A simple method for detection of metamorphic malware using dynamic analysis and text mining SP Choudhary, MD Vidyarthi Procedia Computer Science 54, 265-270, 2015 | 55 | 2015 |
Malware detection using API function frequency with ensemble based classifier P Natani, D Vidyarthi Security in Computing and Communications: International Symposium, SSCC 2013 …, 2013 | 44 | 2013 |
Static malware analysis to identify ransomware properties D Vidyarthi, CRS Kumar, S Rakshit, S Chansarkar International Journal of Computer Science Issues (IJCSI) 16 (3), 10-17, 2019 | 30 | 2019 |
Evolution of evasive malwares: A survey A Jadhav, D Vidyarthi, M Hemavathy 2016 International Conference on Computational Techniques in Information and …, 2016 | 29 | 2016 |
Malware detection by static checking and dynamic analysis of executables D Vidyarthi, SP Choudhary, S Rakshit, CRS Kumar International Journal of Information Security and Privacy (IJISP) 11 (3), 29-41, 2017 | 22 | 2017 |
A brief study and comparison of, open source intrusion detection system tools SB Ambati, D Vidyarthi International Journal of Advanced Computational Engineering and Networking 1 …, 2013 | 20 | 2013 |
Automatic dynamic malware analysis techniques for Linux environment G Damri, D Vidyarthi 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 13 | 2016 |
An overview of detection techniques for metamorphic malware P Natani, D Vidyarthi Intelligent Computing, Networking, and Informatics: Proceedings of the …, 2014 | 8 | 2014 |
A study of hardware architecture based attacks to bypass operating system security VG Lokhande, D Vidyarthi Security and Privacy 2 (4), e81, 2019 | 6 | 2019 |
Identifying ransomware-specific properties using static analysis of executables D Vidyarthi, CRS Kumar, S Rakshit, S Chansarkar IJARCCE 8, 358-366, 2019 | 6 | 2019 |
Detection of stealth process using hooking D Vidyarthi Proceedings of the Third International Symposium on Women in Computing and …, 2015 | 3 | 2015 |
Classification of malicious process using high‐level activity based dynamic analysis D Vidyarthi, G Damri, S Rakshit, CR Suthikshn Kumar, S Chansarkar Security and Privacy 2 (6), e86, 2019 | 2 | 2019 |
NLP-based Auto Generation of Graph Database from Textual Requirements J Shivamurthy, T Uppal, D Vidyarthi 2024 IEEE International Conference on Electronics, Computing and …, 2024 | 1 | 2024 |
Natural Language Processing based Auto Generation of Proof Obligations for Formal Verification of Control Requirements in Safety-Critical Systems J Shivamurthy, D Vidyarthi, T Uppal IFAC-PapersOnLine 57, 1-6, 2024 | 1 | 2024 |
Classification of Malware Using Deep Learning: A Study IS Srinu, D Vidyarthi 2023 IEEE International Carnahan Conference on Security Technology (ICCST), 1-6, 2023 | 1 | 2023 |
Static Analysis of Programs for Property Checking DV Vidyarthi INDIAN INSTITUTE OF TECHNOLOGY KANPUR, 2010 | | 2010 |
Comparing Dimensionality Reduction using PCA and Subspace LDA for Face Recognition M Saraswat, V Patel, D Vidyarthi International Journal on Recent Trends in Engineering & Technology 3 (2), 32, 2010 | | 2010 |