Sunita Vikrant Dhavale

Sunita Vikrant Dhavale, presently associated with Defence Institute of Advanced Technology (DIAT), an autonomous institute under Ministry of Defence, Pune, as an Assistant Professor in Department of Computer Engineering. She received her M.E. and PhD degrees in Computer Science from the Pune University in 2009 and DIAT University in 2015 respectively. She is recipient of IETE M. N. Saha Memorial Award for her paper published in IETE Journal of Research and Outstanding Woman Achiever Award from Venus International Foundation. She was selected as one of the top performers in four weeks AICTE approved Faculty Development Program on ICT tools by IIT, Bombay in September 2016. She has more than 20 publications in International Journals, International Conference proceedings and Book chapter. Her research areas are steganography, digital watermarking, multimedia forensics and security, cyber security. She organized first uniquely aimed National Conference on Electronics and Computer Engineering (NCECE - 2016) with the theme: Defence Applications in DIAT from 21st-22nd Jan 2016. She worked as a project manager for campus-wide Wi-Fi Project for higher research and education in DIAT in 2012. She emphasized on active learning strategy in her classroom. She arranged several seminars, workshops, Hands-on, presentation, debates, quizzes for providing the additional resources to MTech students and course improvement. She is member of many professional bodies including IEEE, ACM, ISTE, IETE, IAENG, and ISACA.

Publications

Why One Should Learn Ethical Hacking
Sunita Vikrant Dhavale. © 2022. 42 pages.
This chapter presents the importance of learning hacking techniques by each and every person dealing with cyber operations. The chapter explains various basic terminologies used...
AI-Driven COVID-19 Patient Screening With Design Thinking Approach- C3IA Tool: A Case Study
Sunita Vikrant Dhavale. © 2022. 11 pages.
In this chapter, the authors discuss a brief literature review on AI-driven COVID-19 patient screening technologies along with their pros and cons. Next, they discuss the need of...
Motivational Quotes-Based Intelligent Insider Threat Prediction Model
Sunita Vikrant Dhavale. © 2021. 13 pages.
Insiders are considered as the weakest link. The digital records of a person's Facebook likes against motivational quotes can be used for automatic and accurate prediction of...
Video Saliency Detection for Visual Cryptography-Based Watermarking
Adrita Barari, Sunita V. Dhavale. © 2020. 39 pages.
The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also...
Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention
Sunita Vikrant Dhavale. © 2019. 281 pages.
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on...
Insider Attack Analysis in Building Effective Cyber Security for an Organization
Sunita Vikrant Dhavale. © 2019. 18 pages.
Recent studies have shown that, despite being equipped with highly secure technical controls, a broad range of cyber security attacks were carried out successfully on many...
Insider Attack Analysis in Building Effective Cyber Security for an Organization
Sunita Vikrant Dhavale. © 2018. 17 pages.
Recent studies have shown that, despite being equipped with highly secure technical controls, a broad range of cyber security attacks were carried out successfully on many...
Advanced Image-Based Spam Detection and Filtering Techniques
Sunita Vikrant Dhavale. © 2017. 213 pages.
Security technologies have advanced at an accelerated pace in the past few decades. These advancements in cyber security have benefitted many organizations and companies...
Video Saliency Detection for Visual Cryptography-Based Watermarking
Adrita Barari, Sunita V. Dhavale. © 2016. 39 pages.
The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also...