generated by bibbase.org
  2024 (2)
GAN-based Seed Generation for Efficient Fuzzing. Toluchuri, S.; Upadhyay, A.; Naval, S.; Laxmi, V.; and Gaur, M. S. In Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024, Dijon, France, July 8-10, 2024, pages 686–691, 2024.
link   bibtex  
A Deep Dive into Relevant Feature Identification for Unveiling PII Leakage in Smartphones. Kohli, R.; Gupta, S.; and Gaur, M. S. In International Conference on Signal Processing and Communications, SPCOM 2024, Bangalore, India, July 1-4, 2024, pages 1–5, 2024.
A Deep Dive into Relevant Feature Identification for Unveiling PII Leakage in Smartphones [link]Paper   doi   link   bibtex  
  2023 (4)
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks. Jain, V.; Wetzker, U.; Laxmi, V.; Gaur, M. S.; Mosbah, M.; and Méry, D. IEEE Access, 11: 84620–84635. 2023.
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks [link]Paper   doi   link   bibtex  
An improved reconfiguration algorithm for handling 1-point NoC failures. Jain, A.; Laxmi, V.; Gaur, M. S.; and Sharma, A. Microprocess. Microsystems, 101: 104910. 2023.
An improved reconfiguration algorithm for handling 1-point NoC failures [link]Paper   doi   link   bibtex  
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC. Yadav, S.; Laxmi, V.; Kapoor, H. K.; Gaur, M. S.; and Kumar, A. J. Supercomput., 79(15): 17208–17246. 2023.
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC [link]Paper   doi   link   bibtex  
Tracking PII ex-filtration: Exploring decision tree and neural network with explainable AI. Kohli, R.; Chatterjee, S.; Gupta, S.; and Gaur, M. S. In IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2023, Jaipur, India, December 17-20, 2023, pages 183–188, 2023.
Tracking PII ex-filtration: Exploring decision tree and neural network with explainable AI [link]Paper   doi   link   bibtex  
  2022 (2)
Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture. Sharma, A.; Gaur, M. S.; Bhargava, L.; Laxmi, V.; and Gupta, M. Microprocess. Microsystems, 91: 104526. 2022.
Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture [link]Paper   doi   link   bibtex  
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. Singal, G.; Laxmi, V.; Gaur, M. S.; Rao, D. V.; Kushwaha, R.; Garg, D.; and Kumar, N. ACM Trans. Internet Techn., 22(1): 1:1–1:27. 2022.
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges [link]Paper   doi   link   bibtex   3 downloads  
  2021 (2)
MapperDroid: Verifying app capabilities from description to permissions and API calls. Solanki, R. K.; Laxmi, V.; Bezawada, B.; and Gaur, M. S. Comput. Secur., 111: 102493. 2021.
MapperDroid: Verifying app capabilities from description to permissions and API calls [link]Paper   doi   link   bibtex   1 download  
\emphScaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing. Saharan, S.; Laxmi, V.; Bezawada, B.; and Gaur, M. S. J. Inf. Secur. Appl., 60: 102850. 2021.
\emphScaling & fuzzing:  Personal image privacy from automated attacks in mobile cloud computing [link]Paper   doi   link   bibtex  
  2020 (12)
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Gajrani, J.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; Zemmari, A.; Mosbah, M.; and Conti, M. Adv. Comput., 119: 73–120. 2020.
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements [link]Paper   doi   link   bibtex   3 downloads  
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage. Dave, J.; Dutta, A.; Faruki, P.; Laxmi, V.; and Gaur, M. S. Autom. Control. Comput. Sci., 54(4): 358–370. 2020.
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage [link]Paper   doi   link   bibtex   1 download  
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Dave, J.; Faruki, P.; Laxmi, V.; Zemmari, A.; Gaur, M. S.; and Conti, M. Comput. Commun., 154: 148–159. 2020.
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage [link]Paper   doi   link   bibtex   1 download  
EspyDroid+: Precise reflection analysis of android apps. Gajrani, J.; Agarwal, U.; Laxmi, V.; Bezawada, B.; Gaur, M. S.; Tripathi, M.; and Zemmari, A. Comput. Secur., 90: 101688. 2020.
EspyDroid+: Precise reflection analysis of android apps [link]Paper   doi   link   bibtex   2 downloads  
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions. Manral, B.; Somani, G.; Choo, K. R.; Conti, M.; and Gaur, M. S. ACM Comput. Surv., 52(6): 124:1–124:38. 2020.
