Diksha Goel

Orcid: 0000-0001-8212-8793

According to our database1, Diksha Goel authored at least 27 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Tracking top-k structural hole spanners in dynamic networks.
Clust. Comput., October, 2025

Towards deep learning enabled cybersecurity risk assessment for microservice architectures.
Clust. Comput., October, 2025

From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs.
CoRR, June, 2025

Co-Evolutionary Defence of Active Directory Attack Graphs via GNN-Approximated Dynamic Programming.
CoRR, May, 2025

Unveiling the Black Box: A Multi-Layer Framework for Explaining Reinforcement Learning-Based Cyber Agents.
CoRR, May, 2025

CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
CoRR, January, 2025

The Future of AI: Exploring the Potential of Large Concept Models.
CoRR, January, 2025

Detection and Prevention of Smishing Attacks.
CoRR, January, 2025

CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
Dataset, January, 2025

CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber Defenders.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2025, 2025

2024
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks.
Clust. Comput., December, 2024

Mechanism design for public projects via three machine learning based approaches.
Auton. Agents Multi Agent Syst., June, 2024

Effective graph-neural-network based models for discovering Structural Hole Spanners in large-scale and diverse networks.
Expert Syst. Appl., 2024

Machine Learning Driven Smishing Detection Framework for Mobile Security.
CoRR, 2024

ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models.
CoRR, 2024

Microservice Vulnerability Analysis: A Literature Review With Empirical Insights.
IEEE Access, 2024

Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Enhancing Network Resilience through Machine Learning-powered Graph Combinatorial Optimization: Applications in Cyber Defense and Information Diffusion.
CoRR, 2023

Cost Sharing Public Project with Minimum Release Delay.
CoRR, 2023

Discovering Top-k Structural Hole Spanners in Dynamic Networks.
CoRR, 2023

Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2023

2022
Discovering Structural Hole Spanners in Dynamic Networks via Graph Neural Networks.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2022

Defending active directory by combining neural network based dynamic program and evolutionary diversity optimisation.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022

2021
Progressive Transfer Learning Approach for Identifying the Leaf Type by Optimizing Network Parameters.
Neural Process. Lett., 2021

Maintenance of Structural Hole Spanners in Dynamic Networks.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

2020
Predicting Spam Messages Using Back Propagation Neural Network.
Wirel. Pers. Commun., 2020

2018
Mobile phishing attacks and defence mechanisms: State of art and open research challenges.
Comput. Secur., 2018


  Loading...