[go: up one dir, main page]

Follow
Nitesh Kumar
Nitesh Kumar
Senior Project Engineer, C3i Center, IIT Kanpur
Verified email at cse.iitk.ac.in
Title
Cited by
Cited by
Year
Malware classification using image representation
A Singh, A Handa, N Kumar, SK Shukla
International Symposium on Cyber Security Cryptography and Machine Learning …, 2019
1312019
Detecting malicious accounts on the Ethereum blockchain with supervised learning
N Kumar, A Singh, A Handa, SK Shukla
International symposium on cyber security cryptography and machine learning …, 2020
892020
Malware classification using early stage behavioral analysis
N Kumar, S Mukhopadhyay, M Gupta, A Handa, SK Shukla
2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 16-23, 2019
412019
Evading API call sequence based malware classifiers
F Fadadu, A Handa, N Kumar, SK Shukla
International Conference on Information and Communications Security, 18-33, 2019
382019
An insecurity study of ethereum smart contracts
BC Gupta, N Kumar, A Handa, SK Shukla
International Conference on Security, Privacy, and Applied Cryptography …, 2020
202020
Automated windows behavioral tracing for malware analysis
S Rana, N Kumar, A Handa, SK Shukla
Security and Privacy 5 (6), e253, 2022
142022
Automated classification of web-application attacks for intrusion detection
H Bhagwani, R Negi, AK Dutta, A Handa, N Kumar, SK Shukla
International Conference on Security, Privacy, and Applied Cryptography …, 2019
132019
Genetic diversity and population structure of Leucaena leucocephala (Lam.) de Wit genotypes using molecular and morphological attributes
K Rajarajan, AR Uthappa, AK Handa, SB Chavan, R Vishnu, ...
Genetic Resources and Crop Evolution 69 (1), 71-83, 2022
102022
Static ransomware analysis using machine learning and deep learning models
K Gaur, N Kumar, A Handa, SK Shukla
International Conference on Advances in Cyber Security, 450-467, 2020
92020
Adversaries strike hard: Adversarial attacks against malware classifiers using dynamic api calls as features
Hariom, A Handa, N Kumar, S Kumar Shukla
International Symposium on Cyber Security Cryptography and Machine Learning …, 2021
82021
PeerClear: Peer-to-peer bot-net detection
A Kumar, N Kumar, A Handa, SK Shukla
International Symposium on Cyber Security Cryptography and Machine Learning …, 2019
82019
Using well logs to infer permeability
N Kumar, N Hughes, M Scott
Center for Applied Petrophysical Studies, Texas Tech University, 2000
72000
Malware detection in word documents using machine learning
R Khan, N Kumar, A Handa, SK Shukla
International Conference on Advances in Cyber Security, 325-339, 2020
62020
Malware analysis using image classification techniques
A Singh, A Handa, N Kumar, SK Shukla
Cyber Security in India: Education, Research and Training, 33-38, 2020
62020
Evading malware classifiers using RL agent with action-mask
S Pandey, N Kumar, A Handa, SK Shukla
International Journal of Information Security 22 (6), 1743-1763, 2023
52023
Cyber risk assessment of networked cyber assets using probabilistic model checking
A Handa, S Mukhopadhyay, S Mallick, N Kumar, SK Shukla, RL Minz, ...
2019 IEEE Conference on Information and Communication Technology, 1-6, 2019
52019
Corrosion behaviour of stainless steel grade 304 in 1 M HCl
A Kumar, N Kumar, AK Singh, G Das
Int. J. Innov. Res. Dev 3, 340, 2014
52014
Ransomware detection based on network behavior using machine learning and hidden markov model with gaussian emission
A Srivastava, N Kumar, A Handa, SK Shukla
2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023
42023
AProctor-A practical on-device antidote for Android malware
A Patel, N Kumar, A Handa, S K Shukla
Proceedings of the 2023 Australasian Computer Science Week, 82-91, 2023
42023
A review: malware analysis work at IIT Kanpur
A Kumar, M Gupta, G Kumar, A Handa, N Kumar, SK Shukla
Cyber Security in India: Education, Research and Training, 39-48, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20