CONFERENCE

International Conference (Outside India)

  • Hiran V Nath, Babu M. Mehtre, Analysis of a Multistage Attack Embedded in a Video File. International Conference on Secure Knowledge Management in Bigdata era 2014 (SKM-2014) (6th Bi-Yearly Conference organised by State University of New York at Buffalo), Birla Institute of Technology and Science (BITS) Pilani, Dubai Campus, Dubai, UAE, December 8 - 9, 2014.

International Conference (In India)

  • N Renya Nath, Hiran V Nath, Critical Analysis of IoT Ecosystem to Understand Security Threats and Challenges, International Conference on Cyber Warfare, Security and Space Research, Pages 64-74, Springer, 2022.

  • Justin Sunny, Kenil Shah, Prajwal Ghoradkar, Manu Jose, Malhar Shirswar, Hiran V. Nath, V. Madhusudanan Pillai, Blockchain: A Makeover to Supply Chain Management, CIMS-2020, 9 – 11 Oct 2020 (Accepted)

  • Bijitha C.V, Rohit Sukumaran, Hiran V. Nath, A Survey on Ransomware Detection Techniques, Secure Knowledge Management In Artificial Intelligence Era. (SKM 2019). CCIS, vol 1186. Springer.

  • Kiran Radhakrishnan, Rajeev R. Menon, Hiran V. Nath. A Survey of Zero-Day Malware Attacks and its Detection Methodology, TENCON IEEE Region 10 Conference, 2019.

  • Hiran V Nath, Babu M. Mehtre, Ensemble Learning for Detection of Malicious Content Embedded in PDF Documents, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (IEEE SPICES) (Bi-Yearly Conference by IEEE Kerala Section), National Institute of Technology Calicut (NITC), Kozhikode, India, February 19 - 21, 2015, DOI: 10.1109/SPICES.2015.7091371

  • Hiran V Nath, Babu M. Mehtre, Static Malware Analysis Using Machine Learning Methods. Second International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Springer CCIS 420, Pages 440-450, March 13 - 14, 2014, DOI: 10.1007/978-3-642-54525-2_39.

  • Hiran V Nath, K Gangadharan, M Sethumadhavan, Reconciliation Engine and Metric for Network Vulnerability Assessment. First International Conference on Security of Internet of Things (SECURIT '12), ACM, Pages 9-21, August 17 - 19, 2012, DOI: 10.1145/2490428.2490430.

  • Hiran V Nath. Vulnerability Assessment Methods - A Review. Advances in Network Security and Applications (CNSA 2011), Springer CCIS 196, pages.1-10, July 15 - 17, 2011, DOI: 10.1007/978-3-642- 22540-6_1.

  • Arun R, K Praveen, Divya Chandra Bose, Hiran V Nath. A Distortion Free Relational Database Watermarking Using Patch Work Method. International Conference on Information Systems Design and Intelligent Applications 2012, Springer, pages: 531 - 538, Jan 5 - 7, 2012, DOI: 10.1007/978-3-642-27443-5_61.

  • Deepa D Shankar, Gireesh kumar T, Hiran V Nath, Steganalysis for calibrated and lower embedded uncalibrated images. Swarm, Evolutionary, and Memetic Computing (SEMCCO 2011), Springer, pages: 294-301, December 19 - 21, 2011, DOI: 10.1007/978-3-642-27242-4_34.

National Conference (In India)

  • Hiran V Nath, Babu M. Mehtre, Video Files and Multistage Attacks : (Im)Possible???. 11th IEEE India Conference INDICON 2014 Emerging Trends and Innovation in Technology, YASHADA, Pune, India, December 11 - 13, 2014, DOI: 10.1109/INDICON.2014.7030520.

  • Aathira K S, Hiran V Nath, Thulasi N Kutty, Gireesh Kumar T. Low Budget Honeynet Creation and Implementation for NIDS & NIPS. National Conference on Networking Paradigms and Cyber Security, IETE South Zonal Seminar, August 14, 2010.