IITH
BEACON: A Unified Behavioral-Tactical Framework for Explainable Cybercrime Analysis with Large Language Models
IITH
Cyber Slavery Infrastructures: A Socio-Technical Study of Forced Criminality in Transnational Cybercrime
IITH
Cyber Crime Navigator
IITH
FCPI: Intervention-Aware Prioritization of Cyber-Enabled Investment Fraud under Partial Observability
IITH
AuditorMatch: A data-driven decision-support system for evaluating and selecting cybersecurity auditors
IITH
LolBin Detection Trusted Yet Disguised: Analysing the Subversive Role of LOLBins in Contemporary Cyber Threats
IITH
The MACAW
IITH
Advanced Tools and Techniques for Intelligence Extraction and Automated Attribution of Advanced Persistent Threats
IITH
Centre Poster


For more details write to rndshowcase.iiit.ac.in