Bikash Saha

Orcid: 0000-0002-6316-4665

According to our database1, Bikash Saha authored at least 13 papers between 2023 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity.
CoRR, June, 2025

Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation.
CoRR, April, 2025

A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems.
J. Inf. Secur. Appl., 2025

MaLAware: Automating the Comprehension of Malicious Software Behaviours using Large Language Models (LLMs).
Proceedings of the 22nd IEEE/ACM International Conference on Mining Software Repositories, 2025

PARAG: Proactive Answering Framework Integrating LLMs with Retrieval-Augmented Generation.
Proceedings of the Cybersecurity - 9th European Interdisciplinary Cybersecurity Conference, 2025

2024
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports.
Digit. Threat. Res. Pract., December, 2024

Automated Classification of Cybercrime Complaints using Transformer-based Language Models for Hinglish Texts.
CoRR, 2024

Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent Threats.
CoRR, 2024

A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems.
CoRR, 2024

Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution.
Proceedings of the 5th IEEE International Conference on Trust, 2024

MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
MalXCap: A Method for Malware Capability Extraction.
Proceedings of the Information Security Practice and Experience, 2023

TTPHunter: Automated Extraction of Actionable Intelligence as TTPs from Narrative Threat Reports.
Proceedings of the 2023 Australasian Computer Science Week, 2023


  Loading...