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions [link]Paper   doi   link   bibtex   1 download  
\emphVulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation. Gajrani, J.; Tripathi, M.; Laxmi, V.; Somani, G.; Zemmari, A.; and Gaur, M. S. DTRAP, 1(2): 10:1–10:25. 2020.
\emphVulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation [link]Paper   doi   link   bibtex  
\emphSneakLeak+: Large-scale klepto apps analysis. Bhandari, S.; Herbreteau, F.; Laxmi, V.; Zemmari, A.; Gaur, M. S.; and Roop, P. S. Future Gener. Comput. Syst., 109: 593–603. 2020.
\emphSneakLeak+: Large-scale klepto apps analysis [link]Paper   doi   link   bibtex   1 download  
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration. Jain, A.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Bishnoi, R. Integr., 72: 92–110. 2020.
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration [link]Paper   doi   link   bibtex   5 downloads  
QuickDedup: Efficient VM deduplication in cloud computing environments. Saharan, S.; Somani, G.; Gupta, G.; Verma, R.; Gaur, M. S.; and Buyya, R. J. Parallel Distributed Comput., 139: 18–31. 2020.
QuickDedup: Efficient VM deduplication in cloud computing environments [link]Paper   doi   link   bibtex   2 downloads  
Edge Preserving Image Fusion using Intensity Variation Approach. Panda, M. K.; Subudhi, B. N.; Veerakumar, T.; and Gaur, M. S. In 2020 IEEE Region 10 Conference, TENCON 2020, Osaka, Japan, November 16-19, 2020, pages 251–256, 2020.
Edge Preserving Image Fusion using Intensity Variation Approach [link]Paper   doi   link   bibtex  
Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution. Yadav, S.; Laxmi, V.; and Gaur, M. S. In 28th IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SOC 2020, Salt Lake City, UT, USA, October 5-7, 2020, pages 200–201, 2020.
Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution [link]Paper   doi   link   bibtex  
Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings. Kanhere, S. S.; Patil, V. T.; Sural, S.; and Gaur, M. S., editors. Volume 12553, of Lecture Notes in Computer Science.Springer. 2020.
Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings [link]Paper   doi   link   bibtex   1 download  
  2019 (11)
SLDP: A secure and lightweight link discovery protocol for software defined networking. Nehra, A.; Tripathi, M.; Gaur, M. S.; Battula, R. B.; and Lal, C. Comput. Networks, 150: 102–116. 2019.
SLDP: A secure and lightweight link discovery protocol for software defined networking [link]Paper   doi   link   bibtex   1 download  
ETGuard: Detecting D2D attacks using wireless Evil Twins. Jain, V.; Laxmi, V.; Gaur, M. S.; and Mosbah, M. Comput. Secur., 83: 389–405. 2019.
ETGuard: Detecting D2D attacks using wireless Evil Twins [link]Paper   doi   link   bibtex  
TILAK: A token-based prevention approach for topology discovery threats in SDN. Nehra, A.; Tripathi, M.; Gaur, M. S.; Battula, R. B.; and Lal, C. Int. J. Commun. Syst., 32(17). 2019.
TILAK: A token-based prevention approach for topology discovery threats in SDN [link]Paper   doi   link   bibtex   1 download  
You click, I steal: analyzing and detecting click hijacking attacks in web pages. Saini, A.; Gaur, M. S.; Laxmi, V.; and Conti, M. Int. J. Inf. Sec., 18(4): 481–504. 2019.
You click, I steal: analyzing and detecting click hijacking attacks in web pages [link]Paper   doi   link   bibtex   3 downloads  
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures. Jain, A.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Bishnoi, R. J. Supercomput., 75(10): 6855–6881. 2019.
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures [link]Paper   doi   link   bibtex   1 download  
MAPPER: Mapping Application Description to Permissions. Solanki, R. K.; Laxmi, V.; and Gaur, M. S. In Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings, pages 84–98, 2019.
MAPPER: Mapping Application Description to Permissions [link]Paper   doi   link   bibtex  
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs. Yadav, S.; Laxmi, V.; Gaur, M. S.; and Kapoor, H. K. In Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, June 02-06, 2019, pages 225, 2019.
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs [link]Paper   doi   link   bibtex  
Preventing Scan Attack through Test Response Encryption. Ahlawat, S.; Tudu, J. T.; Gaur, M. S.; Fujita, M.; and Singh, V. In 2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2019, Noordwijk, Netherlands, October 2-4, 2019, pages 1–6, 2019.
