Publications
π Rani, N., Saha, B., Maurya, V., & Shukla, S. K. (2025). Decoding shadows: Towards Tactics, Techniques, and Procedures (TTP)-based Advanced Persistent Threat (APT) attribution. Information Security Journal: A Global Perspective, 1β28. [Paper]
π Saha, B., & Shukla, S. K. (2025). MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity. arXiv preprint arXiv:2506.07586. [Paper]
π Rani, N., Saha, B., & Shukla, S. K. (2025). A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems. Journal of Information Security and Applications. [Paper]
π Saha, B., Rani, N., & Shukla, S. K. (2025). Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation. arXiv preprint arXiv:2504.21574. [Paper]
π Saha, B., Rani, N., Chakraborty, J., Singh, D., Chakraborty, S. V., & Shukla, S. K. (2025). PARAG: Proactive Answering Framework Integrating LLMs with Retrieval-Augmented Generation. In European Interdisciplinary Cybersecurity Conference (pp. 20-37). Springer, Cham. [Paper][Code & Dataset]
π Saha, B., Rani, N., & Shukla, S. K. (2025, April). Malaware: Automating the comprehension of malicious software behaviours using large language models (llms). In 2025 IEEE/ACM 22nd International Conference on Mining Software Repositories (MSR) (pp. 169-173). IEEE. [Paper][Code & Dataset]
π Rani, N., Singh, D., Saha, B., & Shukla, S. K. (2024). Automated Classification of Cybercrime Complaints using Transformer-based Language Models for Hinglish Texts. arXiv preprint arXiv:2412.16614. [Paper]
π Saha, B., Rani, N., & Shukla, S. K. (2024). MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT. Β In 2024 Annual Computer Security Applications Conference Workshops (ACSAC Workshops) (pp. 201-207). IEEE. [Paper]
π Rani, N., Saha, B., Maurya, V., & Shukla, S. K. (2024). Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent Threats. arXiv preprint arXiv:2409.16400. [Paper]
π N. Rani, B. Saha, R. Kumar and S. K. Shukla, "Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution," 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), Washington, DC, USA, 2024, pp. 399-408. [Paper] [Code & Dataset]
π Rani, N., Saha, B., Maurya, V., & Shukla, S. K. (2024). TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports. Digital Threats: Research and Practice. [Paper] [Code & Dataset]
π Saha, B., Rani, N., & Shukla, S. K. (2023, August). MalXCap: A Method for Malware Capability Extraction. In International Conference on Information Security Practice and Experience (pp. 230-249). Singapore: Springer Nature Singapore. [Paper]
π Rani, N., Saha, B., Maurya, V., & Shukla, S. K. (2023). TTPHunter: automated extraction of actionable intelligence as TTPs from narrative threat reports. In Proceedings of the 2023 Australasian Computer Science Week (pp. 126-134). [Paper] [Code & Dataset]