Picture for Sandeep Kumar Shukla

Sandeep Kumar Shukla

DNS based In-Browser Cryptojacking Detection

Add code
May 10, 2022
Figure 1 for DNS based In-Browser Cryptojacking Detection
Figure 2 for DNS based In-Browser Cryptojacking Detection
Figure 3 for DNS based In-Browser Cryptojacking Detection
Figure 4 for DNS based In-Browser Cryptojacking Detection
Viaarxiv icon

EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector

Add code
Apr 08, 2022
Figure 1 for EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Figure 2 for EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Figure 3 for EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Figure 4 for EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Viaarxiv icon

Towards Malicious address identification in Bitcoin

Add code
Dec 22, 2021
Figure 1 for Towards Malicious address identification in Bitcoin
Figure 2 for Towards Malicious address identification in Bitcoin
Figure 3 for Towards Malicious address identification in Bitcoin
Figure 4 for Towards Malicious address identification in Bitcoin
Viaarxiv icon

Vulnerability and Transaction behavior based detection of Malicious Smart Contracts

Add code
Jun 25, 2021
Figure 1 for Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Figure 2 for Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Figure 3 for Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Figure 4 for Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Viaarxiv icon

Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties

Add code
Jun 25, 2021
Figure 1 for Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Figure 2 for Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Figure 3 for Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Figure 4 for Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Viaarxiv icon

Sequence to sequence deep learning models for solar irradiation forecasting

Add code
Apr 30, 2019
Figure 1 for Sequence to sequence deep learning models for solar irradiation forecasting
Figure 2 for Sequence to sequence deep learning models for solar irradiation forecasting
Figure 3 for Sequence to sequence deep learning models for solar irradiation forecasting
Figure 4 for Sequence to sequence deep learning models for solar irradiation forecasting
Viaarxiv icon