Preventing Scan Attack through Test Response Encryption [link]Paper   doi   link   bibtex  
UAVs Reliable Transmission for Multicast Protocols in FANETs. Singal, G.; Laxmi, V.; Gaur, M. S.; Rao, D. V.; and Kushwaha, R. In Sixth International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019, Granada, Spain, October 22-25, 2019, pages 130–135, 2019.
UAVs Reliable Transmission for Multicast Protocols in FANETs [link]Paper   doi   link   bibtex  
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019. Makarevich, O. B.; Popov, D.; Babenko, L. K.; Burnap, P.; Elçi, A.; Poet, R.; Vaidya, J.; Orgun, M. A.; Gaur, M. S.; and Shekhawat, R. S., editors. ACM. 2019.
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019 [link]Paper   doi   link   bibtex  
ETGuard: Detecting D2D Attacks using Wireless Evil Twins. Jain, V.; Laxmi, V.; Gaur, M. S.; and Mosbah, M. CoRR, abs/1903.05843. 2019.
ETGuard: Detecting D2D Attacks using Wireless Evil Twins [link]Paper   link   bibtex  
  2018 (11)
SWORD: Semantic aWare andrOid malwaRe Detector. Bhandari, S.; Panihar, R.; Naval, S.; Laxmi, V.; Zemmari, A.; and Gaur, M. S. J. Inf. Secur. Appl., 42: 46–56. 2018.
SWORD: Semantic aWare andrOid malwaRe Detector [link]Paper   doi   link   bibtex  
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Rajarajan, M. IEEE Trans. Dependable Secur. Comput., 15(6): 959–973. 2018.
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks [link]Paper   doi   link   bibtex   1 download  
Enhancing QoE for video streaming in MANETs via multi-constraint routing. Lal, C.; Laxmi, V.; Gaur, M. S.; and Conti, M. Wirel. Networks, 24(1): 235–256. 2018.
Enhancing QoE for video streaming in MANETs via multi-constraint routing [link]Paper   doi   link   bibtex  
Privacy Preserving Data Offloading Based on Transformation. Saharan, S.; Laxmi, V.; Gaur, M. S.; and Zemmari, A. In Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers, pages 86–92, 2018.
Privacy Preserving Data Offloading Based on Transformation [link]Paper   doi   link   bibtex  
Embedded Assistive Stick for Visually Impaired Persons. Sharma, H.; Tripathi, M.; Kumar, A.; and Gaur, M. S. In 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, Bengaluru, India, July 10-12, 2018, pages 1–6, 2018.
Embedded Assistive Stick for Visually Impaired Persons [link]Paper   doi   link   bibtex  
Bloom Filter Based Privacy Preserving Deduplication System. Dave, J.; Laxmi, V.; Faruki, P.; Gaur, M. S.; and Shah, B. In Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers, pages 17–34, 2018.
Bloom Filter Based Privacy Preserving Deduplication System [link]Paper   doi   link   bibtex  
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks. Faruki, P.; Buddhadev, B.; Shah, B.; Zemmari, A.; Laxmi, V.; and Gaur, M. S. In Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers, pages 125–139, 2018.
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks [link]Paper   doi   link   bibtex  
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android. Jain, V.; Laxmi, V.; Gaur, M. S.; and Mosbah, M. In Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers, pages 219–233, 2018.
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android [link]Paper   doi   link   bibtex  
A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic. Yadav, S.; Laxmi, V.; Kapoor, H. K.; Gaur, M. S.; and Zwolinski, M. In IEEE International Symposium on Smart Electronic Systems, iSES 2018 (Formerly iNiS), Hyderabad, India, December 17-19, 2018, pages 243–248, 2018.
A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic [link]Paper   doi   link   bibtex  
3D LBDR: Logic-Based Distributed Routing for 3D NoC. Sharma, A.; Tailor, M.; Bhargava, L.; and Gaur, M. S. In VLSI Design and Test - 22nd International Symposium, VDAT 2018, Madurai, India, June 28-30, 2018, Revised Selected Papers, pages 473–482, 2018.
3D LBDR: Logic-Based Distributed Routing for 3D NoC [link]Paper   doi   link   bibtex  
Human Face Detection Enabled Smart Stick for Visually Impaired People. Anand, S.; Kumar, A.; Tripathi, M.; and Gaur, M. S. In Data Science and Big Data Analytics, ACM-WIR 2018, Women In Research 2018, Indore, India, 5-6 January 2018, pages 277–289, 2018.
