Ensemble learning for detection of malicious content embedded in PDF documents

Hiran V Nath , B M Mehtre
international conference on signal processing 1 -5

4
2015
Video files and multistage attacks: (Im)possible?

Hiran V Nath , B M Mehtre
ieee india conference 1 -5

2014
A survey of zero-day malware attacks and its detection methodology

Kiran Radhakrishnan , Rajeev R Menon , Hiran V Nath
ieee region 10 conference 533 -539

2
2019
Blockchain-enabled beer game: a software tool for familiarizing the application of blockchain in supply chain management

Justin Sunny , V Madhusudanan Pillai , Hiran V Nath , Kenil Shah
Industrial Management \& Data Systems 122 ( 4) 1025 -1055

2
2022
Blockchain technology: a troubleshooter for blood cold chains

Dinith Asokan , Justin Sunny , V Madhusudanan Pillai , Hiran V Nath
Journal of Global Operations and Strategic Sourcing 15 ( 3) 316 -344

3
2022
Low budget honeynet creation and implementation for Nids and Nips

KS Aathira , Hiran V Nath , Thulasi N Kutty , KT Gireesh
Int. J. Comput. Netw. Secur.(IJCNS) 2 ( 8) 27 -32

3
2010
A distortion free relational database watermarking using patch work method

R Arun , K Praveen , Divya Chandra Bose , Hiran V Nath
Proceedings of the International Conference on Information Systems Design and Intelligent Applications 2012 (INDIA 2012) held in Visakhapatnam, India, January 2012 531 -538

13
2012
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges

Renya Nath , Hiran V Nath
Computers and Electrical Engineering 100 107997 -107997

28
2022
A survey on ransomware detection techniques

CV Bijitha , Rohit Sukumaran , Hiran V Nath
Secure Knowledge Management In Artificial Intelligence Era: 8th International Conference, SKM 2019, Goa, India, December 21–22, 2019, Proceedings 8 55 -68

27
2020
On the effectiveness of image processing based malware detection techniques

CV Bijitha , Hiran V Nath
Cybernetics and Systems 53 ( 7) 615 -640

18
2022
Analysis of a Multistage Attack Embedded in a Video File

Hiran V Nath , BM Mehtre
International Conference on Secure Knowledge Management in Bigdata era 2014 (SKM 2014), BITS Pilani, Dubai Campus, Dubai, UAE, 8th-9th Dec 2014

6
2014
Blockchain: A Makeover to Supply Chain Management

Justin Sunny , Kenil Shah , Prajwal Ghoradkar , Manu Jose
Springer Nature Singapore 351 -363

3
2022
A hybrid method for analysis and detection of malicious executables in IoT network

Singam Sai Bala Subrahmanyam , P Goutham , Vasanth Kumar Reddy Ambati , CV Bijitha
Computers & Security 132 103339 -103339

1
2023
Blockchain-Based Decentralized Information Sharing for Supply Chain Management

Justin Sunny , V Madhusudanan Pillai , Hiran V Nath
IGI Global 74 -93

2023
Critical Analysis of IoT Ecosystem to Understand Security Threats and Challenges

N Renya Nath , Hiran V Nath
Springer International Publishing 64 -74

2021
Vulnerability Assessment Methods – A Review

Hiran V. Nath
International Conference on Network Security and Applications 1 -10

2
2011
Static Malware Analysis Using Machine Learning Methods

Hiran V. Nath , Babu M. Mehtre
International Conference on Security in Computer Networks and Distributed Systems 440 -450

121
2014
Steganalysis for Calibrated and Lower Embedded Uncalibrated Images

Deepa D. Shankar , T. Gireeshkumar , Hiran V. Nath
Swarm, Evolutionary, and Memetic Computing 294 -301

3
2011
12
2018