[go: up one dir, main page]

Follow
NANDA RANI
NANDA RANI
CISPA – Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
TTPHunter: Automated extraction of actionable intelligence as TTPs from narrative threat reports
N Rani, B Saha, V Maurya, SK Shukla
Proceedings of the 2023 australasian computer science week, 126-134, 2023
422023
Ttpxhunter: Actionable threat intelligence extraction as ttps from finished cyber threat reports
N Rani, B Saha, V Maurya, SK Shukla
Digital Threats: Research and Practice 5 (4), 1-19, 2024
35*2024
A survey on machine learning-based ransomware detection
N Rani, SV Dhavale, A Singh, A Mehra
Proceedings of the Seventh International Conference on Mathematics and …, 2022
352022
A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems
N Rani, B Saha, SK Shukla
Journal of Information Security and Applications 92, 104076, 2025
26*2025
Leveraging Machine Learning for Ransomware Detection
N Rani, SV Dhavale
arXiv preprint arxiv:2206.01919, 2022
172022
D-CIPHER: Dynamic Collaborative Intelligent Multi-Agent System with Planner and Heterogeneous Executors for Offensive Security
M Udeshi, M Shao, H Xi, N Rani, K Milner, VSC Putrevu, B Dolan-Gavitt, ...
arXiv preprint arXiv:2502.10931, 2025
9*2025
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats
PVS Charan, S Mukhopadhyay, S Manna, N Rani, A Vaid, H Chunduri, ...
Digital Threats: Research and Practice, 2024
82024
Malxcap: A method for malware capability extraction
B Saha, N Rani, SK Shukla
International Conference on Information Security Practice and Experience …, 2023
82023
CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution
M Shao, H Xi, N Rani, M Udeshi, VSC Putrevu, K Milner, B Dolan-Gavitt, ...
arXiv preprint arXiv:2505.17107, 2025
62025
Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation
B Saha, N Rani, SK Shukla
arXiv preprint arXiv:2504.21574, 2025
62025
Decoding shadows: Towards Tactics, Techniques, and Procedures (TTP)-based Advanced Persistent Threat (APT) attribution
N Rani, B Saha, V Maurya, SK Shukla
Information Security Journal: A Global Perspective, 1-28, 2025
5*2025
Malaware: Automating the comprehension of malicious software behaviours using large language models (llms)
B Saha, N Rani, SK Shukla
2025 IEEE/ACM 22nd International Conference on Mining Software Repositories …, 2025
52025
AURA: A Multi-Agent Intelligence Framework for Knowledge-Enhanced Cyber Threat Attribution
N Rani, SK Shukla
arXiv preprint arXiv:2506.10175, 2025
42025
Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution
N Rani, B Saha, R Kumar, SK Shukla
2024 IEEE 6th International Conference on Trust, Privacy and Security in …, 2024
42024
A generalized unknown malware classification
N Rani, A Mishra, R Kumar, S Ghosh, SK Shukla, P Bagade
International Conference on Security and Privacy in Communication Systems …, 2022
32022
MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT
B Saha, N Rani, SK Shukla
2024 Annual Computer Security Applications Conference Workshops (ACSAC …, 2024
12024
A Comprehensive Survey of Advanced Persistent Threat Attribution
N Rani, B Saha, SK Shukla
AGI-ARTIFICIAL GENERAL INTELLIGENCE-ROBOTICS-SAFETY & ALIGNMENT Учредители …, 2024
12024
RemOD: Operational drift-adaptive intrusion detection
V Maurya, N Rani, SK Shukla
International Conference on Security, Privacy, and Applied Cryptography …, 2022
12022
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families
A Vitale, S Aonzo, S Dambra, N Rani, L Ippolito, P Kotzias, J Caballero, ...
European Symposium on Research in Computer Security, 505-525, 2025
2025
System and method for adaptive deception orchestration
PVS Charan, S Mukhopadhyay, S Manna, SK Shukla, N Rani, A Vaid, ...
US Patent App. 18/786,811, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–20