Sandeep K. Shukla
YOU?
Author Swipe
View article: Vulnerabilities in Machine Learning for cybersecurity: Current trends and future research directions
Vulnerabilities in Machine Learning for cybersecurity: Current trends and future research directions Open
View article: A HYBRID QUANTUM-INSPIRED EVOLUTIONARY ALGORITHM FOR OPTIMIZING CROSS-LAYER DESIGN IN LOW-POWER WIDE-AREA NETWORKS
A HYBRID QUANTUM-INSPIRED EVOLUTIONARY ALGORITHM FOR OPTIMIZING CROSS-LAYER DESIGN IN LOW-POWER WIDE-AREA NETWORKS Open
The proliferation of Internet of Things (IoT) devices necessitates efficient communication protocols for Low-Power Wide-Area Networks (LPWANs). Traditional layered network architectures often lead to sub-optimal performance due to isolated…
View article: Constrained Adversarial Perturbation
Constrained Adversarial Perturbation Open
Deep neural networks have achieved remarkable success in a wide range of classification tasks. However, they remain highly susceptible to adversarial examples - inputs that are subtly perturbed to induce misclassification while appearing u…
View article: Towards Effective Offensive Security LLM Agents: Hyperparameter Tuning, LLM as a Judge, and a Lightweight CTF Benchmark
Towards Effective Offensive Security LLM Agents: Hyperparameter Tuning, LLM as a Judge, and a Lightweight CTF Benchmark Open
Recent advances in LLM agentic systems have improved the automation of offensive security tasks, particularly for Capture the Flag (CTF) challenges. We systematically investigate the key factors that drive agent success and provide a detai…
View article: Trust and cybersecurity in digital payment adoption: socioeconomic insights from India
Trust and cybersecurity in digital payment adoption: socioeconomic insights from India Open
Purpose This study examines the behavioral and contextual determinants influencing digital payment trust and perceived cybersecurity (DPTS) in India, focusing on the roles of ease of use, perceived benefits, social influence and grievance …
View article: AI-Driven Skin Cancer Detection for Early Intervention using Deep Learning
AI-Driven Skin Cancer Detection for Early Intervention using Deep Learning Open
Skin cancer is a significant global health issue, with increasing incidence rates posing a challenge to healthcare systems. This research presents an AI-driven system for skin cancer detection and patient prioritization, aimed at addressin…
View article: D-CIPHER: Dynamic Collaborative Intelligent Multi-Agent System with Planner and Heterogeneous Executors for Offensive Security
D-CIPHER: Dynamic Collaborative Intelligent Multi-Agent System with Planner and Heterogeneous Executors for Offensive Security Open
Large Language Models (LLMs) have been used in cybersecurity such as autonomous security analysis or penetration testing. Capture the Flag (CTF) challenges serve as benchmarks to assess automated task-planning abilities of LLM agents for c…
View article: A Hybrid Approach for Intrusion Detection in FTP Logs via Multi-Pattern Feature Engineering
A Hybrid Approach for Intrusion Detection in FTP Logs via Multi-Pattern Feature Engineering Open
View article: A Dummy User Based Privacy Preserving Model for Online and Offline Crowd Mobility Monitoring Applications
A Dummy User Based Privacy Preserving Model for Online and Offline Crowd Mobility Monitoring Applications Open
View article: Investigating the influence of periwinkle shell powder on the thermal and mechanical performance of high-density polyethylene composites
Investigating the influence of periwinkle shell powder on the thermal and mechanical performance of high-density polyethylene composites Open
In this study, the shell powder of Littorina littorea commonly called periwinkle was used as an eco-friendly filler in High-Density Polyethylene (HDPE) to form periwinkle/HDPE composites (PHPC). Understanding the effect of different partic…
View article: Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent Threats
Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent Threats Open
The current state of Advanced Persistent Threats (APT) attribution primarily relies on time-consuming manual processes. These include mapping incident artifacts onto threat attribution frameworks and employing expert reasoning to uncover t…
View article: TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports Open
Understanding the modus operandi of adversaries aids organizations to employ efficient defensive strategies and share intelligence in the community. This knowledge is often present in unstructured natural language text within threat analys…
View article: A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems
A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems Open
Advanced Persistent Threat (APT) attribution is a critical challenge in cybersecurity and implies the process of accurately identifying the perpetrators behind sophisticated cyber attacks. It can significantly enhance defense mechanisms an…
View article: Modelling cybersecurity impacts on digital payment adoption: A game theoretic approach
Modelling cybersecurity impacts on digital payment adoption: A game theoretic approach Open
The pervasive adoption of digital payment systems globally is a crucial development, shaping the financial landscapes of diverse nations. However, this surge in adoption has precipitated a concerning rise in cybercrimes. This prompts users…
View article: Reconceptualizing online offenses: A framework for distinguishing cybercrime, cyberattacks, and cyberterrorism in the Indian legal context
