Publications

πŸ“ Saha, B., Rani, N., & Shukla, S. K. (2025). MaLAware: Automating the Comprehension of Malicious Software Behaviours using Large Language Models (LLMs). Accepted at the 22nd International Conference on Mining Software Repositories (MSR 2025) [Core A]. [Paper][Code & Dataset]

πŸ“ Rani, N., Singh, D., Saha, B., & Shukla, S. K. (2024). Automated Classification of Cybercrime Complaints using Transformer-based Language Models for Hinglish Texts. arXiv preprint arXiv:2412.16614. [Paper]

πŸ“ Saha, B., Rani, N., & Shukla, S. K. (2024). MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT. Accepted at Workshop on AI for Cyber Threat Intelligence (WAITI) 2024 co-located with the Annual Computer Security Applications Conference (ACSAC24 - Core A). [Paper]

πŸ“ Rani, N., Saha, B., Maurya, V., & Shukla, S. K. (2024). Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent Threats. arXiv preprint arXiv:2409.16400. [Paper]

πŸ“ Rani, N., Saha, B., & Shukla, S. K. (2024). A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems. arXiv preprint arXiv:2403.03267. [Paper]

πŸ“ N. Rani, B. Saha, R. Kumar and S. K. Shukla, "Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution," 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), Washington, DC, USA, 2024, pp. 399-408. [Paper] [Code & Dataset]

πŸ“ Rani, N., Saha, B., Maurya, V., & Shukla, S. K. (2024). TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports. Digital Threats: Research and Practice. [Q1]Β  Β [Paper] [Code & Dataset]

πŸ“ Saha, B., Rani, N., & Shukla, S. K. (2023, August). MalXCap: A Method for Malware Capability Extraction. In International Conference on Information Security Practice and Experience (pp. 230-249). Singapore: Springer Nature Singapore. [Core: B Ranked] [Paper]

πŸ“ Rani, N., Saha, B., Maurya, V., & Shukla, S. K. (2023). TTPHunter: automated extraction of actionable intelligence as TTPs from narrative threat reports. In Proceedings of the 2023 Australasian Computer Science Week (pp. 126-134). [Core: Australasian B Ranked] [Paper] [Code & Dataset]

LinkedInGitHubLinkLinkLink

Β© 2024 Bikash Saha, All rights reserved.