Pranshu Bajpai

Orcid: 0000-0003-4662-4049

Affiliations:
  • Michigan State University, East Lansing, MI, USA


According to our database1, Pranshu Bajpai authored at least 14 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Misplaced Trust: The Security Flaw in Modern Code Signing Process.
Proceedings of the IEEE Secure Development Conference, 2023

2022
Secure Development Workflows in CI/CD Pipelines.
Proceedings of the IEEE Secure Development Conference, 2022

2020
Dissecting .NET ransomware: key generation, encryption and operation.
Netw. Secur., 2020

Attacking Key Management in Ransomware.
IT Prof., 2020

The Suitability of RSA for Bulk Data Encryption.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Preparing Smart Cities for Ransomware Attacks.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

An Empirical Study of API Calls in Ransomware.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

An Empirical Study of Key Generation in Cryptographic Ransomware.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Memory Forensics Against Ransomware.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Ransomware Targeting Automobiles.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

Towards Effective Identification and Rating of Automotive Vulnerabilities.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

2019
BATSense: Anomalous Security Event Detection using TBATS Machine Learning.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

2018
The art of mapping IoT devices in networks.
Netw. Secur., 2018

A key-management-based taxonomy for ransomware.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018


  Loading...