Sunita Vikrant Dhavale

Sunita Vikrant Dhavale, presently associated with Defence Institute of Advanced Technology (DIAT), an autonomous institute under Ministry of Defence, Pune, as an Assistant Professor in Department of Computer Engineering. She received her M.E. (Computer Science and Engineering) from the Pune University in 2009 and PhD (Computer Science and Engineering) from DIAT University in 2015. She is EC-Council’s Certified Ethical Hacker (C|EH-v9), 2017. She is recipient of IETE M. N. Saha Memorial Award for her paper published in IETE Journal of Research and Outstanding Woman Achiever Award from Venus International Foundation. She is an author for the book titled Advanced Image-Based Spam Detection and Filtering Techniques, published by IGI Global in 2017. She was selected as one of the top performers in four weeks AICTE approved Faculty Development Program on ICT tools by IIT, Bombay in September 2016. She has more than 25 publications in international journals, international conference proceedings, and book chapter. Her research areas are cyber security, steganography, malware analysis, and multimedia forensics. She organized first uniquely aimed National Conference on Electronics and Computer Engineering (NCECE - 2016) with the theme: Defence Applications in DIAT from 21st-22nd Jan 2016. She worked as a project manager for campus-wide wi-fi project implementation for higher research and education in DIAT in 2012. She emphasized on active learning strategy like think-pair-share and flipped classroom approach in her classroom by creating open educational resources for her teaching subjects. She arranged several seminars, workshops, hands-on, presentation, debates, quizzes for providing the additional resources to MTech students and course improvement. She is member of many professional bodies including IEEE, ACM, ISTE, IETE, IAENG, and ISACA.

Publications

Why One Should Learn Ethical Hacking
Sunita Vikrant Dhavale. © 2022. 42 pages.
This chapter presents the importance of learning hacking techniques by each and every person dealing with cyber operations. The chapter explains various basic terminologies used...
AI-Driven COVID-19 Patient Screening With Design Thinking Approach- C3IA Tool: A Case Study
Sunita Vikrant Dhavale. © 2022. 11 pages.
In this chapter, the authors discuss a brief literature review on AI-driven COVID-19 patient screening technologies along with their pros and cons. Next, they discuss the need of...
Motivational Quotes-Based Intelligent Insider Threat Prediction Model
Sunita Vikrant Dhavale. © 2021. 13 pages.
Insiders are considered as the weakest link. The digital records of a person's Facebook likes against motivational quotes can be used for automatic and accurate prediction of...
Video Saliency Detection for Visual Cryptography-Based Watermarking
Adrita Barari, Sunita V. Dhavale. © 2020. 39 pages.
The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also...
Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention
Sunita Vikrant Dhavale. © 2019. 281 pages.
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on...
Insider Attack Analysis in Building Effective Cyber Security for an Organization
Sunita Vikrant Dhavale. © 2019. 18 pages.
Recent studies have shown that, despite being equipped with highly secure technical controls, a broad range of cyber security attacks were carried out successfully on many...
Insider Attack Analysis in Building Effective Cyber Security for an Organization
Sunita Vikrant Dhavale. © 2018. 17 pages.
Recent studies have shown that, despite being equipped with highly secure technical controls, a broad range of cyber security attacks were carried out successfully on many...
Advanced Image-Based Spam Detection and Filtering Techniques
Sunita Vikrant Dhavale. © 2017. 213 pages.
Security technologies have advanced at an accelerated pace in the past few decades. These advancements in cyber security have benefitted many organizations and companies...
Video Saliency Detection for Visual Cryptography-Based Watermarking
Adrita Barari, Sunita V. Dhavale. © 2016. 39 pages.
The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also...