Follow
Hiran V Nath (Hiran Viswanath)
Hiran V Nath (Hiran Viswanath)
Verified email at nitc.ac.in - Homepage
Title
Cited by
Cited by
Year
Static malware analysis using machine learning methods
HV Nath, BM Mehtre
Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014
1452014
A survey of zero-day malware attacks and its detection methodology
K Radhakrishnan, RR Menon, HV Nath
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 533-539, 2019
292019
A survey on ransomware detection techniques
CV Bijitha, R Sukumaran, HV Nath
Secure Knowledge Management In Artificial Intelligence Era: 8th …, 2020
282020
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
R Nath, HV Nath
Computers and Electrical Engineering 100, 107997, 2022
202022
Blockchain-enabled beer game: a software tool for familiarizing the application of blockchain in supply chain management
J Sunny, VM Pillai, HV Nath, K Shah, PP Ghoradkar, MJ Philip, ...
Industrial management & data systems 122 (4), 1025-1055, 2022
152022
Ensemble learning for detection of malicious content embedded in PDF documents
HV Nath, BM Mehtre
2015 IEEE International conference on signal processing, informatics …, 2015
132015
A distortion free relational database watermarking using patch work method
R Arun, K Praveen, D Chandra Bose, HV Nath
Proceedings of the International Conference on Information Systems Design …, 2012
132012
Vulnerability assessment methods–a review
HV Nath
Advances in Network Security and Applications: 4th International Conference …, 2011
132011
On the effectiveness of image processing based malware detection techniques
CV Bijitha, HV Nath
Cybernetics and Systems 53 (7), 615-640, 2022
122022
System and method for zero-day privilege escalation malware detection
H Viswanath, BM Mehtre
US Patent 20170161495A1, 2017
122017
Blockchain technology: a troubleshooter for blood cold chains
D Asokan, J Sunny, VM Pillai, HV Nath
Journal of Global Operations and Strategic Sourcing 15 (3), 316-344, 2022
102022
Analysis of a Multistage Attack Embedded in a Video File
HV Nath, BM Mehtre
International Conference on Secure Knowledge Management in Bigdata era 2014 …, 2014
62014
System and method for detection and prevention of data breach and ransomware attacks
H Viswanath, BM Mehtre
US Patent 10,262,139, 2019
52019
Steganalysis for calibrated and lower embedded uncalibrated images
DD Shankar, T Gireeshkumar, HV Nath
Swarm, Evolutionary, and Memetic Computing: Second International Conference …, 2011
52011
Reconciliation engine and metric for network vulnerability assessment
HV Nath, K Gangadharan, M Sethumadhavan
Proceedings of the First International Conference on Security of Internet of …, 2012
42012
Blockchain: A Makeover to Supply Chain Management
J Sunny, K Shah, P Ghoradkar, M Jose, M Shirswar, HV Nath, VM Pillai
Recent Advances in Operations Management Applications: Select Proceedings of …, 2022
32022
Low budget honeynet creation and implementation for Nids and Nips
KS Aathira, HV Nath, TN Kutty, KT Gireesh
Int. J. Comput. Netw. Secur.(IJCNS) 2 (8), 27-32, 2010
32010
A hybrid method for analysis and detection of malicious executables in IoT network
SSB Subrahmanyam, P Goutham, VKR Ambati, CV Bijitha, HV Nath
Computers & Security 132, 103339, 2023
12023
Novel Approaches for Surveillance of Advanced Persistent Threats
HV Nath
Hyderabad, 2017
12017
Video files and multistage attacks:(Im) possible?
HV Nath, BM Mehtre
2014 Annual IEEE India Conference (INDICON), 1-5, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20