Human Face Detection Enabled Smart Stick for Visually Impaired People [link]Paper   doi   link   bibtex  
  2017 (29)
Multi-constraints link stable multicast routing protocol in MANETs. Singal, G.; Laxmi, V.; Gaur, M. S.; Todi, S.; Rao, D. V.; Tripathi, M.; and Kushwaha, R. Ad Hoc Networks, 63: 115–128. 2017.
Multi-constraints link stable multicast routing protocol in MANETs [link]Paper   doi   link   bibtex   1 download  
Service resizing for quick DDoS mitigation in cloud computing environment. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Buyya, R. Ann. des Télécommunications, 72(5-6): 237–252. 2017.
Service resizing for quick DDoS mitigation in cloud computing environment [link]Paper   doi   link   bibtex  
DDoS victim service containment to minimize the internal collateral damages in cloud computing. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Rajarajan, M. Comput. Electr. Eng., 59: 165–179. 2017.
DDoS victim service containment to minimize the internal collateral damages in cloud computing [link]Paper   doi   link   bibtex  
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; Rajarajan, M.; and Buyya, R. IEEE Cloud Comput., 4(1): 22–32. 2017.
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions [link]Paper   doi   link   bibtex  
DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Buyya, R. Comput. Commun., 107: 30–48. 2017.
DDoS attacks in cloud computing: Issues, taxonomy, and future directions [link]Paper   doi   link   bibtex  
Android inter-app communication threats and detection techniques. Bhandari, S.; Jaballah, W. B.; Jain, V.; Laxmi, V.; Zemmari, A.; Gaur, M. S.; Mosbah, M.; and Conti, M. Comput. Secur., 70: 392–421. 2017.
Android inter-app communication threats and detection techniques [link]Paper   doi   link   bibtex  
Improved multicast routing in MANETs using link stability and route stability. Singal, G.; Laxmi, V.; Rao, D. V.; Todi, S.; and Gaur, M. S. Int. J. Commun. Syst., 30(11). 2017.
Improved multicast routing in MANETs using link stability and route stability [link]Paper   doi   link   bibtex  
Balanced energy routing protocol for clustered wireless sensor network. Tripathi, M.; Gaur, M. S.; Laxmi, V.; and Battula, R. B. Int. J. Inf. Commun. Technol., 11(3): 396–411. 2017.
Balanced energy routing protocol for clustered wireless sensor network [link]Paper   doi   link   bibtex  
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs. Singal, G.; Laxmi, V.; Gaur, M. S.; and Rao, D. V. Wirel. Networks, 23(3): 663–679. 2017.
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs [link]Paper   doi   link   bibtex  
Path and Link Aware Routing Algorithm for Cognitive Radio Wireless Mesh Network. Battula, R. B.; Gopalani, D.; and Gaur, M. S. Wirel. Pers. Commun., 96(3): 3979–3993. 2017.
Path and Link Aware Routing Algorithm for Cognitive Radio Wireless Mesh Network [link]Paper   doi   link   bibtex   1 download  
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. Gajrani, J.; Tripathi, M.; Laxmi, V.; Gaur, M. S.; Conti, M.; and Rajarajan, M. In 14th IEEE Annual Consumer Communications & Networking Conference, CCNC 2017, Las Vegas, NV, USA, January 8-11, 2017, pages 854–860, 2017.
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps [link]Paper   doi   link   bibtex  
Detecting Inter-App Information Leakage Paths. Bhandari, S.; Herbreteau, F.; Laxmi, V.; Zemmari, A.; Roop, P. S.; and Gaur, M. S. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, pages 908–910, 2017.
Detecting Inter-App Information Leakage Paths [link]Paper   doi   link   bibtex  
Detection of Information Leaks via Reflection in Android Apps. Gajrani, J.; Li, L.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Conti, M. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, pages 911–913, 2017.
Detection of Information Leaks via Reflection in Android Apps [link]Paper   doi   link   bibtex  
FICUR: Employing SDN programmability to secure ARP. Nehra, A.; Tripathi, M.; and Gaur, M. S. In IEEE 7th Annual Computing and Communication Workshop and Conference, CCWC 2017, Las Vegas, NV, USA, January 9-11, 2017, pages 1–8, 2017.
