Static malware analysis using machine learning methods HV Nath, BM Mehtre International Conference on Security in Computer Networks and Distributed …, 2014 | 168 | 2014 |
A survey of zero-day malware attacks and its detection methodology K Radhakrishnan, RR Menon, HV Nath TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 533-539, 2019 | 36 | 2019 |
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges R Nath, HV Nath Computers and Electrical Engineering 100, 107997, 2022 | 35 | 2022 |
A survey on ransomware detection techniques CV Bijitha, R Sukumaran, HV Nath Secure Knowledge Management In Artificial Intelligence Era: 8th …, 2020 | 32 | 2020 |
On the effectiveness of image processing based malware detection techniques CV Bijitha, HV Nath Cybernetics and Systems 53 (7), 615-640, 2022 | 24 | 2022 |
Vulnerability assessment methods–a review HV Nath International Conference on Network Security and Applications, 1-10, 2011 | 17 | 2011 |
Blockchain-enabled beer game: a software tool for familiarizing the application of blockchain in supply chain management J Sunny, VM Pillai, HV Nath, K Shah, PP Ghoradkar, MJ Philip, ... Industrial Management & Data Systems 122 (4), 1025-1055, 2022 | 16 | 2022 |
Ensemble learning for detection of malicious content embedded in PDF documents HV Nath, BM Mehtre 2015 IEEE International conference on signal processing, informatics …, 2015 | 14 | 2015 |
A distortion free relational database watermarking using patch work method R Arun, K Praveen, D Chandra Bose, HV Nath Proceedings of the International Conference on Information Systems Design …, 2012 | 13 | 2012 |
Blockchain technology: a troubleshooter for blood cold chains D Asokan, J Sunny, VM Pillai, HV Nath Journal of Global Operations and Strategic Sourcing 15 (3), 316-344, 2022 | 12 | 2022 |
System and method for zero-day privilege escalation malware detection H Viswanath, BM Mehtre US Patent 20170161495A1, 2017 | 12 | 2017 |
System and method for detection and prevention of data breach and ransomware attacks H Viswanath, BM Mehtre US Patent 10,262,139, 2019 | 6 | 2019 |
Analysis of a Multistage Attack Embedded in a Video File HV Nath, BM Mehtre International Conference on Secure Knowledge Management in Bigdata era 2014 …, 2014 | 6 | 2014 |
Steganalysis for calibrated and lower embedded uncalibrated images DD Shankar, T Gireeshkumar, HV Nath Swarm, Evolutionary, and Memetic Computing: Second International Conference …, 2011 | 5 | 2011 |
Reconciliation engine and metric for network vulnerability assessment HV Nath, K Gangadharan, M Sethumadhavan Proceedings of the First International Conference on Security of Internet of …, 2012 | 4 | 2012 |
Low budget honeynet creation and implementation for Nids and Nips KS Aathira, HV Nath, TN Kutty, KT Gireesh Int. J. Comput. Netw. Secur.(IJCNS) 2 (8), 27-32, 2010 | 4 | 2010 |
A hybrid method for analysis and detection of malicious executables in IoT network SSB Subrahmanyam, P Goutham, VKR Ambati, CV Bijitha, HV Nath Computers & Security 132, 103339, 2023 | 3 | 2023 |
Blockchain: A Makeover to Supply Chain Management J Sunny, K Shah, P Ghoradkar, M Jose, M Shirswar, HV Nath, VM Pillai Recent Advances in Operations Management Applications: Select Proceedings of …, 2022 | 3 | 2022 |
A generalized lightweight intrusion detection model with unified feature selection for internet of things networks R Nath N, HV Nath International Journal of Network Management 34 (6), e2291, 2024 | 1 | 2024 |
A Survey on Harnessing High-Performance Computing and Machine Learning for Detecting Stealthy Cache-Based Side-Channel Attacks S Baviskar, R Sanoj, HV Nath 2024 IEEE International Conference on Blockchain and Distributed Systems …, 2024 | 1 | 2024 |