no code implementations • 2 Apr 2024 • Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao
Furthermore, such constraints limit the detection of emerging malware samples due to the lack of sufficient malware samples required for efficient training.
no code implementations • 3 Aug 2022 • Sanket Shukla
The above mentioned challenges are addressed by demonstrating proposed techniques to design a secure and robust cognitive system.
no code implementations • 14 Apr 2021 • Abhijitt Dhavlle, Sanket Shukla
Our computer systems for decades have been threatened by various types of hardware and software attacks of which Malwares have been one of them.