Publications

(2023). Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies (ACM). In ACM Digital Threats Research and Practice.

PDF Cite DOI

(2022). Secure Development Workflows in CI/CD Pipelines (IEEE). In 2018 IEEE APWG Symposium on Electronic Crime Research (eCrime).

Cite DOI

(2020). The Suitability of RSA for Bulk Data Encryption (IEEE). In 2020 IEEE International Workshop on Information Forensics and Security (WIFS).

Cite DOI

(2020). Preparing smart cities for ransomware attacks (IEEE). In 2020 3rd International Conference on Data Intelligence and Security (ICDIS).

PDF Cite DOI

(2020). Towards Effective Identification and Rating of Automotive Vulnerabilities (ACM). In AutoSec20 - Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security.

PDF Cite DOI

(2020). Ransomware Targeting Automobiles (ACM). In Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security.

PDF Cite DOI

(2020). Memory Forensics Against Ransomware. In 2020 IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security).

PDF Cite DOI

(2020). Dissecting .NET ransomware: key generation, encryption and operation (Elsevier). In Network Security (Elsevier).

Cite DOI

(2020). Attacking Key Management in Ransomware (IEEE). In IEEE IT Professional.

PDF Cite

(2020). An Empirical Study of Key Generation in Cryptographic Ransomware. In 2020 IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security).

PDF Cite DOI

(2020). An Empirical Study of API Calls in Ransomware. In 2020 IEEE International Conference on Electro Information Technology (EIT).

PDF Cite DOI

(2019). BATSense: Anomalous Security Event Detection using TBATS Machine Learning (IEEE). In 2019 IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security).

Cite DOI

(2018). The Art of Mapping IoT Devices in Networks (Elsevier). In Network Security (Elsevier).

PDF Cite DOI

(2018). Evidential Study of Ransomware: Cryptoviral Infections and Countermeasures (ISACA). In ISACA Journal.

PDF Cite

(2018). A Key-Management-Based Taxonomy for Ransomware (IEEE). In 2018 IEEE APWG Symposium on Electronic Crime Research (eCrime).

PDF Cite DOI