Nanda Rani

Orcid: 0000-0003-1255-5284

According to our database1, Nanda Rani authored at least 22 papers between 2021 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Towards Effective Offensive Security LLM Agents: Hyperparameter Tuning, LLM as a Judge, and a Lightweight CTF Benchmark.
CoRR, August, 2025

AURA: A Multi-Agent Intelligence Framework for Knowledge-Enhanced Cyber Threat Attribution.
CoRR, June, 2025

CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution.
CoRR, May, 2025

Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation.
CoRR, April, 2025

D-CIPHER: Dynamic Collaborative Intelligent Agents with Planning and Heterogeneous Execution for Enhanced Reasoning in Offensive Security.
CoRR, February, 2025

A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems.
J. Inf. Secur. Appl., 2025

MaLAware: Automating the Comprehension of Malicious Software Behaviours using Large Language Models (LLMs).
Proceedings of the 22nd IEEE/ACM International Conference on Mining Software Repositories, 2025

The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families.
Proceedings of the Computer Security - ESORICS 2025, 2025

PARAG: Proactive Answering Framework Integrating LLMs with Retrieval-Augmented Generation.
Proceedings of the Cybersecurity - 9th European Interdisciplinary Cybersecurity Conference, 2025

2024
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports.
Digit. Threat. Res. Pract., December, 2024

ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats.
DTRAP, 2024

Automated Classification of Cybercrime Complaints using Transformer-based Language Models for Hinglish Texts.
CoRR, 2024

Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent Threats.
CoRR, 2024

A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems.
CoRR, 2024

Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution.
Proceedings of the 5th IEEE International Conference on Trust, 2024

MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
MalXCap: A Method for Malware Capability Extraction.
Proceedings of the Information Security Practice and Experience, 2023

TTPHunter: Automated Extraction of Actionable Intelligence as TTPs from Narrative Threat Reports.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
Leveraging Machine Learning for Ransomware Detection.
CoRR, 2022

RemOD: Operational Drift-Adaptive Intrusion Detection.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

A Generalized Unknown Malware Classification.
Proceedings of the Security and Privacy in Communication Networks, 2022

2021
A Survey on Machine Learning-Based Ransomware Detection.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021


  Loading...