Nitesh Kumar
Orcid: 0000-0003-0998-0925
According to our database1,
Nitesh Kumar
authored at least 38 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Adversarially robust and real-time DDoS detection and classification framework using AutoML.
Inf. Secur. J. A Glob. Perspect., July, 2024
Energy optimized artificial hummingbird algorithm for routing in IoT-based software-defined WSN.
Int. J. Commun. Syst., 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Ranking Entities along Conceptual Space Dimensions with LLMs: An Analysis of Fine-Tuning Strategies.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Int. J. Inf. Sec., December, 2023
Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm.
SIGMETRICS Perform. Evaluation Rev., April, 2023
First-Order Context-Specific Likelihood Weighting in Hybrid Probabilistic Logic Programs.
J. Artif. Intell. Res., 2023
Modeling and parametric optimization of 3D tendon-sheath actuator system for upper limb soft exosuit.
CoRR, 2023
CoRR, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the 2023 Australasian Computer Science Week, 2023
2022
Theory Pract. Log. Program., 2022
Proceedings of the Neural Information Processing - 29th International Conference, 2022
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021
2020
Frontiers Robotics AI, 2020
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
Computational fluid dynamic study on effect of Carreau-Yasuda: Yasuda and Newtonian blood viscosity models on hemodynamic parameters.
J. Comput. Methods Sci. Eng., 2019
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2016
2015
Proceedings of the 2015 IEEE Innovative Smart Grid Technologies, 2015
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence and Data Mining, 2014
2013
Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases.
Trans. Data Priv., 2013
2012
Option pricing under a normal mixture distribution derived from the Markov tree model.
Eur. J. Oper. Res., 2012
2009
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009