关注
Mohan Anand P
Mohan Anand P
其他姓名Mohan Anand Putrevu, Putrevu MA, MA Putrevu
在 cse.iitk.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
From text to mitre techniques: Exploring the malicious use of large language models for generating cyber attack payloads
PV Charan, H Chunduri, PM Anand, SK Shukla
arXiv preprint arXiv:2305.15336, 2023
462023
Advance persistent threat detection using long short term memory (LSTM) neural networks
PV Sai Charan, T Gireesh Kumar, P Mohan Anand
Emerging Technologies in Computer Engineering: Microservices in Big Data …, 2019
242019
An ensemble approach for algorithmically generated domain name detection using statistical and lexical analysis
PM Anand, TG Kumar, PVS Charan
Procedia Computer Science 171, 1129-1136, 2020
192020
A comprehensive API call analysis for detecting Windows-based ransomware
PM Anand, PVS Charan, SK Shukla
2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022
172022
Early detection of ransomware activity based on hardware performance counters
MA Putrevu, VSC Putrevu, SK Shukla
Proceedings of the 2023 Australasian Computer Science Week, 10-17, 2023
142023
DOTMUG: a threat model for target specific APT attacks–misusing google teachable machine
PVS Charan, PM Anand, SK Shukla, N Selvan, H Chunduri
2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-8, 2022
102022
HiPeR-Early detection of a ransomware attack using hardware performance counters
PM Anand, PVS Charan, SK Shukla
Digital Threats: Research and Practice 4 (3), 1-24, 2023
92023
Dmapt: Study of data mining and machine learning techniques in advanced persistent threat attribution and detection
PVS Charan, PM Anand, SK Shukla
Data Mining-Concepts and Applications, 63, 2021
92021
Detecting word based DGA domains using ensemble models
PVS Charan, SK Shukla, PM Anand
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
92020
A Framework for Advanced Persistent Threat Attribution using Zachman Ontology
VSC Putrevu, H Chunduri, MA Putrevu, S Shukla
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference …, 2023
72023
A novel approach for insight finding mechanism on clickstream data using hadoop
PM Anand, GS Vamsi, PR Kumar
2018 Second International Conference on Inventive Communication and …, 2018
52018
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
PVS Charan, G Ratnakaram, H Chunduri, PM Anand, SK Shukla
Computers & Security 132, 103329, 2023
32023
RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files
PM Anand, PVS Charan, H Chunduri, SK Shukla
International Conference on Information Security Practice and Experience …, 2023
22023
Addressing cold start problem in recommendation system using custom built hadoop ecosystem
PVS Charan, PR Kumar, PM Anand
2018 Second International Conference on Inventive Communication and …, 2018
22018
SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device
CHNS Abhishek, C Srinivasan, L KV, PM Anand
Inventive Communication and Computational Technologies: Proceedings of …, 2022
12022
A Comprehensive Analysis of Machine Learning Based File Trap Selection Methods to Detect Crypto Ransomware
MA Putrevu, H Chunduri, VSC Putrevu, SK Shukla
arXiv preprint arXiv:2409.11428, 2024
2024
System and method for kernel-level active darknet monitoring in a communication network
PVS Charan, G Ratnakaram, SK Shukla, PM Anand, CNV Hrushikesh
US Patent App. 18/322,626, 2024
2024
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats
PVS Charan, S Mukhopadhyay, S Manna, N Rani, A Vaid, H Chunduri, ...
Digital Threats: Research and Practice, 0
系统目前无法执行此操作,请稍后再试。
文章 1–18