Manoj Singh Gaur

Orcid: 0000-0002-0497-721X

According to our database1, Manoj Singh Gaur authored at least 201 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC.
J. Supercomput., October, 2023

An improved reconfiguration algorithm for handling 1-point NoC failures.
Microprocess. Microsystems, 2023

SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks.
IEEE Access, 2023

Tracking PII ex-filtration: Exploring decision tree and neural network with explainable AI.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

2022
Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture.
Microprocess. Microsystems, June, 2022

QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges.
ACM Trans. Internet Techn., 2022

2021
<i>Scaling & fuzzing: </i> Personal image privacy from automated attacks in mobile cloud computing.
J. Inf. Secur. Appl., 2021

MapperDroid: Verifying app capabilities from description to permissions and API calls.
Comput. Secur., 2021

2020
QuickDedup: Efficient VM deduplication in cloud computing environments.
J. Parallel Distributed Comput., 2020

TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration.
Integr., 2020

<i>SneakLeak+</i>: Large-scale klepto apps analysis.
Future Gener. Comput. Syst., 2020

A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
ACM Comput. Surv., 2020

EspyDroid+: Precise reflection analysis of android apps.
Comput. Secur., 2020

SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage.
Comput. Commun., 2020

Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage.
Autom. Control. Comput. Sci., 2020

Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020

Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution.
Proceedings of the 28th IFIP/IEEE International Conference on Very Large Scale Integration, 2020

Edge Preserving Image Fusion using Intensity Variation Approach.
Proceedings of the 2020 IEEE Region 10 Conference, 2020

2019
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures.
J. Supercomput., 2019

You click, I steal: analyzing and detecting click hijacking attacks in web pages.
Int. J. Inf. Sec., 2019

TILAK: A token-based prevention approach for topology discovery threats in SDN.
Int. J. Commun. Syst., 2019

ETGuard: Detecting D2D attacks using wireless Evil Twins.
Comput. Secur., 2019

SLDP: A secure and lightweight link discovery protocol for software defined networking.
Comput. Networks, 2019

UAVs Reliable Transmission for Multicast Protocols in FANETs.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Preventing Scan Attack through Test Response Encryption.
Proceedings of the 2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2019

Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

MAPPER: Mapping Application Description to Permissions.
Proceedings of the Risks and Security of Internet and Systems, 2019

2018
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
Wirel. Networks, 2018

Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

SWORD: Semantic aWare andrOid malwaRe Detector.
J. Inf. Secur. Appl., 2018

Human Face Detection Enabled Smart Stick for Visually Impaired People.
Proceedings of the Data Science and Big Data Analytics, 2018

3D LBDR: Logic-Based Distributed Routing for 3D NoC.
Proceedings of the VLSI Design and Test - 22nd International Symposium, 2018

A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2018

APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Bloom Filter Based Privacy Preserving Deduplication System.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Embedded Assistive Stick for Visually Impaired Persons.
Proceedings of the 9th International Conference on Computing, 2018

Privacy Preserving Data Offloading Based on Transformation.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
Path and Link Aware Routing Algorithm for Cognitive Radio Wireless Mesh Network.
Wirel. Pers. Commun., 2017

Moralism: mobility prediction with link stability based multicast routing protocol in MANETs.
Wirel. Networks, 2017

Balanced energy routing protocol for clustered wireless sensor network.
Int. J. Inf. Commun. Technol., 2017

Improved multicast routing in MANETs using link stability and route stability.
Int. J. Commun. Syst., 2017

QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges.
CoRR, 2017

Android inter-app communication threats and detection techniques.
Comput. Secur., 2017

DDoS attacks in cloud computing: Issues, taxonomy, and future directions.
Comput. Commun., 2017

Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions.
IEEE Cloud Comput., 2017

DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Comput. Electr. Eng., 2017

Service resizing for quick DDoS mitigation in cloud computing environment.
Ann. des Télécommunications, 2017

Multi-constraints link stable multicast routing protocol in MANETs.
Ad Hoc Networks, 2017

