Sachidananda, Vinay
24  results:
Search for persons X
?
1

Honey-Gauge: Enabling User-Centric Honeypot Classification:

, In: Communications in Computer and Information Science; Ubiquitous Security,
 
?
2

Do NoT Open (DOT): A Unified Generic and Specialized Models..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
 
?
3

ThreatLand: Extracting Intelligence from Audit Logs via NLP..:

, In: 2023 20th Annual International Conference on Privacy, Security and Trust (PST),
 
?
4

Hiatus: Unsupervised Generative Approach for Detection of D..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks,
 
?
5

FOCUS: Fatigue-Reducing IOCs Through Prioritization and Sco..:

, In: 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech),
Sachidananda, Vinay ; Teo, Bryson ; Feng, Ruitao.. - p. 0020-0027 , 2023
 
?
6

APTer: Towards the Investigation of APT Attribution:

, In: 2023 IEEE Conference on Dependable and Secure Computing (DSC),
 
?
8

Peekaboo: Hide and Seek with Malware Through Lightweight Mu..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Liu, Mingchang ; Sachidananda, Vinay ; Peng, Hongyi... - p. 525-545 , 2022
 
?
9

ODDITY: An Ensemble Framework Leverages Contrastive Represe..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Peng, Hongyi ; Sachidananda, Vinay ; Lim, Teng Joon... - p. 417-437 , 2022
 
?
10

LOG-OFF: A Novel Behavior Based Authentication Compromise D..:

, In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST),
 
?
13

OVER : overhauling vulnerability detection for iot throu..:

, In: Proceedings of the 35th Annual ACM Symposium on Applied Computing,
 
?
14

SMuF: State Machine Based Mutational Fuzzing Framework for ..:

, In: Critical Information Infrastructures Security; Lecture Notes in Computer Science,
 
?
15

Let the Cat Out of the Bag : A Holistic Approach Towards..:

, In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security,
 
1-15