A key-management-based taxonomy for ransomware P Bajpai, AK Sood, R Enbody APWG Symposium on Electronic Crime Research (eCrime), 2018, 1-12, 2018 | 58 | 2018 |
The Art of Mapping IoT Devices in Networks P Bajpai, AK Sood, RJ Enbody Network Security 2018 (4), 8 - 15, 2018 | 28 | 2018 |
Attacking key management in ransomware P Bajpai, R Enbody IT Professional 22 (2), 21-27, 2020 | 26 | 2020 |
Ransomware targeting automobiles P Bajpai, R Enbody, BHC Cheng Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle …, 2020 | 21 | 2020 |
Memory forensics against ransomware P Bajpai, R Enbody 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 19 | 2020 |
Dissecting .NET ransomware: key generation, encryption and operation P Bajpai, R Enbody Network Security 2020 (2), 8-14, 2020 | 18 | 2020 |
An empirical study of key generation in cryptographic ransomware P Bajpai, R Enbody 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 15 | 2020 |
An empirical study of api calls in ransomware P Bajpai, R Enbody 2020 IEEE International Conference on Electro Information Technology (EIT …, 2020 | 8 | 2020 |
Preparing smart cities for ransomware attacks P Bajpai, R Enbody 2020 3rd International Conference on Data Intelligence and Security (ICDIS …, 2020 | 8 | 2020 |
Towards effective identification and rating of automotive vulnerabilities P Bajpai, R Enbody Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle …, 2020 | 6 | 2020 |
Know thy ransomware response: a detailed framework for devising effective ransomware response strategies P Bajpai, R Enbody Digital Threats: Research and Practice 4 (4), 1-19, 2023 | 4 | 2023 |
Extracting ransomware's keys by utilizing memory forensics P Bajpai Michigan State University, 2020 | 3 | 2020 |
Evidential study of ransomware AK Sood, P Bajpai, R Enbody ISACA Journal 5, 2018 | 3 | 2018 |
Evidential Study of Ransomware: Cryptoviral Infections and Countermeasures AK Sood, P Bajpai, R Enbody ISACA Journal 5 (2018), 2018 | 3 | 2018 |
Secure Development Workflows in CI/CD Pipelines P Bajpai, A Lewis 2022 IEEE Secure Development Conference (SecDev), 65-66, 2022 | 2 | 2022 |
BATSense: anomalous security event detection using TBATS machine learning P Bajpai, T Olsen, S Edgar, R McCurdy, R Enbody 2019 international conference on cyber security and protection of digital …, 2019 | 1 | 2019 |
Misplaced Trust: The Security Flaw in Modern Code Signing Process P Bajpai, R Kannavara 2023 IEEE Secure Development Conference (SecDev), 49-50, 2023 | | 2023 |
The Suitability of RSA for Bulk Data Encryption P Bajpai, C Carter, D Tarasova, D Ackley, I Masterson, J Schmidt, ... 2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020 | | 2020 |
Featured in this issue: Building open source security into agile P Bajpai, A Sood Network Security, 2018 | | 2018 |
2020 3rd International Conference on Data Intelligence and Security (ICDIS)| 978-1-7281-9379-3/20/$31.00© 2020 IEEE| DOI: 10.1109/ICDIS50059. 2020.00027 M Ali, Z Alibhai, H Alvari, K Anagandula, D Andrews, A Aved, P Bajpai, ... | | |