1. Guarding Against Command and Control (C2) Agents Utilizing Real-World Applications for Communication Channels;2024 5th International Conference for Emerging Technology (INCET);2024-05-24
2. Classifying DNS over HTTPS Malicious/Benign Traffic Using Deep Learning Models;2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI);2023-11-25
3. Weaponizing Real-world Applications as C2 (Command and Control);2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA);2023-03-14