Proposed Methodology for Cyber Criminal Profiling A Warikoo Information Security Journal: A Global Perspective, 2014 | 45 | 2014 |
Methods for optimizing an automated determination in real-time of a risk rating of cyber-attack and devices thereof A Warikoo, B Shetty, SM Chandran US Patent App. 14/661,029, 2016 | 26 | 2016 |
The triangle model for cyber threat attribution A Warikoo Journal of Cyber Security Technology 5 (3-4), 191-208, 2021 | 23 | 2021 |
Perspective Chapter: Ransomware A Warikoo Malware-Detection and Defense, 2023 | 6 | 2023 |
Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection, Prevention and Response M Hills Nova Science Publishers, 2016 | 5 | 2016 |
Cyber Warfare: China’s Role and Challenges to the United States A Warikoo Himalayan and Central Asian Studies 17, 2013 | 3 | 2013 |
System and method for determining the confidence level in attributing a cyber campaign to an activity group A Warikoo US Patent 11,343,264, 2022 | 2 | 2022 |
CYBER WARFARE. A WARIKOO Himalayan & Central Asian Studies 17, 2013 | | 2013 |
How much of the outside E911 Location Problem in VoIP can be reasonably solved using existing Radio Beacons H Hashim, O Orellana, F Tian, S Udomcharoensook, A Warikoo | | |