Nitesh Kumar

Orcid: 0000-0003-0998-0925

According to our database1, Nitesh Kumar authored at least 38 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adversarially robust and real-time DDoS detection and classification framework using AutoML.
Inf. Secur. J. A Glob. Perspect., July, 2024

Energy optimized artificial hummingbird algorithm for routing in IoT-based software-defined WSN.
Int. J. Commun. Syst., 2024

The Persistent Robot Charging Problem for Long-Duration Autonomy.
CoRR, 2024

ArkThor: Threat Categorization Based on Malware's C2 Communication.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Ranking Entities along Conceptual Space Dimensions with LLMs: An Analysis of Fine-Tuning Strategies.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Evading malware classifiers using RL agent with action-mask.
Int. J. Inf. Sec., December, 2023

Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm.
SIGMETRICS Perform. Evaluation Rev., April, 2023

First-Order Context-Specific Likelihood Weighting in Hybrid Probabilistic Logic Programs.
J. Artif. Intell. Res., 2023

Modeling and parametric optimization of 3D tendon-sheath actuator system for upper limb soft exosuit.
CoRR, 2023

Adaptive Gravity Compensation Control of a Cable-Driven Upper-Arm Soft Exosuit.
CoRR, 2023

Solving Hard Analogy Questions with Relation Embedding Chains.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

AProctor - A practical on-device antidote for Android malware.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
Learning Distributional Programs for Relational Autocompletion.
Theory Pract. Log. Program., 2022

Automated Windows behavioral tracing for malware analysis.
Secur. Priv., 2022

Multimodal Neural Network for Demand Forecasting.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Volatility Custom Profiling for Automated Hybrid ELF Malware Detection.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

RBMon: Real Time System Behavior Monitoring Tool.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Context-Specific Likelihood Weighting.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

2020
Symbolic Learning and Reasoning With Noisy Data for Probabilistic Anchoring.
Frontiers Robotics AI, 2020

An Insecurity Study of Ethereum Smart Contracts.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Malware Detection in Word Documents Using Machine Learning.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

Static Ransomware Analysis Using Machine Learning and Deep Learning Models.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
Computational fluid dynamic study on effect of Carreau-Yasuda: Yasuda and Newtonian blood viscosity models on hemodynamic parameters.
J. Comput. Methods Sci. Eng., 2019

Automated Classification of Web-Application Attacks for Intrusion Detection.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Evading API Call Sequence Based Malware Classifiers.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Malware Classification Using Image Representation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

PeerClear: Peer-to-Peer Bot-net Detection.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Malware Classification using Early Stage Behavioral Analysis.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2016
Linkage based deferred acceptance optimization.
Inf. Sci., 2016

2015
A smart and adaptive scheme for generator out of step protection.
Proceedings of the 2015 IEEE Innovative Smart Grid Technologies, 2015

Towards scalable quantile regression trees.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Semantic clustering-based cross-domain recommendation.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence and Data Mining, 2014

2013
Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases.
Trans. Data Priv., 2013

2012
Option pricing under a normal mixture distribution derived from the Markov tree model.
Eur. J. Oper. Res., 2012

2009
Intelligent coding scheme for wireless image transmission over noisy channels.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009


  Loading...