Follow
Hrushikesh Chunduri
Title
Cited by
Cited by
Year
From text to mitre techniques: Exploring the malicious use of large language models for generating cyber attack payloads
PV Charan, H Chunduri, PM Anand, SK Shukla
arXiv preprint arXiv:2305.15336, 2023
262023
A Multi Class Classification for Detection of IoT Botnet Malware
H Chunduri, T Gireesh Kumar, PVS Charan
Computing Science, Communication and Security: Second International …, 2021
162021
DOTMUG: a threat model for target specific APT attacks–misusing google teachable machine
PVS Charan, PM Anand, SK Shukla, N Selvan, H Chunduri
2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-8, 2022
82022
A Framework for Advanced Persistent Threat Attribution using Zachman Ontology
VSC Putrevu, H Chunduri, MA Putrevu, S Shukla
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference …, 2023
32023
A forensic analysis on the availability of MQTT network traffic
NVH Chunduri, AK Mohan
Security in Computing and Communications: 8th International Symposium, SSCC …, 2021
32021
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
PVS Charan, G Ratnakaram, H Chunduri, PM Anand, SK Shukla
Computers & Security 132, 103329, 2023
22023
RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files
PM Anand, PVS Charan, H Chunduri, SK Shukla
International Conference on Information Security Practice and Experience …, 2023
12023
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats
PVS Charan, S Mukhopadhyay, S Manna, N Rani, A Vaid, H Chunduri, ...
Digital Threats: Research and Practice, 0
The system can't perform the operation now. Try again later.
Articles 1–8