| Machine learning in cybersecurity: A review A Handa, A Sharma, SK Shukla Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9 (4 …, 2019 | 314 | 2019 |
| Malware classification using image representation A Singh, A Handa, N Kumar, SK Shukla International Symposium on Cyber Security Cryptography and Machine Learning …, 2019 | 131 | 2019 |
| Detecting malicious accounts on the Ethereum blockchain with supervised learning N Kumar, A Singh, A Handa, SK Shukla International symposium on cyber security cryptography and machine learning …, 2020 | 88 | 2020 |
| Malware classification using early stage behavioral analysis N Kumar, S Mukhopadhyay, M Gupta, A Handa, SK Shukla 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 16-23, 2019 | 41 | 2019 |
| Evading API call sequence based malware classifiers F Fadadu, A Handa, N Kumar, SK Shukla International Conference on Information and Communications Security, 18-33, 2019 | 38 | 2019 |
| An insecurity study of ethereum smart contracts BC Gupta, N Kumar, A Handa, SK Shukla International Conference on Security, Privacy, and Applied Cryptography …, 2020 | 20 | 2020 |
| Automated windows behavioral tracing for malware analysis S Rana, N Kumar, A Handa, SK Shukla Security and Privacy 5 (6), e253, 2022 | 14 | 2022 |
| A multimodel keyword spotting system based on lip movement and speech features A Handa, R Agarwal, N Kohli Multimedia Tools and Applications 79 (27), 20461-20481, 2020 | 13 | 2020 |
| Automated classification of web-application attacks for intrusion detection H Bhagwani, R Negi, AK Dutta, A Handa, N Kumar, SK Shukla International Conference on Security, Privacy, and Applied Cryptography …, 2019 | 13 | 2019 |
| Software quality enhancement using Fuzzy logic with object oriented metrics in design A Handa, G Wayal International journal of Computer Engineering & Technology (IJCET) 3 (1 …, 2012 | 12 | 2012 |
| A review and a comparative study of various plant recognition and classification techniques using leaf images A Handa, R Agarwal International Journal of Computer Applications 123 (2), 20-25, 2015 | 11 | 2015 |
| Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II A Handa, R Negi, S Venkatesan, SK Shukla River Publishers, 2023 | 9 | 2023 |
| Incremental approach for multi-modal face expression recognition system using deep neural networks A Handa, R Agarwal, N Kohli International journal of computational vision and robotics 11 (1), 1-20, 2021 | 9 | 2021 |
| Static ransomware analysis using machine learning and deep learning models K Gaur, N Kumar, A Handa, SK Shukla International Conference on Advances in Cyber Security, 450-467, 2020 | 9 | 2020 |
| A survey of face recognition techniques and comparative study of various bi-modal and multi-modal techniques A Handa, R Agarwal, N Kohli 2016 11th International Conference on Industrial and Information Systems …, 2016 | 9 | 2016 |
| Adversaries strike hard: Adversarial attacks against malware classifiers using dynamic api calls as features Hariom, A Handa, N Kumar, S Kumar Shukla International Symposium on Cyber Security Cryptography and Machine Learning …, 2021 | 8 | 2021 |
| Intrusion detection & prevention in programmable logic controllers: A model-driven approach R Negi, A Dutta, A Handa, U Ayyangar, SK Shukla 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS) 1, 215-222, 2020 | 8 | 2020 |
| PeerClear: Peer-to-peer bot-net detection A Kumar, N Kumar, A Handa, SK Shukla International Symposium on Cyber Security Cryptography and Machine Learning …, 2019 | 8 | 2019 |
| Malware detection in word documents using machine learning R Khan, N Kumar, A Handa, SK Shukla International Conference on Advances in Cyber Security, 325-339, 2020 | 6 | 2020 |
| Malware analysis using image classification techniques A Singh, A Handa, N Kumar, SK Shukla Cyber Security in India: Education, Research and Training, 33-38, 2020 | 6 | 2020 |