Reconceptualizing online offenses: A framework for distinguishing cybercrime, cyberattacks, and cyberterrorism in the Indian legal context Open
From a legal standpoint, there are significant disparities in treating online offenses targeting individuals, organizations, and nation-states. These disparities arise due to influences that vary discreetly based on crucial factors such as…
View article: ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats Open
Honeypots serve as a valuable deception technology, enabling security teams to gain insights into the behaviour patterns of attackers and investigate cyber security breaches. However, traditional honeypots prove ineffective against advance…
View article: TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports Open
Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat a…
View article: STUDY OF LOGICAL OPERATIONS IN VECTORS OF A CIRCUIT OF HYPERCUBE
STUDY OF LOGICAL OPERATIONS IN VECTORS OF A CIRCUIT OF HYPERCUBE Open
Parallel structure and switching circuit have become a fundamental theme in the concern of Artificial Intelligence and interconnection network and also it is revealed to be critical when researching in high performance. This Study helps to…
View article: Reliability/redundancy trade-off evaluation for multiplexed architectures used to implement quantum dot based computing
Reliability/redundancy trade-off evaluation for multiplexed architectures used to implement quantum dot based computing Open
With the advent of nanocomputing, researchers have proposed Quantum Dot Cellular Automata (QCA) as one of the implementation technologies. The majority gate is one of the fundamental gates implementable with QCAs. Moreover, majority gates …
View article: A hybrid framework for design and analysis of fault-tolerant architectures for nanoscale molecular crossbar memories.
A hybrid framework for design and analysis of fault-tolerant architectures for nanoscale molecular crossbar memories. Open
It is anticipated that self assembled ultra-dense nanomemories will be more susceptible to manufacturing defects and transient faults than conventional CMOS-based memories, thus the need exists for fault-tolerant memory architectures. The …
View article: Reliability analysis of fault-tolerant reconfigurable nano-architectures
Reliability analysis of fault-tolerant reconfigurable nano-architectures Open
Manufacturing defects and transient errors will be abundant in high - density reconfigurable nano-scale designs. Recently, we have automated a computational scheme based on Markov Random Field (MRF) and Belief Propagation algorithms in a t…
View article: A Dummy User Based Privacy Preserving Model for Online and Offline Crowd Mobility Monitoring Applications
A Dummy User Based Privacy Preserving Model for Online and Offline Crowd Mobility Monitoring Applications Open
View article: A Dummy User Based Privacy Preserving Model for Online and Offline Crowd Mobility Monitoring Applications
A Dummy User Based Privacy Preserving Model for Online and Offline Crowd Mobility Monitoring Applications Open
View article: EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector Open
Due to the importance of Critical Infrastructure (CI) in a nation’s economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems such as power grids, water, and sewage tre…
View article: Behavioral analysis of cybercrime: Paving the way for effective policing strategies
Behavioral analysis of cybercrime: Paving the way for effective policing strategies Open
This comprehensive survey paper offers a panoramic exploration of the dynamic realm of cybercrime policing, encompassing a wide spectrum of intricacies from cybercrime definitions to establishing a robust investigative framework. Navigatin…
View article: HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters
HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters Open
Ransomware has been one of the most prevalent forms of malware over the previous decade, and it continues to be one of the most significant threats today. Recently, ransomware strategies such as double extortion and rapid encryption have e…
View article: Conservation of medicinal plants: challenges and opportunities
Conservation of medicinal plants: challenges and opportunities Open
Medicinal plants have been used for centuries as a primary source of healthcare and healing. However, the increasing demand for medicinal plants, coupled with habitat loss and unsustainable harvesting practices, has led to the depletion of…
View article: From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads
From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads Open
This research article critically examines the potential risks and implications arising from the malicious utilization of large language models(LLM), focusing specifically on ChatGPT and Google's Bard. Although these large language models h…
View article: Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators
Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators Open
The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles, but also an emerging space for fraudulent activities. This study provides an in-depth analysis of NFT rug pulls, which …
View article: Identifying malicious accounts in blockchains using domain names and associated temporal properties
Identifying malicious accounts in blockchains using domain names and associated temporal properties Open
The rise in the adoption of blockchain technology has led to increased illegal activities by cybercriminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are oft…