A comprehensive and effective mechanism for DDoS detection in SDN.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip.
Proceedings of the VLSI Design and Test - 21st International Symposium, 2017

Improving Leakage Path Coverage in Android Apps.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SniffDroid: Detection of Inter-App Privacy Leaks in Android.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SneakLeak: Detecting Multipartite Leakage Paths in Android Apps.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

'Global view' in SDN: existing implementation, vulnerabilities & threats.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Secure and efficient proof of ownership for deduplicated cloud storage.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Flooding in secure wireless sensor networks: Student contribution.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

A Power, Thermal and Reliability-Aware Network-on-Chip.
Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems, 2017

Panorama: Real-time bird's eye view of an OpenFlow network.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

Secure Random Encryption for Deduplicated Storage.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Proceedings of the Risks and Security of Internet and Systems, 2017

Multiple distance sensors based smart stick for visually impaired people.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

FICUR: Employing SDN programmability to secure ARP.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Detection of Information Leaks via Reflection in Android Apps.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Detecting Inter-App Information Leakage Paths.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis.
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016

Resilient routing implementation in 2D mesh NoC.
Microelectron. Reliab., 2016

ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network.
Int. J. Commun. Syst., 2016

Guest Editorial.
IET Comput. Digit. Tech., 2016

<i>σ</i> <sup> <i>n</i> </sup>LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip.
IET Comput. Digit. Tech., 2016

Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016

Android App Collusion Threat and Mitigation Techniques.
CoRR, 2016

Colluding browser extension attack on user privacy and its implication for web browsers.
Comput. Secur., 2016

DDoS attacks in cloud computing: Collateral damage to non-targets.
Comput. Networks, 2016

MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks.
Proceedings of the 2016 Wireless Days, 2016

A Power Efficient Dual Link Mesh NoC Architecture to Support Nonuniform Traffic Arbitration at Routing Logic.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016

Reducing FIFO buffer power using architectural alternatives at RTL.
Proceedings of the 20th International Symposium on VLSI Design and Test, 2016

Android component vulnerabities: Proof of concepts and mitigation.
Proceedings of the 2016 International Conference on Information Networking, 2016

Detection of SQLite Database Vulnerabilities in Android Apps.
Proceedings of the Information Systems Security - 12th International Conference, 2016

ELBA: Efficient Layer Based Routing Algorithm in SDN.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

FlowMine: Android app analysis via data flow.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Intersection Automata Based Model for Android Application Collusion.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Bandwidth-aware routing and admission control for efficient video streaming over MANETs.
Wirel. Networks, 2015

Employing Program Semantics for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2015

A Brief Comment on "A Complete Self-Testing and Self-Configuring NoC Infrastructure for Cost-Effective MPSoCs" [ACM Transactions on Embedded Computing Systems 12 (2013) Article 106].
ACM Trans. Embed. Comput. Syst., 2015

JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET.
J. Inf. Secur. Appl., 2015

AndroSimilar: Robust signature for detecting variants of Android malware.
J. Inf. Secur. Appl., 2015

Editorial: Special issue on security of information and networks.
J. Inf. Secur. Appl., 2015

Probabilistic model for nanocell reliability evaluation in presence of transient errors.
IET Comput. Digit. Tech., 2015

Android Security: A Survey of Issues, Malware Penetration, and Defenses.
IEEE Commun. Surv. Tutorials, 2015

Multivariate verification for sybil attack detection in VANET.
Open Comput. Sci., 2015

CERI: Cost-Effective Routing Implementation Technique for Network-on-Chip.
Proceedings of the 28th International Conference on VLSI Design, 2015

C<sup>2</sup>-DLM: Cache coherence aware dual link mesh for on-chip interconnect.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015

A framework for thermal aware reliability estimation in 2D NoC.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015

Modeling and synthesis of molecular memory.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015

σLBDR: Congestion-aware logic based distributed routing for 2D NoC.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015

Network-on-chip: Current issues and challenges.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015

