Research

View Categories
Research icon

Research

18 Docs

Shikhar Pandey

Last Updated: April 6, 2026

Exploring graph neural networks, topological data analysis, quantum algorithms, and mathematical modeling for next-generation computational frameworks.

Sheri Vishnu Vardhan Reddy

Last Updated: April 6, 2026

Developing AI-driven intrusion detection approaches for industrial control systems using LSTM autoencoders, hybrid frameworks, and time-series analysis.

Luice Khamboo

Last Updated: April 6, 2026

Designing machine learning systems that classify incoming URLs as phishing or legitimate for financial-services protection.

Rohith Reddy Battula

Last Updated: April 6, 2026

Building hybrid intrusion detection systems for industrial control systems with a focus on advanced persistent threat detection.

Esther Dhiramo

Last Updated: April 6, 2026

Evaluating intelligent intrusion detection strategies for SCADA and ICS environments across machine learning, deep learning, and hybrid models.

Vaishnavi Kottala

Last Updated: April 6, 2026

Applying machine learning and deep learning models to improve DDoS detection and mitigation in 5G network environments.

Defending Characteristics and Attribution Analysis for Phishing Attacks

Last Updated: April 6, 2026

A. Al-Sinayyid, M.J.A. Jewel, V. Mannuru, K. Sasidhar

Artificial Intelligence-Driven Solutions for Phishing Detection: A Comparative Analysis of Machine Learning Models

Last Updated: April 6, 2026

R. Castellanos, A. Al-Sinayyid, E. Valencia, J. Gilliland, E. Dhiramo, et al.

Blockchain-Based Security Algorithms Evaluation for SCADA/ICS Systems

Last Updated: April 6, 2026

E. Dhiramo, A. Al-Sinayyid

Real-Time Detection of Time-Based Blind SQL Injection Using Machine Learning for Critical Infrastructure

Last Updated: April 6, 2026

V. Mannuru, A. Al-Sinayyid, S. Kadiyala, R.R. Battula

Scroll to Top