Follow
Pranshu Bajpai
Title
Cited by
Cited by
Year
A key-management-based taxonomy for ransomware
P Bajpai, AK Sood, R Enbody
APWG Symposium on Electronic Crime Research (eCrime), 2018, 1-12, 2018
592018
The Art of Mapping IoT Devices in Networks
P Bajpai, AK Sood, RJ Enbody
Network Security 2018 (4), 8 - 15, 2018
282018
Attacking key management in ransomware
P Bajpai, R Enbody
IT Professional 22 (2), 21-27, 2020
262020
Ransomware targeting automobiles
P Bajpai, R Enbody, BHC Cheng
Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle …, 2020
212020
Memory forensics against ransomware
P Bajpai, R Enbody
2020 International Conference on Cyber Security and Protection of Digital …, 2020
192020
Dissecting .NET ransomware: key generation, encryption and operation
P Bajpai, R Enbody
Network Security 2020 (2), 8-14, 2020
182020
An empirical study of key generation in cryptographic ransomware
P Bajpai, R Enbody
2020 International Conference on Cyber Security and Protection of Digital …, 2020
162020
An empirical study of api calls in ransomware
P Bajpai, R Enbody
2020 IEEE International Conference on Electro Information Technology (EIT …, 2020
82020
Preparing smart cities for ransomware attacks
P Bajpai, R Enbody
2020 3rd International Conference on Data Intelligence and Security (ICDIS …, 2020
82020
Towards effective identification and rating of automotive vulnerabilities
P Bajpai, R Enbody
Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle …, 2020
62020
Know thy ransomware response: a detailed framework for devising effective ransomware response strategies
P Bajpai, R Enbody
Digital Threats: Research and Practice 4 (4), 1-19, 2023
52023
Extracting ransomware's keys by utilizing memory forensics
P Bajpai
Michigan State University, 2020
32020
Evidential study of ransomware
AK Sood, P Bajpai, R Enbody
ISACA Journal 5, 2018
32018
Evidential Study of Ransomware: Cryptoviral Infections and Countermeasures
AK Sood, P Bajpai, R Enbody
ISACA Journal 5 (2018), 2018
32018
Secure Development Workflows in CI/CD Pipelines
P Bajpai, A Lewis
2022 IEEE Secure Development Conference (SecDev), 65-66, 2022
22022
BATSense: anomalous security event detection using TBATS machine learning
P Bajpai, T Olsen, S Edgar, R McCurdy, R Enbody
2019 international conference on cyber security and protection of digital …, 2019
12019
Misplaced Trust: The Security Flaw in Modern Code Signing Process
P Bajpai, R Kannavara
2023 IEEE Secure Development Conference (SecDev), 49-50, 2023
2023
The Suitability of RSA for Bulk Data Encryption
P Bajpai, C Carter, D Tarasova, D Ackley, I Masterson, J Schmidt, ...
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
2020
Featured in this issue: Building open source security into agile
P Bajpai, A Sood
Network Security, 2018
2018
2020 3rd International Conference on Data Intelligence and Security (ICDIS)| 978-1-7281-9379-3/20/$31.00© 2020 IEEE| DOI: 10.1109/ICDIS50059. 2020.00027
M Ali, Z Alibhai, H Alvari, K Anagandula, D Andrews, A Aved, P Bajpai, ...
The system can't perform the operation now. Try again later.
Articles 1–20