue Access Points. (October 2021).Hakin9 IT Security Magazine, 17(11), pp 136-144.
  • Evading Firewalls & Enumerate SNMP using Advanced NMAP Techniques: Wifi Hacking Rogue Access Points. (October 2021). Hakin9 IT Security Magazine, 17(11), pp 86-94.