SLDP: A secure and lightweight link discovery protocol for software defined networking.
Nehra, A.; Tripathi, M.; Gaur, M. S.; Battula, R. B.; and Lal, C.
Comput. Networks, 150: 102–116. 2019.
Paper
doi
link
bibtex
1 download
@article{DBLP:journals/cn/NehraTGBL19,
author = {Ajay Nehra and
Meenakshi Tripathi and
Manoj Singh Gaur and
Ramesh Babu Battula and
Chhagan Lal},
title = {{SLDP:} {A} secure and lightweight link discovery protocol for software
defined networking},
journal = {Comput. Networks},
volume = {150},
pages = {102--116},
year = {2019},
url = {https://doi.org/10.1016/j.comnet.2018.12.014},
doi = {10.1016/J.COMNET.2018.12.014},
timestamp = {Sun, 22 Oct 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cn/NehraTGBL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
ETGuard: Detecting D2D attacks using wireless Evil Twins.
Jain, V.; Laxmi, V.; Gaur, M. S.; and Mosbah, M.
Comput. Secur., 83: 389–405. 2019.
Paper
doi
link
bibtex
@article{DBLP:journals/compsec/JainLGM19,
author = {Vineeta Jain and
Vijay Laxmi and
Manoj Singh Gaur and
Mohamed Mosbah},
title = {ETGuard: Detecting {D2D} attacks using wireless Evil Twins},
journal = {Comput. Secur.},
volume = {83},
pages = {389--405},
year = {2019},
url = {https://doi.org/10.1016/j.cose.2019.02.014},
doi = {10.1016/J.COSE.2019.02.014},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/JainLGM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
TILAK: A token-based prevention approach for topology discovery threats in SDN.
Nehra, A.; Tripathi, M.; Gaur, M. S.; Battula, R. B.; and Lal, C.
Int. J. Commun. Syst., 32(17). 2019.
Paper
doi
link
bibtex
1 download
@article{DBLP:journals/ijcomsys/NehraTGBL19,
author = {Ajay Nehra and
Meenakshi Tripathi and
Manoj Singh Gaur and
Ramesh Babu Battula and
Chhagan Lal},
title = {{TILAK:} {A} token-based prevention approach for topology discovery
threats in {SDN}},
journal = {Int. J. Commun. Syst.},
volume = {32},
number = {17},
year = {2019},
url = {https://doi.org/10.1002/dac.3781},
doi = {10.1002/DAC.3781},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijcomsys/NehraTGBL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
You click, I steal: analyzing and detecting click hijacking attacks in web pages.
Saini, A.; Gaur, M. S.; Laxmi, V.; and Conti, M.
Int. J. Inf. Sec., 18(4): 481–504. 2019.
Paper
doi
link
bibtex
3 downloads
@article{DBLP:journals/ijisec/SainiGLC19,
author = {Anil Saini and
Manoj Singh Gaur and
Vijay Laxmi and
Mauro Conti},
title = {You click, {I} steal: analyzing and detecting click hijacking attacks
in web pages},
journal = {Int. J. Inf. Sec.},
volume = {18},
number = {4},
pages = {481--504},
year = {2019},
url = {https://doi.org/10.1007/s10207-018-0423-3},
doi = {10.1007/S10207-018-0423-3},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijisec/SainiGLC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures.
Jain, A.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Bishnoi, R.
J. Supercomput., 75(10): 6855–6881. 2019.
Paper
doi
link
bibtex
1 download
@article{DBLP:journals/tjs/JainLTGB19,
author = {Anugrah Jain and
Vijay Laxmi and
Meenakshi Tripathi and
Manoj Singh Gaur and
Rimpy Bishnoi},
title = {{S2DIO:} an extended scalable 2D mesh network-on-chip routing reconfiguration
for efficient bypass of link failures},
journal = {J. Supercomput.},
volume = {75},
number = {10},
pages = {6855--6881},
year = {2019},
url = {https://doi.org/10.1007/s11227-019-02915-5},
doi = {10.1007/S11227-019-02915-5},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tjs/JainLTGB19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
MAPPER: Mapping Application Description to Permissions.
Solanki, R. K.; Laxmi, V.; and Gaur, M. S.
In
Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings, pages 84–98, 2019.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/crisis/SolankiLG19,
author = {Rajendra Kumar Solanki and
Vijay Laxmi and
Manoj Singh Gaur},
title = {{MAPPER:} Mapping Application Description to Permissions},
booktitle = {Risks and Security of Internet and Systems, 14th International Conference,
CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings},
pages = {84--98},
year = {2019},
crossref = {DBLP:conf/crisis/2019},
url = {https://doi.org/10.1007/978-3-030-41568-6\_6},
doi = {10.1007/978-3-030-41568-6\_6},
timestamp = {Tue, 03 Mar 2020 17:17:08 +0100},
biburl = {https://dblp.org/rec/conf/crisis/SolankiLG19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs.
Yadav, S.; Laxmi, V.; Gaur, M. S.; and Kapoor, H. K.
In
Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, June 02-06, 2019, pages 225, 2019.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/dac/YadavLGK19,
author = {Sonal Yadav and
Vijay Laxmi and
Manoj Singh Gaur and
Hemangee K. Kapoor},
title = {Improving Static Power Efficiency via Placement of Network Demultiplexer
over Control Plane of Router in Multi-NoCs},
booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019,
{DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},
pages = {225},
year = {2019},
crossref = {DBLP:conf/dac/2019},
url = {https://doi.org/10.1145/3316781.3322471},
doi = {10.1145/3316781.3322471},
timestamp = {Sun, 08 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/dac/YadavLGK19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Preventing Scan Attack through Test Response Encryption.
Ahlawat, S.; Tudu, J. T.; Gaur, M. S.; Fujita, M.; and Singh, V.
In
2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2019, Noordwijk, Netherlands, October 2-4, 2019, pages 1–6, 2019.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/dft/AhlawatTGFS19,
author = {Satyadev Ahlawat and
Jaynarayan T. Tudu and
Manoj Singh Gaur and
Masahiro Fujita and
Virendra Singh},
title = {Preventing Scan Attack through Test Response Encryption},
booktitle = {2019 {IEEE} International Symposium on Defect and Fault Tolerance
in {VLSI} and Nanotechnology Systems, {DFT} 2019, Noordwijk, Netherlands,
October 2-4, 2019},
pages = {1--6},
year = {2019},
crossref = {DBLP:conf/dft/2019},
url = {https://doi.org/10.1109/DFT.2019.8875355},
doi = {10.1109/DFT.2019.8875355},
timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/dft/AhlawatTGFS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
ETGuard: Detecting D2D Attacks using Wireless Evil Twins.
Jain, V.; Laxmi, V.; Gaur, M. S.; and Mosbah, M.
CoRR, abs/1903.05843. 2019.
Paper
link
bibtex
@article{DBLP:journals/corr/abs-1903-05843,
author = {Vineeta Jain and
Vijay Laxmi and
Manoj Singh Gaur and
Mohamed Mosbah},
title = {ETGuard: Detecting {D2D} Attacks using Wireless Evil Twins},
journal = {CoRR},
volume = {abs/1903.05843},
year = {2019},
url = {http://arxiv.org/abs/1903.05843},
eprinttype = {arXiv},
eprint = {1903.05843},
timestamp = {Tue, 11 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1903-05843.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}