Microservice vulnerability analysis: A literature review with empirical insights

RK Jayalath, H Ahmad, D Goel, MS Syed… - IEEE Access, 2024 - ieeexplore.ieee.org
Microservice architectures are revolutionizing both small businesses and large corporations,
igniting a new era of innovation with their exceptional advantages in maintainability …

Chatnvd: Advancing cybersecurity vulnerability assessment with large language models

S Chopra, H Ahmad, D Goel, C Szabo - arxiv preprint arxiv:2412.04756, 2024 - arxiv.org
The increasing frequency and sophistication of cybersecurity vulnerabilities in software
systems underscore the urgent need for robust and effective methods of vulnerability …

[HTML][HTML] A novel transient strategy: transient electronics based on energetic materials

Y Wang, Z Ma, W He, Y Zhang, P Liu - Defence Technology, 2024 - Elsevier
Transient electronics is a versatile tool that finds applications in various fields, including
medical biology, environmental protection, and data information security. In the context of …

Smart HPA: A Resource-Efficient Horizontal Pod Auto-scaler for Microservice Architectures

H Ahmad, C Treude, M Wagner, C Szabo - arxiv preprint arxiv …, 2024 - arxiv.org
Microservice architectures have gained prominence in both academia and industry, offering
enhanced agility, reusability, and scalability. To simplify scaling operations in microservice …

A survey on immersive cyber situational awareness systems

H Ahmad, F Ullah, R Jafri - arxiv preprint arxiv:2408.07456, 2024 - arxiv.org
Cyber situational awareness systems are increasingly used for creating cyber common
operating pictures for cybersecurity analysis and education. However, these systems face …

Machine Learning Driven Smishing Detection Framework for Mobile Security

D Goel, H Ahmad, AK Jain, NK Goel - arxiv preprint arxiv:2412.09641, 2024 - arxiv.org
The increasing reliance on smartphones for communication, financial transactions, and
personal data management has made them prime targets for cyberattacks, particularly …

Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

D Goel, K Moore, M Guo, D Wang, M Kim… - … on Research in …, 2024 - Springer
This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature:
the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It …

[PDF][PDF] Comparative analysis of machine learning models for PDF malware detection: Evaluating different training and testing criteria

B Khan, M Arshad, SS Khan - Journal of Cybersecurity, 2023 - researchgate.net
The proliferation of maliciously coded documents as file transfers increase has led to a rise
in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major …

Hardening Active Directory Graphs via Evolutionary Diversity Optimization based Policies

D Goel, M Ward, A Neumann, F Neumann… - ACM Transactions on …, 2024 - dl.acm.org
Active Directory (AD) is the default security management system for Windows domain
networks. An AD environment can be described as a cyber-attack graph, with nodes …

Towards Resource-Efficient Reactive and Proactive Auto-Scaling for Microservice Architectures

H Ahmad, C Treude, M Wagner… - Available at SSRN …, 2024 - papers.ssrn.com
Microservice architectures have become increasingly popular in both academia and
industry, providing enhanced agility, elasticity, and maintainability in software development …