Nidhi Rastogi

Orcid: 0000-0002-2002-3213

According to our database1, Nidhi Rastogi authored at least 39 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Revisiting Static Feature-Based Android Malware Detection.
CoRR, 2024

CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence.
CoRR, 2024

SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory.
CoRR, 2024

MORPH: Towards Automated Concept Drift Adaptation for Malware Detection.
CoRR, 2024

Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

Comprehensive Analysis of Consistency and Robustness of Machine Learning Models in Malware Detection.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

Actionable Cyber Threat Intelligence Using Knowledge Graphs and Large Language Models.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

PASA: Attack Agnostic Unsupervised Adversarial Detection Using Prediction & Attribution Sensitivity Analysis.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
G-VARS: Towards Personalized Risk Assessments by Analyzing Gun Violence Susceptibility with Personal Knowledge Graphs.
IEEE Data Eng. Bull., 2023

Emergent (In)Security of Multi-Cloud Environments.
CoRR, 2023

Systemic Risk and Vulnerability Analysis of Multi-cloud Environments.
CoRR, 2023

Graph-based Approach for Studying Spread of Radical Online Sentiment.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
SoK: Modeling Explainability in Security Monitoring for Trust, Privacy, and Interpretability.
CoRR, 2022

Bias Impact Analysis of AI in Consumer Mobile Health Technologies: Legal, Technical, and Policy.
CoRR, 2022

CyNER: A Python Library for Cybersecurity Named Entity Recognition.
CoRR, 2022

Adversarial Patterns: Building Robust Android Malware Classifiers.
CoRR, 2022

Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles.
CoRR, 2022

TINKER: A framework for Open source Cyberthreat Intelligence.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Ontology-driven Knowledge Graph for Android Malware.
CoRR, 2021

Malware Knowledge Graph Generation.
CoRR, 2021

An Ontology-driven Knowledge Graph for Android Malware.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
MALOnt: An Ontology for Malware Threat Intelligence.
CoRR, 2020

Personal Health Knowledge Graphs for Patients.
CoRR, 2020

DANTE: Predicting Insider Threat using LSTM on system logs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Applying Learning and Semantics for Personalized Food Recommendations.
Proceedings of the ISWC 2020 Demos and Industry Tracks: From Novel Ideas to Industrial Practice co-located with 19th International Semantic Web Conference (ISWC 2020), 2020

2019
Exploring Information Centrality for Intrusion Detection in Large Networks.
CoRR, 2019

FoodKG Enabled Q&A Application.
Proceedings of the ISWC 2019 Satellite Tracks (Posters & Demonstrations, 2019

2018
A network intrusion detection system (NIDS) based on information centrality to identify systemic cyber attacks in large systems.
PhD thesis, 2018

2017
Serving people in crisis to make the world a better place.
XRDS, 2017

Online censorship, cyberattacks, and access to information.
XRDS, 2017

Managing crises, one text at a time.
XRDS, 2017

Tech for crises.
XRDS, 2017

Graph Analytics for anomaly detection in homogeneous wireless networks - A Simulation Approach.
CoRR, 2017

WhatsApp security and role of metadata in preserving privacy.
CoRR, 2017

Security and Privacy of performing Data Analytics in the cloud - A three-way handshake of Technology, Policy, and Management.
CoRR, 2017

2016
The art and design of autonomous machines.
XRDS, 2016

2011
Secure scheme during vertical handoff in integrated heterogeneous wireless systems.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011


  Loading...