ICSSR Sponsored National Conference on Cyber Threat Intelligence and Attacker Behaviour Analysis - Viksith Bharath 2047 Perspective

Special Issue of ICSSR - National Conference on Cyber Threat Intelligence and Attacker Behaviour Analysis-February 2025 

No. Article Title and Authors Name Page No Download
1

SPAMSPOTTERELITE: "IDENTIFYING SPAM, PROTECTING YOUR MESSAGES"
Bhavana Mukku, Chaitanya Kishore Reddy Mukku      DOI: 10.46647/ijetms.2025.v09si01.001

1 - 11 Download
2

IMAGE STEGANALYSIS AND SECURITY ENHANCEMENT USING MIDPOINT TRANSFORMATION
P. Lalitha Mani Priya, Dr.B.Rama Subba Reddy      DOI: 10.46647/ijetms.2025.v09si01.002

12 - 17 Download
3

Harnessing Machine Learning for Advanced Attacker Behavior Analysis in Cybersecurity
Ganla Sneha, G Manogna, T C Swetha Priya      DOI: 10.46647/ijetms.2025.v09si01.003

18 - 26 Download
4

Unmasking Cyber Adversaries: Leveraging Cyber Threat Intelligence for Attacker Behavior Analysis
Dr.Vijayalakshmi Chintamaneni, Dr.M.SreeRamu, Penubala Nagarjuna,Praswika Meekala, Pentamaraju Sumegha      DOI: 10.46647/ijetms.2025.v09si01.004

27 - 36 Download
5

Street-Light Emergency Buzzer System
Sunitha Lingam, P. Shivani, K. Varnika, V. Jahnavi      DOI: 10.46647/ijetms.2025.v09si01.005

37 - 42 Download
6

Role of Accomplices in Morphing Attacks: A Comprehensive Survey
Naheed Sultana, T C Swetha Priya      DOI: 10.46647/ijetms.2025.v09si01.006

43 - 50 Download
7

Honeypot Detection System
Lokeswari Mrudula Anjali Pandi, Shrija Reddy Mekala, Meghana Raparthi      DOI: 10.46647/ijetms.2025.v09si01.007

51 - 57 Download
8

Leveraging AI and Machine Learning to Decode Adversarial Tactics, Techniques, and Procedures
J Manasa Krishna      DOI: 10.46647/ijetms.2025.v09si01.008

58 - 61 Download
9

FAKE NEWS DETECTION USING MACHINE LEARNING
C.Gayathri Reddy, E.Kiran Sirisha, G.Hima Bindu      DOI: 10.46647/ijetms.2025.v09si01.009

62 - 66 Download
10

Cybersecurity Threat Analysis and Behaviour Analysis: A Comprehensive Approach to Proactive Défense
B.S.Mounika Yadav, Komali Guthikonda, Venu Matta      DOI: 10.46647/ijetms.2025.v09si01.010

67 - 70 Download
11

Biohacking and Cybersecurity: The Threat of Implanted Medical Devices
DHANUSH VONTELA      DOI: 10.46647/ijetms.2025.v09si01.011

71 - 77 Download
12

A Survey on Hybrid Secure Key Management System (HSKMS) for Multi-Tenant Cloud Environments
Sree Lakshmi Done, Dr. Siva Rama Krishna T      DOI: 10.46647/ijetms.2025.v09si01.012

78 - 84 Download
13

Advanced Phishing Protection Techniques
Mamatha.P      DOI: 10.46647/ijetms.2025.v09si01.013

85 - 89 Download
14

Phishing Website Detection using Machine Learning
Manasa K, Patta Sai, D Sai Balaji, D Abhiram      DOI: 10.46647/ijetms.2025.v09si01.014

90 - 95 Download
15

Behavioral Profiling of Cyber Attackers: Identifying Patterns and Mitigating Threats
Mr.Edukondalu Simhadati      DOI: 10.46647/ijetms.2025.v09si01.015

96 - 100 Download
16

Machine Learning-Based Predictive Model for Web Application Vulnerability Detection
Manisha Marella, Purelli Sanjana Reddy, Akhila Kadimetla      DOI: 10.46647/ijetms.2025.v09si01.016

101 - 104 Download
17

Understanding Social Engineering Tactics and Their Impact on Cyber Attacks
D Neeraja, Mr.Edukondalu Simhadati      DOI: 10.46647/ijetms.2025.v09si01.017

105 - 110 Download
18

CYBER ATTACKS AND HUMAN PSYCHOLOGY: THE ROLE OF SOCIAL ENGINEERING
N. Hiranmai      DOI: 10.46647/ijetms.2025.v09si01.018

111 - 114 Download
19

Digital Withdrawal and Social Isolation among Older Adults: Psychological Consequences of Cyber Attacks
Vennapusa Jahnavi      DOI: 10.46647/ijetms.2025.v09si01.019

115 - 119 Download
20

SURVEY ON CYBER KILL CHAIN
Manasa K      DOI: 10.46647/ijetms.2025.v09si01.020

120 - 125 Download
21

Password Vulnerability assessment: a safe checker using online breach data
Mamatha.P      DOI: 10.46647/ijetms.2025.v09si01.021

126 - 131 Download
22

Insider Threats in the Age of Cyber Threat Intelligence: Behavioral Indicators and Detection Strategies
Dr.Vijayalakshmi Chintamaneni, Dr.M.SreeRamu, Shaik Abubakar Siddiq      DOI: 10.46647/ijetms.2025.v09si01.022

132 - 143 Download
23

Leveraging Automation for Real-Time Threat Detection and Response
Zaibunnisa Begum, and T C Swetha Priya      DOI: 10.46647/ijetms.2025.v09si01.023

144 - 151 Download
24

Cyber Threat Data Collection and Threat Analysis: Building a Foundation for Proactive Cybersecurity
J. Manasa Krishna, B.S.Mounika Yadav      DOI: 10.46647/ijetms.2025.v09si01.024

152 - 155 Download
25

Cognitive Cyber Threat Intelligence: AI-Driven Behavioural Profiling for Proactive Security
Dr. Rajitha Kotoju, Md. Abrar Khan      DOI: 10.46647/ijetms.2025.v09si01.025

156 - 159 Download