Nanda Rani
Orcid: 0000-0003-1255-5284
According to our database1,
Nanda Rani
authored at least 22 papers
between 2021 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Towards Effective Offensive Security LLM Agents: Hyperparameter Tuning, LLM as a Judge, and a Lightweight CTF Benchmark.
CoRR, August, 2025
AURA: A Multi-Agent Intelligence Framework for Knowledge-Enhanced Cyber Threat Attribution.
CoRR, June, 2025
Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation.
CoRR, April, 2025
D-CIPHER: Dynamic Collaborative Intelligent Agents with Planning and Heterogeneous Execution for Enhanced Reasoning in Offensive Security.
CoRR, February, 2025
A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems.
J. Inf. Secur. Appl., 2025
MaLAware: Automating the Comprehension of Malicious Software Behaviours using Large Language Models (LLMs).
Proceedings of the 22nd IEEE/ACM International Conference on Mining Software Repositories, 2025
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families.
Proceedings of the Computer Security - ESORICS 2025, 2025
PARAG: Proactive Answering Framework Integrating LLMs with Retrieval-Augmented Generation.
Proceedings of the Cybersecurity - 9th European Interdisciplinary Cybersecurity Conference, 2025
2024
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports.
Digit. Threat. Res. Pract., December, 2024
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats.
DTRAP, 2024
Automated Classification of Cybercrime Complaints using Transformer-based Language Models for Hinglish Texts.
CoRR, 2024
CoRR, 2024
A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems.
CoRR, 2024
Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution.
Proceedings of the 5th IEEE International Conference on Trust, 2024
MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT.
Proceedings of the Annual Computer Security Applications Conference, 2024
2023
Proceedings of the Information Security Practice and Experience, 2023
TTPHunter: Automated Extraction of Actionable Intelligence as TTPs from Narrative Threat Reports.
Proceedings of the 2023 Australasian Computer Science Week, 2023
2022
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
2021
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021