FICUR: Employing SDN programmability to secure ARP [link]Paper   doi   link   bibtex  
Multiple distance sensors based smart stick for visually impaired people. Sharma, S.; Gupta, M.; Kumar, A.; Tripathi, M.; and Gaur, M. S. In IEEE 7th Annual Computing and Communication Workshop and Conference, CCWC 2017, Las Vegas, NV, USA, January 9-11, 2017, pages 1–5, 2017.
Multiple distance sensors based smart stick for visually impaired people [link]Paper   doi   link   bibtex   1 download  
Unraveling Reflection Induced Sensitive Leaks in Android Apps. Gajrani, J.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; Sharma, D. R.; Zemmari, A.; Mosbah, M.; and Conti, M. In Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers, pages 49–65, 2017.
Unraveling Reflection Induced Sensitive Leaks in Android Apps [link]Paper   doi   link   bibtex  
Secure Random Encryption for Deduplicated Storage. Dave, J.; Saharan, S.; Faruki, P.; Laxmi, V.; and Gaur, M. S. In Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pages 164–176, 2017.
Secure Random Encryption for Deduplicated Storage [link]Paper   doi   link   bibtex   1 download  
Panorama: Real-time bird's eye view of an OpenFlow network. Gangwal, A.; Conti, M.; and Gaur, M. S. In 14th IEEE International Conference on Networking, Sensing and Control, ICNSC 2017, Calabria, Italy, May 16-18, 2017, pages 204–209, 2017.
Panorama: Real-time bird's eye view of an OpenFlow network [link]Paper   doi   link   bibtex  
A Power, Thermal and Reliability-Aware Network-on-Chip. Sharma, A.; Gupta, Y.; Yadav, S.; Bhargava, L.; Gaur, M. S.; and Laxmi, V. In IEEE International Symposium on Nanoelectronic and Information Systems, iNIS 2017, Bhopal, India, December 18-20, 2017, pages 243–245, 2017.
A Power, Thermal and Reliability-Aware Network-on-Chip [link]Paper   doi   link   bibtex  
Secure and efficient proof of ownership for deduplicated cloud storage. Dave, J.; Faruki, P.; Laxmi, V.; Bezawada, B.; and Gaur, M. S. In Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017, pages 19–26, 2017.
Secure and efficient proof of ownership for deduplicated cloud storage [link]Paper   doi   link   bibtex  
Flooding in secure wireless sensor networks: Student contribution. Bondu, J.; Mishra, A.; Laxmi, V.; and Gaur, M. S. In Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017, pages 151–156, 2017.
Flooding in secure wireless sensor networks: Student contribution [link]Paper   doi   link   bibtex  
'Global view' in SDN: existing implementation, vulnerabilities & threats. Nehra, A.; Tripathi, M.; and Gaur, M. S. In Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017, pages 303–306, 2017.
'Global view' in SDN: existing implementation, vulnerabilities & threats [link]Paper   doi   link   bibtex  
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps. Bhandari, S.; Herbreteau, F.; Laxmi, V.; Zemmari, A.; Roop, P. S.; and Gaur, M. S. In 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, pages 285–292, 2017.
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps [link]Paper   doi   link   bibtex  
SniffDroid: Detection of Inter-App Privacy Leaks in Android. Jain, V.; Bhandari, S.; Laxmi, V.; Gaur, M. S.; and Mosbah, M. In 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, pages 331–338, 2017.
SniffDroid: Detection of Inter-App Privacy Leaks in Android [link]Paper   doi   link   bibtex  
Improving Leakage Path Coverage in Android Apps. Modi, G.; Laxmi, V.; Naval, S.; and Gaur, M. S. In 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, pages 355–362, 2017.
Improving Leakage Path Coverage in Android Apps [link]Paper   doi   link   bibtex  
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip. Jain, A.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Bishnoi, R. In VLSI Design and Test - 21st International Symposium, VDAT 2017, Roorkee, India, June 29 - July 2, 2017, Revised Selected Papers, pages 313–323, 2017.
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip [link]Paper   doi   link   bibtex   1 download  
A comprehensive and effective mechanism for DDoS detection in SDN. Conti, M.; Gangwal, A.; and Gaur, M. S. In 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2017, Rome, Italy, October 9-11, 2017, pages 1–8, 2017.
