| TTPHunter: Automated extraction of actionable intelligence as TTPs from narrative threat reports N Rani, B Saha, V Maurya, SK Shukla Proceedings of the 2023 australasian computer science week, 126-134, 2023 | 42 | 2023 |
| Ttpxhunter: Actionable threat intelligence extraction as ttps from finished cyber threat reports N Rani, B Saha, V Maurya, SK Shukla Digital Threats: Research and Practice 5 (4), 1-19, 2024 | 35* | 2024 |
| A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems N Rani, B Saha, SK Shukla Journal of Information Security and Applications 92, 104076, 2025 | 26* | 2025 |
| Malxcap: A method for malware capability extraction B Saha, N Rani, SK Shukla International Conference on Information Security Practice and Experience …, 2023 | 8 | 2023 |
| MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity B Saha, SK Shukla arXiv preprint arXiv:2506.07586, 2025 | 6 | 2025 |
| Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation B Saha, N Rani, SK Shukla arXiv preprint arXiv:2504.21574, 2025 | 6 | 2025 |
| Malaware: Automating the comprehension of malicious software behaviours using large language models (llms) B Saha, N Rani, SK Shukla 2025 IEEE/ACM 22nd International Conference on Mining Software Repositories …, 2025 | 5 | 2025 |
| Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution N Rani, B Saha, R Kumar, SK Shukla 2024 IEEE 6th International Conference on Trust, Privacy and Security in …, 2024 | 4 | 2024 |
| Chasing the shadows: Ttps in action to attribute advanced persistent threats N Rani, B Saha, V Maurya, SK Shukla arXiv preprint arXiv:2409.16400, 2024 | 4 | 2024 |
| Decoding shadows: Towards Tactics, Techniques, and Procedures (TTP)-based Advanced Persistent Threat (APT) attribution N Rani, B Saha, V Maurya, SK Shukla Information Security Journal: A Global Perspective, 1-28, 2025 | 1 | 2025 |
| MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT B Saha, N Rani, SK Shukla 2024 Annual Computer Security Applications Conference Workshops (ACSAC …, 2024 | 1 | 2024 |
| PARAG: Proactive Answering Framework Integrating LLMs with Retrieval-Augmented Generation B Saha, N Rani, J Chakraborty, D Singh, SV Chakraborty, SK Shukla European Interdisciplinary Cybersecurity Conference, 20-37, 2025 | | 2025 |
| System for extracting malware capabilities and method thereof B Saha, N Rani, SK Shukla US Patent App. 18/812,003, 2025 | | 2025 |
| Automated Classification of Cybercrime Complaints using Transformer-based Language Models for Hinglish Texts N Rani, D Singh, B Saha, SK Shukla arXiv preprint arXiv:2412.16614, 2024 | | 2024 |