default search action
Rafidha Rehiman K. A.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j10]Jahez Abraham Johny, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti:
Deep learning fusion for effective malware detection: leveraging visual features. Clust. Comput. 28(2): 135 (2025) - [j9]Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, P. Vinod:
SeCTIS: A framework to Secure CTI Sharing. Future Gener. Comput. Syst. 164: 107562 (2025) - [j8]K. M. Sameera, Arnaldo Sgueglia, P. Vinod, Rafidha Rehiman K. A., Corrado Aaron Visaggio, Andrea Di Sorbo, Mauro Conti:
SecDefender: Detecting low-quality models in multidomain federated learning systems. Future Gener. Comput. Syst. 164: 107587 (2025) - [j7]K. A. Asmitha, P. Vinod, Rafidha Rehiman K. A., Neeraj Raveendran, Mauro Conti:
Android malware defense through a hybrid multi-modal approach. J. Netw. Comput. Appl. 233: 104035 (2025) - 2024
- [j6]K. A. Asmitha, Vinod Puthuvath, Rafidha Rehiman K. A., S. L. Ananth:
Deep learning vs. adversarial noise: a battle in malware image analysis. Clust. Comput. 27(7): 9191-9220 (2024) - [j5]K. M. Sameera, Vinod P., Rafidha Rehiman K. A., Mauro Conti:
LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network. Comput. Networks 254: 110768 (2024) - [j4]K. M. Sameera, Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P., Mauro Conti:
Privacy-preserving in Blockchain-based Federated Learning systems. Comput. Commun. 222: 38-67 (2024) - [j3]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Georgiana Timpau, Mauro Conti:
OSTIS: A novel Organization-Specific Threat Intelligence System. Comput. Secur. 145: 103990 (2024) - [j2]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Rabeeba Abdul Rasheed, Mauro Conti:
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis. J. Netw. Syst. Manag. 32(4): 88 (2024) - 2023
- [j1]K. M. Sameera, Rafidha Rehiman K. A., P. Vinod:
A Privacy Preservation Framework Using Integration of Blockchain and Federated Learning. SN Comput. Sci. 4(6): 703 (2023)
Conference and Workshop Papers
- 2024
- [c4]Matteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman K. A., Mauro Conti:
SoK: Visualization-based Malware Detection Techniques. ARES 2024: 45:1-45:13 - [c3]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Mauro Conti:
Relation Extraction Techniques in Cyber Threat Intelligence. NLDB (1) 2024: 348-363 - [c2]K. M. Sameera, M. Abhinav, P. P. Amal, T. Babu Abhiram, Raj K. Abishek, Tomichen Amal, P. Anaina, P. Vinod, Rafidha Rehiman K. A., Mauro Conti:
DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated Learning. SPACE 2024: 129-148 - 2022
- [c1]Dincy R. Arikkat, Rafidha Rehiman K. A., Vinod P., Suleiman Y. Yerima, Manoja W, Pooja S, Shilpa Sekhar, Sohan James, Josna Philomina:
Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques. IC3 2022: 305-312
Informal and Other Publications
- 2024
- [i6]K. M. Sameera, Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P, Mauro Conti:
Privacy-Preserving in Blockchain-based Federated Learning Systems. CoRR abs/2401.03552 (2024) - [i5]Jahez Abraham Johny, Vinod P., K. A. Asmitha, Radhamani G, Rafidha Rehiman K. A., Mauro Conti:
Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features. CoRR abs/2405.14311 (2024) - [i4]Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Vinod P:
SeCTIS: A Framework to Secure CTI Sharing. CoRR abs/2406.14102 (2024) - [i3]Dincy R. Arikkat, Abhinav M., Navya Binu, Parvathi M., Navya Biju, K. S. Arunima, Vinod P., Rafidha Rehiman K. A., Mauro Conti:
IntellBot: Retrieval Augmented LLM Chatbot for Cyber Threat Knowledge Delivery. CoRR abs/2411.05442 (2024) - 2023
- [i2]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado Aaron Visaggio, Mauro Conti:
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? CoRR abs/2306.16087 (2023) - [i1]Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., P. Vinod, Mauro Conti:
NLP-Based Techniques for Cyber Threat Intelligence. CoRR abs/2311.08807 (2023)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint