Follow
Hiran V Nath (Hiran Viswanath)
Hiran V Nath (Hiran Viswanath)
Verified email at nitc.ac.in - Homepage
Title
Cited by
Cited by
Year
Static malware analysis using machine learning methods
HV Nath, BM Mehtre
Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014
1442014
A survey of zero-day malware attacks and its detection methodology
K Radhakrishnan, RR Menon, HV Nath
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 533-539, 2019
292019
A survey on ransomware detection techniques
CV Bijitha, R Sukumaran, HV Nath
Secure Knowledge Management In Artificial Intelligence Era: 8th …, 2020
282020
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
R Nath, HV Nath
Computers and Electrical Engineering 100, 107997, 2022
202022
Blockchain-enabled beer game: a software tool for familiarizing the application of blockchain in supply chain management
J Sunny, VM Pillai, HV Nath, K Shah, PP Ghoradkar, MJ Philip, ...
Industrial management & data systems 122 (4), 1025-1055, 2022
142022
Ensemble learning for detection of malicious content embedded in PDF documents
HV Nath, BM Mehtre
2015 IEEE International conference on signal processing, informatics …, 2015
132015
A distortion free relational database watermarking using patch work method
R Arun, K Praveen, D Chandra Bose, HV Nath
Proceedings of the International Conference on Information Systems Design …, 2012
132012
Vulnerability assessment methods–a review
HV Nath
Advances in Network Security and Applications: 4th International Conference …, 2011
132011
On the effectiveness of image processing based malware detection techniques
CV Bijitha, HV Nath
Cybernetics and Systems 53 (7), 615-640, 2022
122022
System and method for zero-day privilege escalation malware detection
H Viswanath, BM Mehtre
US Patent 20170161495A1, 2017
122017
Blockchain technology: a troubleshooter for blood cold chains
D Asokan, J Sunny, VM Pillai, HV Nath
Journal of Global Operations and Strategic Sourcing 15 (3), 316-344, 2022
102022
Analysis of a Multistage Attack Embedded in a Video File
HV Nath, BM Mehtre
International Conference on Secure Knowledge Management in Bigdata era 2014 …, 2014
62014
Steganalysis for calibrated and lower embedded uncalibrated images
DD Shankar, T Gireeshkumar, HV Nath
Swarm, Evolutionary, and Memetic Computing: Second International Conference …, 2011
52011
System and method for detection and prevention of data breach and ransomware attacks
H Viswanath, BM Mehtre
US Patent 10,262,139, 2019
42019
Reconciliation engine and metric for network vulnerability assessment
HV Nath, K Gangadharan, M Sethumadhavan
Proceedings of the First International Conference on Security of Internet of …, 2012
42012
Blockchain: A Makeover to Supply Chain Management
J Sunny, K Shah, P Ghoradkar, M Jose, M Shirswar, HV Nath, VM Pillai
Recent Advances in Operations Management Applications: Select Proceedings of …, 2022
32022
Low budget honeynet creation and implementation for Nids and Nips
KS Aathira, HV Nath, TN Kutty, KT Gireesh
Int. J. Comput. Netw. Secur.(IJCNS) 2 (8), 27-32, 2010
32010
A hybrid method for analysis and detection of malicious executables in IoT network
SSB Subrahmanyam, P Goutham, VKR Ambati, CV Bijitha, HV Nath
Computers & Security 132, 103339, 2023
12023
Novel Approaches for Surveillance of Advanced Persistent Threats
HV Nath
Hyderabad, 2017
12017
Video files and multistage attacks:(Im) possible?
HV Nath, BM Mehtre
2014 Annual IEEE India Conference (INDICON), 1-5, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20