Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Securing the Digital Enterprise
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
The future of interaction & its security challenges
Web Application Security 101
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
National Critical Information Infrastructure Protection Centre (NCIIPC): Role and Responisbilities
Identification and Analysis of Malicious Content on Facebook: A Survey
A Strategy for Addressing Cyber Security Challenges
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating Cyber Risk
Video Inpainting detection using inconsistencies in optical Flow
TASVEER : Tomography of India’s Internet Infrastructure
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Implementations