Research
Shikhar Pandey
Last Updated: April 6, 2026Exploring graph neural networks, topological data analysis, quantum algorithms, and mathematical modeling for next-generation computational frameworks.
Sheri Vishnu Vardhan Reddy
Last Updated: April 6, 2026Developing AI-driven intrusion detection approaches for industrial control systems using LSTM autoencoders, hybrid frameworks, and time-series analysis.
Luice Khamboo
Last Updated: April 6, 2026Designing machine learning systems that classify incoming URLs as phishing or legitimate for financial-services protection.
Rohith Reddy Battula
Last Updated: April 6, 2026Building hybrid intrusion detection systems for industrial control systems with a focus on advanced persistent threat detection.
Esther Dhiramo
Last Updated: April 6, 2026Evaluating intelligent intrusion detection strategies for SCADA and ICS environments across machine learning, deep learning, and hybrid models.
Vaishnavi Kottala
Last Updated: April 6, 2026Applying machine learning and deep learning models to improve DDoS detection and mitigation in 5G network environments.
Defending Characteristics and Attribution Analysis for Phishing Attacks
Last Updated: April 6, 2026A. Al-Sinayyid, M.J.A. Jewel, V. Mannuru, K. Sasidhar
Artificial Intelligence-Driven Solutions for Phishing Detection: A Comparative Analysis of Machine Learning Models
Last Updated: April 6, 2026R. Castellanos, A. Al-Sinayyid, E. Valencia, J. Gilliland, E. Dhiramo, et al.
Blockchain-Based Security Algorithms Evaluation for SCADA/ICS Systems
Last Updated: April 6, 2026E. Dhiramo, A. Al-Sinayyid
Real-Time Detection of Time-Based Blind SQL Injection Using Machine Learning for Critical Infrastructure
Last Updated: April 6, 2026V. Mannuru, A. Al-Sinayyid, S. Kadiyala, R.R. Battula