Machine learning in cybersecurity: A review A Handa, A Sharma, SK Shukla Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9 (4 …, 2019 | 201 | 2019 |
Malware classification using image representation A Singh, A Handa, N Kumar, SK Shukla Cyber Security Cryptography and Machine Learning: Third International …, 2019 | 94 | 2019 |
Detecting malicious accounts on the Ethereum blockchain with supervised learning N Kumar, A Singh, A Handa, SK Shukla Cyber Security Cryptography and Machine Learning: Fourth International …, 2020 | 53 | 2020 |
Malware classification using early stage behavioral analysis N Kumar, S Mukhopadhyay, M Gupta, A Handa, SK Shukla 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 16-23, 2019 | 37 | 2019 |
Evading API call sequence based malware classifiers F Fadadu, A Handa, N Kumar, SK Shukla Information and Communications Security: 21st International Conference …, 2020 | 23 | 2020 |
An insecurity study of ethereum smart contracts BC Gupta, N Kumar, A Handa, SK Shukla Security, Privacy, and Applied Cryptography Engineering: 10th International …, 2020 | 14 | 2020 |
Software quality enhancement using Fuzzy logic with object oriented metrics in design A Handa, G Wayal International journal of Computer Engineering & Technology (IJCET) 3 (1 …, 2012 | 11 | 2012 |
Automated classification of web-application attacks for intrusion detection H Bhagwani, R Negi, AK Dutta, A Handa, N Kumar, SK Shukla Security, Privacy, and Applied Cryptography Engineering: 9th International …, 2019 | 10 | 2019 |
A review and a comparative study of various plant recognition and classification techniques using leaf images A Handa, R Agarwal International Journal of Computer Applications 123 (2), 20-25, 2015 | 10 | 2015 |
A multimodel keyword spotting system based on lip movement and speech features A Handa, R Agarwal, N Kohli Multimedia Tools and Applications 79 (27), 20461-20481, 2020 | 8 | 2020 |
A survey of face recognition techniques and comparative study of various bi-modal and multi-modal techniques A Handa, R Agarwal, N Kohli 2016 11th International Conference on Industrial and Information Systems …, 2016 | 8 | 2016 |
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II A Handa, R Negi, S Venkatesan, SK Shukla River Publishers, 2023 | 6 | 2023 |
Automated Windows behavioral tracing for malware analysis S Rana, N Kumar, A Handa, SK Shukla Security and Privacy 5 (6), e253, 2022 | 6 | 2022 |
Static ransomware analysis using machine learning and deep learning models K Gaur, N Kumar, A Handa, SK Shukla Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 6 | 2021 |
Incremental approach for multi-modal face expression recognition system using deep neural networks A Handa, R Agarwal, N Kohli International Journal of Computational Vision and Robotics 11 (1), 1-20, 2021 | 6 | 2021 |
Intrusion Detection & Prevention in Programmable Logic Controllers: A Model-driven Approach R Negi, A Dutta, A Handa, U Ayyangar, SK Shukla 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS) 1, 215-222, 2020 | 6 | 2020 |
PeerClear: peer-to-peer bot-net detection A Kumar, N Kumar, A Handa, SK Shukla Cyber Security Cryptography and Machine Learning: Third International …, 2019 | 6 | 2019 |
Adversaries strike hard: Adversarial attacks against malware classifiers using dynamic api calls as features Hariom, A Handa, N Kumar, S Kumar Shukla Cyber Security Cryptography and Machine Learning: 5th International …, 2021 | 4 | 2021 |
Malware analysis using image classification techniques A Singh, A Handa, N Kumar, SK Shukla Cyber Security in India: Education, Research and Training, 33-38, 2020 | 4 | 2020 |
A review: malware analysis work at IIT Kanpur A Kumar, M Gupta, G Kumar, A Handa, N Kumar, SK Shukla Cyber Security in India: Education, Research and Training, 39-48, 2020 | 4 | 2020 |