Hiran V Nath (Hiran Viswanath)
Hiran V Nath (Hiran Viswanath)
Verified email at nitc.ac.in - Homepage
Cited by
Cited by
Static malware analysis using machine learning methods
HV Nath, BM Mehtre
International Conference on Security in Computer Networks and Distributed …, 2014
A distortion free relational database watermarking using patch work method
R Arun, K Praveen, DC Bose, HV Nath
Proceedings of the International Conference on Information Systems Design …, 2012
System and method for zero-day privilege escalation malware detection
H Viswanath, BM Mehtre
US Patent 20170161495A1, 2017
Ensemble learning for detection of malicious content embedded in PDF documents
HV Nath, BM Mehtre
2015 IEEE International Conference on Signal Processing, Informatics …, 2015
Analysis of a Multistage Attack Embedded in a Video File
HV Nath, BM Mehtre
International Conference on Secure Knowledge Management in Bigdata era 2014 …, 2014
Vulnerability Assessment Methods–A Review
HV Nath
International Conference on Network Security and Applications, 1-10, 2011
Steganalysis for calibrated and lower embedded uncalibrated images
DD Shankar, T Gireeshkumar, HV Nath
International Conference on Swarm, Evolutionary, and Memetic Computing, 294-301, 2011
Reconciliation engine and metric for network vulnerability assessment
HV Nath, K Gangadharan, M Sethumadhavan
Proceedings of the First International Conference on Security of Internet of …, 2012
Low budget honeynet creation and implementation for Nids and Nips
KS Aathira, HV Nath, TN Kutty, KT Gireesh
Int. J. Comput. Netw. Secur.(IJCNS) 2 (8), 27-32, 2010
A Survey on Ransomware Detection Techniques
CV Bijitha, R Sukumaran, HV Nath
International Conference On Secure Knowledge Management In Artificial …, 2019
A survey of zero-day malware attacks and its detection methodology
K Radhakrishnan, RR Menon, HV Nath
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 533-539, 2019
System and method for detection and prevention of data breach and ransomware attacks
H Viswanath, BM Mehtre
US Patent 10,262,139, 2019
Video files and multistage attacks:(Im) possible?
HV Nath, BM Mehtre
2014 Annual IEEE India Conference (INDICON), 1-5, 2014
The system can't perform the operation now. Try again later.
Articles 1–13