Picture for Nidhi Rastogi

Nidhi Rastogi

Revisiting Static Feature-Based Android Malware Detection

Add code
Sep 11, 2024
Viaarxiv icon

Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models

Add code
Jun 30, 2024
Viaarxiv icon

CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence

Add code
Jun 11, 2024
Viaarxiv icon

SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory

Add code
May 30, 2024
Viaarxiv icon

PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis

Add code
Apr 12, 2024
Viaarxiv icon

MORPH: Towards Automated Concept Drift Adaptation for Malware Detection

Add code
Jan 23, 2024
Figure 1 for MORPH: Towards Automated Concept Drift Adaptation for Malware Detection
Figure 2 for MORPH: Towards Automated Concept Drift Adaptation for Malware Detection
Figure 3 for MORPH: Towards Automated Concept Drift Adaptation for Malware Detection
Figure 4 for MORPH: Towards Automated Concept Drift Adaptation for Malware Detection
Viaarxiv icon

Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI

Add code
Nov 01, 2022
Viaarxiv icon

SoK: Modeling Explainability in Security Monitoring for Trust, Privacy, and Interpretability

Add code
Oct 31, 2022
Viaarxiv icon

CyNER: A Python Library for Cybersecurity Named Entity Recognition

Add code
Apr 08, 2022
Figure 1 for CyNER: A Python Library for Cybersecurity Named Entity Recognition
Figure 2 for CyNER: A Python Library for Cybersecurity Named Entity Recognition
Figure 3 for CyNER: A Python Library for Cybersecurity Named Entity Recognition
Figure 4 for CyNER: A Python Library for Cybersecurity Named Entity Recognition
Viaarxiv icon

Adversarial Patterns: Building Robust Android Malware Classifiers

Add code
Mar 04, 2022
Figure 1 for Adversarial Patterns: Building Robust Android Malware Classifiers
Figure 2 for Adversarial Patterns: Building Robust Android Malware Classifiers
Figure 3 for Adversarial Patterns: Building Robust Android Malware Classifiers
Figure 4 for Adversarial Patterns: Building Robust Android Malware Classifiers
Viaarxiv icon