ติดตาม
Hiran V Nath
Hiran V Nath
ยืนยันอีเมลแล้วที่ nitc.ac.in - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Static malware analysis using machine learning methods
HV Nath, BM Mehtre
International Conference on Security in Computer Networks and Distributed …, 2014
1682014
A survey of zero-day malware attacks and its detection methodology
K Radhakrishnan, RR Menon, HV Nath
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 533-539, 2019
362019
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
R Nath, HV Nath
Computers and Electrical Engineering 100, 107997, 2022
352022
A survey on ransomware detection techniques
CV Bijitha, R Sukumaran, HV Nath
Secure Knowledge Management In Artificial Intelligence Era: 8th …, 2020
322020
On the effectiveness of image processing based malware detection techniques
CV Bijitha, HV Nath
Cybernetics and Systems 53 (7), 615-640, 2022
242022
Vulnerability assessment methods–a review
HV Nath
International Conference on Network Security and Applications, 1-10, 2011
172011
Blockchain-enabled beer game: a software tool for familiarizing the application of blockchain in supply chain management
J Sunny, VM Pillai, HV Nath, K Shah, PP Ghoradkar, MJ Philip, ...
Industrial Management & Data Systems 122 (4), 1025-1055, 2022
162022
Ensemble learning for detection of malicious content embedded in PDF documents
HV Nath, BM Mehtre
2015 IEEE International conference on signal processing, informatics …, 2015
142015
A distortion free relational database watermarking using patch work method
R Arun, K Praveen, D Chandra Bose, HV Nath
Proceedings of the International Conference on Information Systems Design …, 2012
132012
Blockchain technology: a troubleshooter for blood cold chains
D Asokan, J Sunny, VM Pillai, HV Nath
Journal of Global Operations and Strategic Sourcing 15 (3), 316-344, 2022
122022
System and method for zero-day privilege escalation malware detection
H Viswanath, BM Mehtre
US Patent 20170161495A1, 2017
122017
System and method for detection and prevention of data breach and ransomware attacks
H Viswanath, BM Mehtre
US Patent 10,262,139, 2019
62019
Analysis of a Multistage Attack Embedded in a Video File
HV Nath, BM Mehtre
International Conference on Secure Knowledge Management in Bigdata era 2014 …, 2014
62014
Steganalysis for calibrated and lower embedded uncalibrated images
DD Shankar, T Gireeshkumar, HV Nath
Swarm, Evolutionary, and Memetic Computing: Second International Conference …, 2011
52011
Reconciliation engine and metric for network vulnerability assessment
HV Nath, K Gangadharan, M Sethumadhavan
Proceedings of the First International Conference on Security of Internet of …, 2012
42012
Low budget honeynet creation and implementation for Nids and Nips
KS Aathira, HV Nath, TN Kutty, KT Gireesh
Int. J. Comput. Netw. Secur.(IJCNS) 2 (8), 27-32, 2010
42010
A hybrid method for analysis and detection of malicious executables in IoT network
SSB Subrahmanyam, P Goutham, VKR Ambati, CV Bijitha, HV Nath
Computers & Security 132, 103339, 2023
32023
Blockchain: A Makeover to Supply Chain Management
J Sunny, K Shah, P Ghoradkar, M Jose, M Shirswar, HV Nath, VM Pillai
Recent Advances in Operations Management Applications: Select Proceedings of …, 2022
32022
A generalized lightweight intrusion detection model with unified feature selection for internet of things networks
R Nath N, HV Nath
International Journal of Network Management 34 (6), e2291, 2024
12024
A Survey on Harnessing High-Performance Computing and Machine Learning for Detecting Stealthy Cache-Based Side-Channel Attacks
S Baviskar, R Sanoj, HV Nath
2024 IEEE International Conference on Blockchain and Distributed Systems …, 2024
12024
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20