Zero click attacks–a new cyber threat for the e-banking sector N Tn, M Shailendra Kulkarni Journal of Financial Crime 30 (5), 1150-1161, 2023 | 8 | 2023 |
Challenges in single sign-on P Pandey, TN Nisha Journal of Physics: Conference Series 1964 (4), 042016, 2021 | 8 | 2021 |
Best practices for ensuring security in devops: A case study approach R Desai, TN Nisha Journal of Physics: Conference Series 1964 (4), 042045, 2021 | 6 | 2021 |
Business E-mail Compromise—Techniques and Countermeasures TN Nisha, D Bakari, C Shukla 2021 International Conference on Advance Computing and Innovative …, 2021 | 6 | 2021 |
Sequential pattern analysis for event-based intrusion detection TN Nisha, D Pramod International Journal of Information and Computer Security 11 (4-5), 476-492, 2019 | 5 | 2019 |
Migration from DevOps to DevSecOps: A complete migration framework, challenges, and evaluation TN Nisha, A Khandebharad International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-15, 2022 | 4 | 2022 |
Insider Intrusion Detection Techniques: A State-of-the-Art Review N TN, D Pramod Journal of Computer Information Systems 64 (1), 106-123, 2024 | 3 | 2024 |
Digital transformation strategy of business models: A framework approach in improving the traditional business model of software industry P Yadav, TN Nisha AIP Conference Proceedings 2519 (1), 2022 | 2 | 2022 |
APPEARS Framework for evaluating Gamified Cyber Security Awareness Training A Birajdar, TN Nisha 2022 International Conference on Computing, Communication, Security and …, 2022 | 2 | 2022 |
A Conceptual Framework for Secure Cloud Migration S Ahuja, TN Nisha Journal of Physics: Conference Series 1964 (4), 042008, 2021 | 2 | 2021 |
Moving from Detection Centric to Prevention Centric Security Using Automation: A Survey RVS Sravanthi, TN Nisha Journal of Physics: Conference Series 1964 (4), 042048, 2021 | 2 | 2021 |
Zero trust security model: Defining new boundaries to organizational network N TN, D Pramod, R Singh Proceedings of the 2023 Fifteenth International Conference on Contemporary …, 2023 | 1 | 2023 |
Next generation proactive cyber threat hunting-A complete framework S Chakraborty, TN Nisha AIP Conference Proceedings 2519 (1), 2022 | 1 | 2022 |
Sequential event-based detection of network attacks on CSE CIC IDS 2018 data set–Application of GSP and IPAM Algorithm TN Nisha, D Pramod 2022 International Conference on Computing, Communication, Security and …, 2022 | 1 | 2022 |
Conceptual framework for adaptive access and identity management S Extros, TN Nisha AIP Conference Proceedings 2914 (1), 2023 | | 2023 |
Comparative study of the phases of ethical hacking and the phases of cyber kill chain R Verma, TN Nisha AIP Conference Proceedings 2523 (1), 2023 | | 2023 |
Cyborgs: Is it sci-fi or nearest future S Sangam, TN Nisha AIP Conference Proceedings 2523 (1), 2023 | | 2023 |
Security operation center and its future advancements S Srivastava, TN Nisha AIP Conference Proceedings 2519 (1), 2022 | | 2022 |
Green cloud computing and the significance of IT organizations to consider total cost to environment H Sukkala, TN Nisha AIP Conference Proceedings 2519 (1), 2022 | | 2022 |
Assessment of Attribution in Cyber Deterrence: A Fuzzy Entropy Approach TN Nisha, P Sen Congress on Intelligent Systems: Proceedings of CIS 2021, Volume 2, 97-105, 2022 | | 2022 |