SG

Sandhya Guduru

Mutual Connections
Loading...
S9-042025-2911796

Send Message

No file chosen
5 Publications
0 Followers
0 Following
0 Questions

👤 About

Skills & Expertise

No skills added yet.

Research Interests

No research interests added yet.

Connect With Me

📚 Publications (5)

Journal: International Journal of Computer Science and Information Technology Research • February 2025
The increasing sophistication of cyber threats necessitates the adoption of advanced, autonomous defense mechanisms. Large Language Models (LLMs) have emerged as a powerful tool for automa...
Autonomous cyber defense Large language models (llms) Langchain Security orchestration automation and response (soar) Mitre att&ck Probabilistic graphical models (pgms) Ai-driven incident response Cybersecurity automation.
Journal: International Journal of Computer Engineering and Technology • February 2022
Phishing remains one of the most persistent threats to organizational cybersecurity. This study presents an automated framework integrating Gophish-based phishing simulations with Microsoft Azure Acti...
Phishing simulation Gophish Azure ad Conditional access Userrisk Scorm training Cybersecurity automation Nlp Pytorch Phishing awareness +1 more
Journal: International Journal of Computer Science and Information Technology Research • August 2024
Quantum Key Distribution (QKD) protocols, particularly the decoy-state BB84, offer a promising approach to enhancing network security by enabling theoretically unbreakable encryption. Integrating QKD...
Quantum key distribution (qkd) Opendaylight sdn controllers Automated key rotation Ipsec and vpn tunnels Quantum bit error rate (qber)
Journal: International Journal of Computer Science and Information Technology Research • August 2022
This paper proposes a serverless, automated incident response framework tailored for cloud-native environments. The workflow integrates AWS Lambda for EBS snapshot acquisition, Velociraptor for live...
Automated incident response Aws lambda Digital forensics Velociraptor Timesketch Yara Virustotal api Memory forensics Serverless computing Cloud-native security
Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) • August 2019
Organizations must implement robust disaster recovery (DR) strategies to ensure business continuity. Traditional DR solutions often rely on manual intervention, leading to delays in recovery and incre...
Disaster recovery automation Infrastructure-as-code (iac) Rpo/rto optimization Terraform and ansible Aws cloudformation
dd