Picture for Maanak Gupta

Maanak Gupta

AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns

Add code
Feb 15, 2024
Viaarxiv icon

From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy

Add code
Jul 03, 2023
Figure 1 for From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
Figure 2 for From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
Figure 3 for From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
Figure 4 for From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
Viaarxiv icon

Machine Learning in Access Control: A Taxonomy and Survey

Add code
Jul 04, 2022
Figure 1 for Machine Learning in Access Control: A Taxonomy and Survey
Figure 2 for Machine Learning in Access Control: A Taxonomy and Survey
Figure 3 for Machine Learning in Access Control: A Taxonomy and Survey
Figure 4 for Machine Learning in Access Control: A Taxonomy and Survey
Viaarxiv icon

Detecting Anomalies using Overlapping Electrical Measurements in Smart Power Grids

Add code
Jan 06, 2022
Figure 1 for Detecting Anomalies using Overlapping Electrical Measurements in Smart Power Grids
Figure 2 for Detecting Anomalies using Overlapping Electrical Measurements in Smart Power Grids
Figure 3 for Detecting Anomalies using Overlapping Electrical Measurements in Smart Power Grids
Figure 4 for Detecting Anomalies using Overlapping Electrical Measurements in Smart Power Grids
Viaarxiv icon

An Ontological Knowledge Representation for Smart Agriculture

Add code
Dec 21, 2021
Figure 1 for An Ontological Knowledge Representation for Smart Agriculture
Figure 2 for An Ontological Knowledge Representation for Smart Agriculture
Figure 3 for An Ontological Knowledge Representation for Smart Agriculture
Figure 4 for An Ontological Knowledge Representation for Smart Agriculture
Viaarxiv icon

Detecting Anomalous User Behavior in Remote Patient Monitoring

Add code
Jun 22, 2021
Figure 1 for Detecting Anomalous User Behavior in Remote Patient Monitoring
Figure 2 for Detecting Anomalous User Behavior in Remote Patient Monitoring
Figure 3 for Detecting Anomalous User Behavior in Remote Patient Monitoring
Figure 4 for Detecting Anomalous User Behavior in Remote Patient Monitoring
Viaarxiv icon

Analyzing Machine Learning Approaches for Online Malware Detection in Cloud

Add code
May 19, 2021
Figure 1 for Analyzing Machine Learning Approaches for Online Malware Detection in Cloud
Figure 2 for Analyzing Machine Learning Approaches for Online Malware Detection in Cloud
Figure 3 for Analyzing Machine Learning Approaches for Online Malware Detection in Cloud
Figure 4 for Analyzing Machine Learning Approaches for Online Malware Detection in Cloud
Viaarxiv icon

Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case

Add code
Apr 13, 2020
Figure 1 for Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case
Figure 2 for Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case
Viaarxiv icon

Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

Add code
Feb 15, 2020
Figure 1 for Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
Figure 2 for Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
Figure 3 for Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
Figure 4 for Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
Viaarxiv icon