A Survey on Zero-Day Polymorphic Worm Detection Techniques R Kaur, M Singh IEEE Communications Surveys & Tutorials, 1-30, 2014 | 103 | 2014 |
Code authorship attribution: Methods and challenges V Kalgutkar, R Kaur, H Gonzalez, N Stakhanova, A Matyukhina ACM Computing Surveys (CSUR) 52 (1), 1-36, 2019 | 102 | 2019 |
A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps R Kaur, Y Li, J Iqbal, H Gonzalez, N Stakhanova 42nd IEEE International Conference on Computer Software & Applications …, 2018 | 34 | 2018 |
Efficient hybrid technique for detecting zero-day polymorphic worms R Kaur, M Singh 2014 IEEE International Advance Computing Conference (IACC), 95-100, 2014 | 33 | 2014 |
A Hybrid real-time zero-day attack detection and analysis system R Kaur, M Singh IJ Computer Network and Information Security 9, 19-31, 2015 | 26 | 2015 |
Automatic evaluation and signature generation technique for thwarting zero-day attacks R Kaur, M Singh International Conference on Security in Computer Networks and Distributed …, 2014 | 13 | 2014 |
Unmasking Android Obfuscation Tools Using Spatial Analysis R Kaur, Y Ning, H Gonzalez, N Stakhanova 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018 | 12 | 2018 |
Hybrid Real-time Zero-day Malware Analysis and Reporting System R Kaur, M Singh | 11 | 2016 |
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices GA Zendehdel, R Kaur, I Chopra, N Stakhanova, E Scheme ACM Transactions on Internet Technology (TOIT) 22 (1), 1-31, 2021 | 6 | 2021 |
PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering J Iqbal, R Kaur, N Stakhanova Proceedings of the 14th International Conference on Availability …, 2019 | 5 | 2019 |
Hardening OS Identity by Customised Masking Techniques R Kaur, M Singh Indo US Workshop and Conference on Cyber Security, Cyber Crime and Cyber …, 2009 | 5 | 2009 |
Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks R Kaur, M Singh International Conference on Risks and Security of Internet and Systems, 164-179, 2014 | 4 | 2014 |
Efficient Zero-day Attacks Detection Techniques R Kaur, M Singh | 1 | 2016 |
Immune-Inspired Self-Protection Model for Securing Grid I Chopra, R Kaur International Journal of Information Technology and Computer Science 8 (3 …, 2016 | 1 | 2016 |
Efficient Zero-day Polymorphic Worm Detection Technique R Kaur, M Singh 12th annual Grace Hopper Celebration of Women in Computing, Baltimore, USA, 2012 | | 2012 |
Hardening Linux Operating System to Mask against Fingerprinting R Kaur, M Singh Thapar University, 2009 | | 2009 |