Alert button
Picture for Nidhi Rastogi

Nidhi Rastogi

Alert button

PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis

Add code
Bookmark button
Alert button
Apr 12, 2024
Dipkamal Bhusal, Md Tanvirul Alam, Monish K. Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi

Viaarxiv icon

MORPH: Towards Automated Concept Drift Adaptation for Malware Detection

Add code
Bookmark button
Alert button
Jan 23, 2024
Md Tanvirul Alam, Romy Fieblinger, Ashim Mahara, Nidhi Rastogi

Viaarxiv icon

Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI

Add code
Bookmark button
Alert button
Nov 01, 2022
Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

Figure 1 for Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Figure 2 for Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Figure 3 for Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Figure 4 for Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Viaarxiv icon

SoK: Modeling Explainability in Security Monitoring for Trust, Privacy, and Interpretability

Add code
Bookmark button
Alert button
Oct 31, 2022
Dipkamal Bhusal, Nidhi Rastogi

Figure 1 for SoK: Modeling Explainability in Security Monitoring for Trust, Privacy, and Interpretability
Figure 2 for SoK: Modeling Explainability in Security Monitoring for Trust, Privacy, and Interpretability
Figure 3 for SoK: Modeling Explainability in Security Monitoring for Trust, Privacy, and Interpretability
Figure 4 for SoK: Modeling Explainability in Security Monitoring for Trust, Privacy, and Interpretability
Viaarxiv icon

CyNER: A Python Library for Cybersecurity Named Entity Recognition

Add code
Bookmark button
Alert button
Apr 08, 2022
Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

Figure 1 for CyNER: A Python Library for Cybersecurity Named Entity Recognition
Figure 2 for CyNER: A Python Library for Cybersecurity Named Entity Recognition
Figure 3 for CyNER: A Python Library for Cybersecurity Named Entity Recognition
Figure 4 for CyNER: A Python Library for Cybersecurity Named Entity Recognition
Viaarxiv icon

Adversarial Patterns: Building Robust Android Malware Classifiers

Add code
Bookmark button
Alert button
Mar 04, 2022
Dipkamal Bhusal, Nidhi Rastogi

Figure 1 for Adversarial Patterns: Building Robust Android Malware Classifiers
Figure 2 for Adversarial Patterns: Building Robust Android Malware Classifiers
Figure 3 for Adversarial Patterns: Building Robust Android Malware Classifiers
Figure 4 for Adversarial Patterns: Building Robust Android Malware Classifiers
Viaarxiv icon

Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles

Add code
Bookmark button
Alert button
Mar 01, 2022
Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matthew Bishop, Karl Levitt

Figure 1 for Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles
Figure 2 for Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles
Figure 3 for Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles
Figure 4 for Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles
Viaarxiv icon

Ontology-driven Knowledge Graph for Android Malware

Add code
Bookmark button
Alert button
Sep 03, 2021
Ryan Christian, Sharmishtha Dutta, Youngja Park, Nidhi Rastogi

Figure 1 for Ontology-driven Knowledge Graph for Android Malware
Figure 2 for Ontology-driven Knowledge Graph for Android Malware
Figure 3 for Ontology-driven Knowledge Graph for Android Malware
Figure 4 for Ontology-driven Knowledge Graph for Android Malware
Viaarxiv icon

Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence

Add code
Bookmark button
Alert button
Feb 18, 2021
Nidhi Rastogi, Sharmishtha Dutta, Ryan Christian, Mohammad Zaki, Alex Gittens, Charu Aggarwal

Figure 1 for Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence
Figure 2 for Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence
Figure 3 for Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence
Figure 4 for Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence
Viaarxiv icon

DANTE: Predicting Insider Threat using LSTM on system logs

Add code
Bookmark button
Alert button
Feb 10, 2021
Nidhi Rastogi, Qicheng Ma

Figure 1 for DANTE: Predicting Insider Threat using LSTM on system logs
Figure 2 for DANTE: Predicting Insider Threat using LSTM on system logs
Figure 3 for DANTE: Predicting Insider Threat using LSTM on system logs
Figure 4 for DANTE: Predicting Insider Threat using LSTM on system logs
Viaarxiv icon