Malware classification using image representation A Singh, A Handa, N Kumar, SK Shukla Cyber Security Cryptography and Machine Learning: Third International …, 2019 | 88 | 2019 |
Detecting malicious accounts on the Ethereum blockchain with supervised learning N Kumar, A Singh, A Handa, SK Shukla Cyber Security Cryptography and Machine Learning: Fourth International …, 2020 | 50 | 2020 |
Malware classification using early stage behavioral analysis N Kumar, S Mukhopadhyay, M Gupta, A Handa, SK Shukla 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 16-23, 2019 | 36 | 2019 |
Evading API call sequence based malware classifiers F Fadadu, A Handa, N Kumar, SK Shukla Information and Communications Security: 21st International Conference …, 2020 | 22 | 2020 |
An insecurity study of ethereum smart contracts BC Gupta, N Kumar, A Handa, SK Shukla Security, Privacy, and Applied Cryptography Engineering: 10th International …, 2020 | 13 | 2020 |
Automated classification of web-application attacks for intrusion detection H Bhagwani, R Negi, AK Dutta, A Handa, N Kumar, SK Shukla Security, Privacy, and Applied Cryptography Engineering: 9th International …, 2019 | 10 | 2019 |
Static ransomware analysis using machine learning and deep learning models K Gaur, N Kumar, A Handa, SK Shukla Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 6 | 2021 |
PeerClear: peer-to-peer bot-net detection A Kumar, N Kumar, A Handa, SK Shukla Cyber Security Cryptography and Machine Learning: Third International …, 2019 | 6 | 2019 |
Automated windows behavioral tracing for malware analysis S Rana, N Kumar, A Handa, SK Shukla Security and Privacy 5 (6), e253, 2022 | 5 | 2022 |
Malware analysis using image classification techniques A Singh, A Handa, N Kumar, SK Shukla Cyber Security in India: Education, Research and Training, 33-38, 2020 | 4 | 2020 |
A review: malware analysis work at IIT Kanpur A Kumar, M Gupta, G Kumar, A Handa, N Kumar, SK Shukla Cyber Security in India: Education, Research and Training, 39-48, 2020 | 4 | 2020 |
Ransomware detection based on network behavior using machine learning and hidden markov model with gaussian emission A Srivastava, N Kumar, A Handa, SK Shukla 2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023 | 3 | 2023 |
Adversaries strike hard: Adversarial attacks against malware classifiers using dynamic api calls as features Hariom, A Handa, N Kumar, S Kumar Shukla Cyber Security Cryptography and Machine Learning: 5th International …, 2021 | 3 | 2021 |
7 Feature Engineering and Analysis Toward Temporally Robust Detection of Android Malware S Jaiswal, A Handa, N Kumar River Publishers, 2021 | 3 | 2021 |
Cyber Security in India: Education, Research and Training SK Shukla, M Agrawal Springer Nature, 2020 | 3 | 2020 |
Cyber risk assessment of networked cyber assets using probabilistic model checking A Handa, S Mukhopadhyay, S Mallick, N Kumar, SK Shukla, RL Minz, ... 2019 IEEE Conference on Information and Communication Technology, 1-6, 2019 | 3 | 2019 |
Evading malware classifiers using RL agent with action-mask S Pandey, N Kumar, A Handa, SK Shukla International Journal of Information Security 22 (6), 1743-1763, 2023 | 2 | 2023 |
RBMon: Real Time System Behavior Monitoring Tool N Kumar, A Handa, SK Shukla Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 2 | 2022 |
Malware Detection in Word Documents Using Machine Learning R Khan, N Kumar, A Handa, SK Shukla Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 2 | 2021 |
Detection of Advanced Linux Malware Using Machine Learning N Kumar, A Handa Advances in Computational Intelligence and Communication Technology …, 2021 | 2 | 2021 |