From text to mitre techniques: Exploring the malicious use of large language models for generating cyber attack payloads PV Charan, H Chunduri, PM Anand, SK Shukla arXiv preprint arXiv:2305.15336, 2023 | 46 | 2023 |
Advance persistent threat detection using long short term memory (LSTM) neural networks PV Sai Charan, T Gireesh Kumar, P Mohan Anand Emerging Technologies in Computer Engineering: Microservices in Big Data …, 2019 | 24 | 2019 |
An ensemble approach for algorithmically generated domain name detection using statistical and lexical analysis PM Anand, TG Kumar, PVS Charan Procedia Computer Science 171, 1129-1136, 2020 | 19 | 2020 |
A comprehensive API call analysis for detecting Windows-based ransomware PM Anand, PVS Charan, SK Shukla 2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022 | 17 | 2022 |
Early detection of ransomware activity based on hardware performance counters MA Putrevu, VSC Putrevu, SK Shukla Proceedings of the 2023 Australasian Computer Science Week, 10-17, 2023 | 14 | 2023 |
DOTMUG: a threat model for target specific APT attacks–misusing google teachable machine PVS Charan, PM Anand, SK Shukla, N Selvan, H Chunduri 2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-8, 2022 | 10 | 2022 |
HiPeR-Early detection of a ransomware attack using hardware performance counters PM Anand, PVS Charan, SK Shukla Digital Threats: Research and Practice 4 (3), 1-24, 2023 | 9 | 2023 |
Dmapt: Study of data mining and machine learning techniques in advanced persistent threat attribution and detection PVS Charan, PM Anand, SK Shukla Data Mining-Concepts and Applications, 63, 2021 | 9 | 2021 |
Detecting word based DGA domains using ensemble models PVS Charan, SK Shukla, PM Anand Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020 | 9 | 2020 |
A Framework for Advanced Persistent Threat Attribution using Zachman Ontology VSC Putrevu, H Chunduri, MA Putrevu, S Shukla Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference …, 2023 | 7 | 2023 |
A novel approach for insight finding mechanism on clickstream data using hadoop PM Anand, GS Vamsi, PR Kumar 2018 Second International Conference on Inventive Communication and …, 2018 | 5 | 2018 |
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence PVS Charan, G Ratnakaram, H Chunduri, PM Anand, SK Shukla Computers & Security 132, 103329, 2023 | 3 | 2023 |
RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files PM Anand, PVS Charan, H Chunduri, SK Shukla International Conference on Information Security Practice and Experience …, 2023 | 2 | 2023 |
Addressing cold start problem in recommendation system using custom built hadoop ecosystem PVS Charan, PR Kumar, PM Anand 2018 Second International Conference on Inventive Communication and …, 2018 | 2 | 2018 |
SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device CHNS Abhishek, C Srinivasan, L KV, PM Anand Inventive Communication and Computational Technologies: Proceedings of …, 2022 | 1 | 2022 |
A Comprehensive Analysis of Machine Learning Based File Trap Selection Methods to Detect Crypto Ransomware MA Putrevu, H Chunduri, VSC Putrevu, SK Shukla arXiv preprint arXiv:2409.11428, 2024 | | 2024 |
System and method for kernel-level active darknet monitoring in a communication network PVS Charan, G Ratnakaram, SK Shukla, PM Anand, CNV Hrushikesh US Patent App. 18/322,626, 2024 | | 2024 |
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats PVS Charan, S Mukhopadhyay, S Manna, N Rani, A Vaid, H Chunduri, ... Digital Threats: Research and Practice, 0 | | |