[go: up one dir, main page]

Follow
Nidhi Rastogi
Title
Cited by
Cited by
Year
Tech in Crisis: Filter Bubbles and Fake News
D DiFranzo, K Gloria-Garcia, N Rastogi
ACM XRDS 23 (3), 32-35, 2017
208*2017
Looking beyond IoCs: Automatically extracting attack patterns from external CTI
MT Alam, D Bhusal, Y Park, N Rastogi
Proceedings of the 26th international symposium on research in attacks …, 2023
952023
MalONT: An ontology for malware threat intelligence
N Rastogi, S Dutta, MJ Zaki, A Gittens, C Aggarwal
SIGKDD Conference on Knowledge Discovery and Data Mining - International …, 2020
792020
CyNER: A Python Library for Cybersecurity Named Entity Recognition
MT Alam, D Bhusal, Y Park, N Rastogi
632022
DANTE: Predicting Insider Threat using LSTM on system logs
Q Ma, N Rastogi
IEEE International Conference on Trust, Security and Privacy in Computing …, 2020
55*2020
CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence
M Tanvirul Alam, D Bhusal, L Nguyen, N Rastogi
38th Conference on Neural Information Processing Systems (NeurIPS 2024 …, 2024
54*2024
Actionable cyber threat intelligence using knowledge graphs and large language models
R Fieblinger, MT Alam, N Rastogi
2024 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2024
532024
TINKER: A framework for Open source Cyberthreat Intelligence
N Rastogi, S Dutta, A Gittens, M Zaki, C Aggarwal
21st International Conference on Trust, Security and Privacy in Computing …, 2022
50*2022
WhatsApp security and role of metadata in preserving privacy
N Rastogi, J Hendler
12th International Conference on Cyber Warfare and Security 6817, 269-275, 2017
342017
Security and privacy of performing data analytics in the cloud: a three-way handshake of technology, policy, and management
N Rastogi, MJK Gloria, J Hendler
Journal of Information Policy 5, 129-154, 2015
312015
Systemic risk and vulnerability analysis of multi-cloud environments
M Reece, TE Lander Jr, M Stoffolano, A Sampson, J Dykstra, S Mittal, ...
arXiv preprint arXiv:2306.01862, 2023
262023
Sok: Modeling explainability in security analytics for interpretability, trustworthiness, and usability
D Bhusal, R Shin, AA Shewale, MKM Veerabhadran, M Clifford, ...
Proceedings of the 18th International Conference on Availability …, 2023
25*2023
Personal Health Knowledge Graphs for Patients
N Rastogi, MJ Zaki
The Knowledge Graph Conference- Personal Health Knowledge Graphs, 2020
252020
SECURE: Benchmarking Large Language Models for Cybersecurity
D Bhusal, MT Alam, L Nguyen, A Mahara, Z Lightcap, R Frazier, ...
2024 Annual Computer Security Applications Conference (ACSAC), 15-30, 2024
192024
An Ontology-driven Knowledge Graph for Android Malware
R Christian, S Dutta, Y Park, N Rastogi
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
192021
SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory
D Bhusal, MT Alam, L Nguyen, A Mahara, Z Lightcap, R Frazier, ...
Proceedings of the 40th Annual Computer Security Applications Conference …, 2024
182024
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles
N Rastogi, S Rampazzi, M Clifford, M Heller, M Bishop, K Levitt
AAAI'22 - Explainable Agency in Artificial Intelligence 2022, 2022
112022
FoodKG Enabled Q&A Application.
S Haussmann, Y Chen, O Seneviratne, N Rastogi, J Codella, CH Chen, ...
2019 International Semantic Web Conference, 273-276, 2019
82019
Adversarial Patterns: Building Robust Android Malware Classifiers
D Bhusal, N Rastogi
ACM Computing Surveys, 2025
72025
Defending multi-cloud applications against man-in-the-middle attacks
M Reece, N Rastogi, T Lander, J Dykstra, S Mittal, A Sampson
Proceedings of the 29th ACM Symposium on Access Control Models and …, 2024
72024
The system can't perform the operation now. Try again later.
Articles 1–20