Follow
Nisha TN
Nisha TN
Asst Professor, Symbiosis Centre for Information Technology
Verified email at scit.edu
Title
Cited by
Cited by
Year
Zero click attacks–a new cyber threat for the e-banking sector
N Tn, M Shailendra Kulkarni
Journal of Financial Crime 30 (5), 1150-1161, 2023
82023
Challenges in single sign-on
P Pandey, TN Nisha
Journal of Physics: Conference Series 1964 (4), 042016, 2021
82021
Best practices for ensuring security in devops: A case study approach
R Desai, TN Nisha
Journal of Physics: Conference Series 1964 (4), 042045, 2021
62021
Business E-mail Compromise—Techniques and Countermeasures
TN Nisha, D Bakari, C Shukla
2021 International Conference on Advance Computing and Innovative …, 2021
62021
Sequential pattern analysis for event-based intrusion detection
TN Nisha, D Pramod
International Journal of Information and Computer Security 11 (4-5), 476-492, 2019
52019
Migration from DevOps to DevSecOps: A complete migration framework, challenges, and evaluation
TN Nisha, A Khandebharad
International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-15, 2022
42022
Insider Intrusion Detection Techniques: A State-of-the-Art Review
N TN, D Pramod
Journal of Computer Information Systems 64 (1), 106-123, 2024
32024
Digital transformation strategy of business models: A framework approach in improving the traditional business model of software industry
P Yadav, TN Nisha
AIP Conference Proceedings 2519 (1), 2022
22022
APPEARS Framework for evaluating Gamified Cyber Security Awareness Training
A Birajdar, TN Nisha
2022 International Conference on Computing, Communication, Security and …, 2022
22022
A Conceptual Framework for Secure Cloud Migration
S Ahuja, TN Nisha
Journal of Physics: Conference Series 1964 (4), 042008, 2021
22021
Moving from Detection Centric to Prevention Centric Security Using Automation: A Survey
RVS Sravanthi, TN Nisha
Journal of Physics: Conference Series 1964 (4), 042048, 2021
22021
Zero trust security model: Defining new boundaries to organizational network
N TN, D Pramod, R Singh
Proceedings of the 2023 Fifteenth International Conference on Contemporary …, 2023
12023
Next generation proactive cyber threat hunting-A complete framework
S Chakraborty, TN Nisha
AIP Conference Proceedings 2519 (1), 2022
12022
Sequential event-based detection of network attacks on CSE CIC IDS 2018 data set–Application of GSP and IPAM Algorithm
TN Nisha, D Pramod
2022 International Conference on Computing, Communication, Security and …, 2022
12022
Conceptual framework for adaptive access and identity management
S Extros, TN Nisha
AIP Conference Proceedings 2914 (1), 2023
2023
Comparative study of the phases of ethical hacking and the phases of cyber kill chain
R Verma, TN Nisha
AIP Conference Proceedings 2523 (1), 2023
2023
Cyborgs: Is it sci-fi or nearest future
S Sangam, TN Nisha
AIP Conference Proceedings 2523 (1), 2023
2023
Security operation center and its future advancements
S Srivastava, TN Nisha
AIP Conference Proceedings 2519 (1), 2022
2022
Green cloud computing and the significance of IT organizations to consider total cost to environment
H Sukkala, TN Nisha
AIP Conference Proceedings 2519 (1), 2022
2022
Assessment of Attribution in Cyber Deterrence: A Fuzzy Entropy Approach
TN Nisha, P Sen
Congress on Intelligent Systems: Proceedings of CIS 2021, Volume 2, 97-105, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20