| Malware classification using image representation A Singh, A Handa, N Kumar, SK Shukla International Symposium on Cyber Security Cryptography and Machine Learning …, 2019 | 131 | 2019 |
| Detecting malicious accounts on the Ethereum blockchain with supervised learning N Kumar, A Singh, A Handa, SK Shukla International symposium on cyber security cryptography and machine learning …, 2020 | 89 | 2020 |
| Malware classification using early stage behavioral analysis N Kumar, S Mukhopadhyay, M Gupta, A Handa, SK Shukla 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 16-23, 2019 | 41 | 2019 |
| Evading API call sequence based malware classifiers F Fadadu, A Handa, N Kumar, SK Shukla International Conference on Information and Communications Security, 18-33, 2019 | 38 | 2019 |
| An insecurity study of ethereum smart contracts BC Gupta, N Kumar, A Handa, SK Shukla International Conference on Security, Privacy, and Applied Cryptography …, 2020 | 20 | 2020 |
| Automated windows behavioral tracing for malware analysis S Rana, N Kumar, A Handa, SK Shukla Security and Privacy 5 (6), e253, 2022 | 14 | 2022 |
| Automated classification of web-application attacks for intrusion detection H Bhagwani, R Negi, AK Dutta, A Handa, N Kumar, SK Shukla International Conference on Security, Privacy, and Applied Cryptography …, 2019 | 13 | 2019 |
| Genetic diversity and population structure of Leucaena leucocephala (Lam.) de Wit genotypes using molecular and morphological attributes K Rajarajan, AR Uthappa, AK Handa, SB Chavan, R Vishnu, ... Genetic Resources and Crop Evolution 69 (1), 71-83, 2022 | 10 | 2022 |
| Static ransomware analysis using machine learning and deep learning models K Gaur, N Kumar, A Handa, SK Shukla International Conference on Advances in Cyber Security, 450-467, 2020 | 9 | 2020 |
| Adversaries strike hard: Adversarial attacks against malware classifiers using dynamic api calls as features Hariom, A Handa, N Kumar, S Kumar Shukla International Symposium on Cyber Security Cryptography and Machine Learning …, 2021 | 8 | 2021 |
| PeerClear: Peer-to-peer bot-net detection A Kumar, N Kumar, A Handa, SK Shukla International Symposium on Cyber Security Cryptography and Machine Learning …, 2019 | 8 | 2019 |
| Using well logs to infer permeability N Kumar, N Hughes, M Scott Center for Applied Petrophysical Studies, Texas Tech University, 2000 | 7 | 2000 |
| Malware detection in word documents using machine learning R Khan, N Kumar, A Handa, SK Shukla International Conference on Advances in Cyber Security, 325-339, 2020 | 6 | 2020 |
| Malware analysis using image classification techniques A Singh, A Handa, N Kumar, SK Shukla Cyber Security in India: Education, Research and Training, 33-38, 2020 | 6 | 2020 |
| Evading malware classifiers using RL agent with action-mask S Pandey, N Kumar, A Handa, SK Shukla International Journal of Information Security 22 (6), 1743-1763, 2023 | 5 | 2023 |
| Cyber risk assessment of networked cyber assets using probabilistic model checking A Handa, S Mukhopadhyay, S Mallick, N Kumar, SK Shukla, RL Minz, ... 2019 IEEE Conference on Information and Communication Technology, 1-6, 2019 | 5 | 2019 |
| Corrosion behaviour of stainless steel grade 304 in 1 M HCl A Kumar, N Kumar, AK Singh, G Das Int. J. Innov. Res. Dev 3, 340, 2014 | 5 | 2014 |
| Ransomware detection based on network behavior using machine learning and hidden markov model with gaussian emission A Srivastava, N Kumar, A Handa, SK Shukla 2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023 | 4 | 2023 |
| AProctor-A practical on-device antidote for Android malware A Patel, N Kumar, A Handa, S K Shukla Proceedings of the 2023 Australasian Computer Science Week, 82-91, 2023 | 4 | 2023 |
| A review: malware analysis work at IIT Kanpur A Kumar, M Gupta, G Kumar, A Handa, N Kumar, SK Shukla Cyber Security in India: Education, Research and Training, 39-48, 2020 | 4 | 2020 |