DDoS/EDoS attack in cloud: affecting everyone out there!
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

sandFOX: secure sandboxed and isolated environment for firefox browser.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

A robust dynamic analysis system preventing SandBox detection by Android malware.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

DynaDroid: dynamic binary instrumentation based app behavior monitoring framework.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

DRACO: DRoid analyst combo an android malware analysis framework.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Characterizing impacts of multi-Vt routers on power and reliability of Network-on-Chip.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

d<sup>2</sup>-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
Exploiting convergence characteristics to tackle collusion attacks in OLSR for <i>Security and Communication Networks</i>.
Secur. Commun. Networks, 2014

Probabilistic modeling and analysis of molecular memory.
ACM J. Emerg. Technol. Comput. Syst., 2014

Sybil attack detection in VANET using neighbouring vehicles.
Int. J. Secur. Networks, 2014

Detecting malicious files using non-signature-based methods.
Int. J. Inf. Comput. Secur., 2014

CARM: Congestion Adaptive Routing Method for On Chip Networks.
Proceedings of the 2014 27th International Conference on VLSI Design, 2014

A novel non-minimal turn model for highly adaptive routing in 2D NoCs.
Proceedings of the 22nd International Conference on Very Large Scale Integration, 2014

Distributed adaptive routing for spidergon NoC.
Proceedings of the 18th International Symposium on VLSI Design and Test, 2014

Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Exploring Worm Behaviors using DTW.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Analysis of Identity Forging Attack in MANETs.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

P-SPADE: GPU accelerated malware packer detection.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Fault tolerant routing implementation mechanism for irregular 2D mesh NoCs.
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014

A novel non-minimal/minimal turn model for highly adaptive routing in 2D NoCs.
Proceedings of the Eighth IEEE/ACM International Symposium on Networks-on-Chip, 2014

Improved Route Selection Approaches using Q-learning framework for 2D NoCs.
Proceedings of the 3rd International Workshop on Many-core Embedded Systems (MES'2015) held on June 13, 2014

TMAC - Token based MAC protocol for cognitive radio wireless mesh network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Privacy Leakage Attacks in Browsers by Colluding Extensions.
Proceedings of the Information Systems Security - 10th International Conference, 2014

LSMRP: Link stability based multicast routing protocol in MANETs.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

Highly adaptive and congestion-aware routing for 3D NoCs.
Proceedings of the Great Lakes Symposium on VLSI 2014, GLSVLSI '14, Houston, TX, USA - May 21, 2014

Environment-Reactive Malware Behavior: Detection and Categorization.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Fault tolerant and highly adaptive routing for 2D NoCs.
Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2014

Dynamic fault injection model for on-chip 2D mesh network.
Proceedings of the 7th ACM India Computing Conference, 2014

2013
Near-Optimal Geometric Feature Selection for Visual speech Recognition.
Int. J. Pattern Recognit. Artif. Intell., 2013

Information theft through covert channel by exploiting HTTP post method.
Proceedings of the Tenth International Conference on Wireless and Optical Communications Networks, 2013

Fault Aware Dynamic Adaptive Routing Using LBDR.
Proceedings of the VLSI Design and Test, 17th International Symposium, 2013

The darker side of Firefox extension.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Insecurities within browser: issues and challenges.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

AndroSimilar: robust statistical feature signature for Android malware detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Energy Efficient Clustered Routing for Wireless Sensor Network.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Energy Scavenging Based HybridGSM Model for Mobile Towers.
Proceedings of the Recent Advances in Intelligent Informatics, 2013

Ns-3 emulation on ORBIT testbed.
Proceedings of the International Conference on Advances in Computing, 2013

An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs.
Proceedings of the International Conference on Advances in Computing, 2013

Reconfigurable distributed fault tolerant routing algorithm for on-chip networks.
Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2013

Video streaming over MANETs: Testing and analysis using real-time emulation.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN.
Proceedings of the 4th International Conference on Ambient Systems, 2013

MCF: MultiComponent Features for Malware Analysis.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

Trust Establishment Techniques in VANET.
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013

