Author of the publication

From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads.

, , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Chunduri, Hrushikesh
add a person with the name Chunduri, Hrushikesh
 

Other publications of authors with the same name

ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats., , , , , , , and . DTRAP, 5 (3): 21:1-21:35 (2024)A Multi Class Classification for Detection of IoT Botnet Malware., , and . COMS2, volume 1416 of Communications in Computer and Information Science, page 17-29. Springer, (2021)From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads., , , and . CoRR, (2023)A Comprehensive Analysis of Machine Learning Based File Trap Selection Methods to Detect Crypto Ransomware., , , and . CoRR, (2024)RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files., , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 209-229. Springer, (2023)A Framework for Advanced Persistent Threat Attribution using Zachman Ontology., , , and . EICC, page 34-41. ACM, (2023)DOTMUG: A Threat Model for Target Specific APT Attacks-Misusing Google Teachable Machine., , , , and . ISDFS, page 1-8. IEEE, (2022)A Forensic Analysis on the Availability of MQTT Network Traffic., and . SSCC, volume 1364 of Communications in Computer and Information Science, page 262-274. Springer, (2020)