Picture for Dhruv Nandakumar

Dhruv Nandakumar

Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations

Add code
Jun 25, 2024
Viaarxiv icon

Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning

Add code
Feb 14, 2024
Viaarxiv icon

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

Add code
Nov 28, 2023
Viaarxiv icon

A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention

Add code
Jun 06, 2023
Figure 1 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 2 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 3 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 4 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Viaarxiv icon

Zero Day Threat Detection Using Metric Learning Autoencoders

Add code
Nov 01, 2022
Viaarxiv icon

Anomaly Detection via Federated Learning

Add code
Oct 12, 2022
Figure 1 for Anomaly Detection via Federated Learning
Figure 2 for Anomaly Detection via Federated Learning
Figure 3 for Anomaly Detection via Federated Learning
Figure 4 for Anomaly Detection via Federated Learning
Viaarxiv icon

Lateral Movement Detection Using User Behavioral Analysis

Add code
Aug 29, 2022
Figure 1 for Lateral Movement Detection Using User Behavioral Analysis
Figure 2 for Lateral Movement Detection Using User Behavioral Analysis
Figure 3 for Lateral Movement Detection Using User Behavioral Analysis
Figure 4 for Lateral Movement Detection Using User Behavioral Analysis
Viaarxiv icon

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

Add code
May 04, 2022
Figure 1 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 2 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 3 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 4 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Viaarxiv icon