A comprehensive and effective mechanism for DDoS detection in SDN [link]Paper   doi   link   bibtex   1 download  
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges. Singal, G.; Laxmi, V.; Gaur, M. S.; Rao, D. V.; and Kushwaha, R. CoRR, abs/1708.09573. 2017.
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges [link]Paper   link   bibtex  
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. Shekhawat, R. S.; Gaur, M. S.; Elçi, A.; Vaidya, J.; Makarevich, O. B.; Poet, R.; Orgun, M. A.; Dhaka, V. S.; Bohra, M. K.; Singh, V.; Babenko, L. K.; Sheykhkanloo, N. M.; and Rahnama, B., editors. ACM. 2017.
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017 [link]Paper   doi   link   bibtex  
  2016 (20)
DDoS attacks in cloud computing: Collateral damage to non-targets. Somani, G.; Gaur, M. S.; Sanghi, D.; and Conti, M. Comput. Networks, 109: 157–171. 2016.
DDoS attacks in cloud computing: Collateral damage to non-targets [link]Paper   doi   link   bibtex  
Colluding browser extension attack on user privacy and its implication for web browsers. Saini, A.; Gaur, M. S.; Laxmi, V.; and Conti, M. Comput. Secur., 63: 14–28. 2016.
Colluding browser extension attack on user privacy and its implication for web browsers [link]Paper   doi   link   bibtex  
Guest Editorial. Zwolinski, M.; Gaur, M. S.; Laxmi, V.; and Mehta, U. S. IET Comput. Digit. Tech., 10(5): 203–204. 2016.
Guest Editorial [link]Paper   doi   link   bibtex  
\emph\(σ\) \(^\mbox \emphn \)LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip. Gupta, N.; Sharma, A.; Laxmi, V.; Gaur, M. S.; Zwolinski, M.; and Bishnoi, R. IET Comput. Digit. Tech., 10(5): 226–232. 2016.
\emph\(σ\) \(^\mbox \emphn \)LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip [link]Paper   doi   link   bibtex  
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network. Battula, R. B.; Gaur, M. S.; and Gopalani, D. Int. J. Commun. Syst., 29(17): 2503–2516. 2016.
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network [link]Paper   doi   link   bibtex  
Resilient routing implementation in 2D mesh NoC. Bishnoi, R.; Laxmi, V.; Gaur, M. S.; and Zwolinski, M. Microelectron. Reliab., 56: 189–201. 2016.
Resilient routing implementation in 2D mesh NoC [link]Paper   doi   link   bibtex  
Intersection Automata Based Model for Android Application Collusion. Bhandari, S.; Laxmi, V.; Zemmari, A.; and Gaur, M. S. In 30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016, pages 901–908, 2016.
Intersection Automata Based Model for Android Application Collusion [link]Paper   doi   link   bibtex  
FlowMine: Android app analysis via data flow. Sinha, L.; Bhandari, S.; Faruki, P.; Gaur, M. S.; Laxmi, V.; and Conti, M. In 13th IEEE Annual Consumer Communications & Networking Conference, CCNC 2016, Las Vegas, NV, USA, January 9-12, 2016, pages 435–441, 2016.
FlowMine: Android app analysis via data flow [link]Paper   doi   link   bibtex  
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers. Faruki, P.; Zemmari, A.; Gaur, M. S.; Laxmi, V.; and Conti, M. In 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2016, Toulouse, France, June 28 - July 1, 2016, pages 60–65, 2016.
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers [link]Paper   doi   link   bibtex  
ELBA: Efficient Layer Based Routing Algorithm in SDN. Gangwal, A.; Gupta, M.; Gaur, M. S.; Laxmi, V.; and Conti, M. In 25th International Conference on Computer Communication and Networks, ICCCN 2016, Waikoloa, HI, USA, August 1-4, 2016, pages 1–7, 2016.
ELBA: Efficient Layer Based Routing Algorithm in SDN [link]Paper   doi   link   bibtex  
Detection of SQLite Database Vulnerabilities in Android Apps. Jain, V.; Gaur, M. S.; Laxmi, V.; and Mosbah, M. In Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pages 521–531, 2016.
Detection of SQLite Database Vulnerabilities in Android Apps [link]Paper   doi   link   bibtex  
Android component vulnerabities: Proof of concepts and mitigation. Buddhdev, B.; Faruki, P.; Gaur, M. S.; and Laxmi, V. In 2016 International Conference on Information Networking, ICOIN 2016, Kota Kinabalu, Malaysia, January 13-15, 2016, pages 17–22, 2016.