- Understanding IoT botnets
- Securing the Internet of Things
- Automated Fuzzing for vulnerability analysis
- A Game-Theoretic Approach to Evaluate Security Efficacy of Security Controls Frameworks
- Application of Unmanned Aerial Vehicles in Cyber Counterterrorism
- Predicting terrorism using Deep Neural Networks (DNNs)
- Fine-tuning BERT for HTTP Payload Classification in Network Traffic
- BERT-Based RASP: Enhancing Runtime Application Security with Fine-Tuned BERT
- Leveraging Large Language Model(LLM) for Natural Language to SQL Query Generation in HR Analytics