2012
Lip peripheral motion for visual surveillance.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

ESCAPE: entropy score analysis of packed executable.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Detection attack analysis using partial watermark in DCT domain.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Detection of incorrect position information using speed and time span verification in VANET.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Mining control flow graph as <i>API call-grams</i> to detect portable executable malware.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

SPADE: Signature based PAcker DEtection.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Behavioural detection with <i>API call-grams</i> to identify malicious PE files.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Speaker identification using optimal lip biometrics.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

n-Gram modeling of relevant features for lip-reading.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

A rate adaptive and multipath routing protocol to support video streaming in MANETs.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

REFORM: Relevant Features for Malware Analysis.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
C-Routing: An adaptive hierarchical NoC routing methodology.
Proceedings of the IEEE/IFIP 19th International Conference on VLSI and System-on-Chip, 2011

A sybil attack detection approach using neighboring vehicles in VANET.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Acceleration of packet filtering using gpgpu.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Detour attack in OLSR.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

A Novel Attack Model Simulation in DSDV Routing.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Detection of Broken Link Fraud in DSDV Routing.
Proceedings of the Computer and Information Sciences II, 2011

Boundary Descriptors for Visual Speech Recognition.
Proceedings of the Computer and Information Sciences II, 2011

Parallelizing TUNAMI-N1 Using GPGPU.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

Acceleration of Functional Validation Using GPGPU.
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011

A Traffic Model for Concurrent Core Tasks in Networks-on-Chip.
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011

GA Based Congestion Aware Topology Generation for Application Specific NoC.
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011

PEAL - Packed Executable AnaLysis.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Misbehavior Detection Based on Ensemble Learning in VANET.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs.
Proceedings of the Advanced Communication and Networking, 2011

Scattered Feature Space for Malware Analysis.
Proceedings of the Advances in Computing and Communications, 2011

Contribution of Oral Periphery on Visual Speech Intelligibility.
Proceedings of the Advances in Computing and Communications, 2011

Broken Link Fraud in DSDV Routing - Detection and Countermeasure.
Proceedings of the Advances in Computing and Communications, 2011

Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs.
Proceedings of the Advances in Computing and Communications, 2011

A Novel Attack Model Simulation in OLSR.
Proceedings of the Advances in Computing and Communications, 2011

Robust Watermarking through Spatially Disjoint Transformations.
Proceedings of the Advances in Computing and Communications, 2011

Machine Learning Approach for Multiple Misbehavior Detection in VANET.
Proceedings of the Advances in Computing and Communications, 2011

Metamorphic Malware Analysis and Detection Methods.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

DoS Attacks in MANETs: Detection and Countermeasures.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2010
Collusion attack resistance through forced MPR switching in OLSR.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

A collusion attack detection method for OLSR-based MANETS employing scruple packets.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

A novel defense mechanism against sybil attacks in VANET.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Genetic algorithm based topology generation for application specific Network-on-Chip.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Fault grading using Instruction-Execution graph.
Proceedings of the 2010 East-West Design & Test Symposium, 2010

Thermal aware test scheduling for stacked multi-chip-modules.
Proceedings of the 2010 East-West Design & Test Symposium, 2010

Minimal Path, Fault Tolerant, QoS Aware Routing with Node and Link Failure in 2-D Mesh NoC.
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010

Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Lipreading Using <i>n</i>-Gram Feature Vector.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

Permuted Image DCT Watermarking.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2009
Static CFG analyzer for metamorphic Malware code.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Buyer seller watermarking protocol for digital rights management.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip.
Proceedings of the Contemporary Computing - Second International Conference, 2009

2008
Structural Fault Modelling in Nano Devices.
Proceedings of the Nano-Net - Third International ICST Conference, 2008

2004
Integrating Self Testability with Design Space Exploration by a Controller based Estimation Technique.
Proceedings of the 17th International Conference on VLSI Design (VLSI Design 2004), 2004

2003
Integrating testability with design space exploration.
Microelectron. Reliab., 2003


  Loading...