generated by bibbase.org
  2024 (2)
GAN-based Seed Generation for Efficient Fuzzing. Toluchuri, S.; Upadhyay, A.; Naval, S.; Laxmi, V.; and Gaur, M. S. In Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024, Dijon, France, July 8-10, 2024, pages 686–691, 2024.
link   bibtex  
A Deep Dive into Relevant Feature Identification for Unveiling PII Leakage in Smartphones. Kohli, R.; Gupta, S.; and Gaur, M. S. In International Conference on Signal Processing and Communications, SPCOM 2024, Bangalore, India, July 1-4, 2024, pages 1–5, 2024.
A Deep Dive into Relevant Feature Identification for Unveiling PII Leakage in Smartphones [link]Paper   doi   link   bibtex  
  2023 (4)
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks. Jain, V.; Wetzker, U.; Laxmi, V.; Gaur, M. S.; Mosbah, M.; and Méry, D. IEEE Access, 11: 84620–84635. 2023.
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks [link]Paper   doi   link   bibtex  
An improved reconfiguration algorithm for handling 1-point NoC failures. Jain, A.; Laxmi, V.; Gaur, M. S.; and Sharma, A. Microprocess. Microsystems, 101: 104910. 2023.
An improved reconfiguration algorithm for handling 1-point NoC failures [link]Paper   doi   link   bibtex  
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC. Yadav, S.; Laxmi, V.; Kapoor, H. K.; Gaur, M. S.; and Kumar, A. J. Supercomput., 79(15): 17208–17246. 2023.
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC [link]Paper   doi   link   bibtex  
Tracking PII ex-filtration: Exploring decision tree and neural network with explainable AI. Kohli, R.; Chatterjee, S.; Gupta, S.; and Gaur, M. S. In IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2023, Jaipur, India, December 17-20, 2023, pages 183–188, 2023.
Tracking PII ex-filtration: Exploring decision tree and neural network with explainable AI [link]Paper   doi   link   bibtex  
  2022 (2)
Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture. Sharma, A.; Gaur, M. S.; Bhargava, L.; Laxmi, V.; and Gupta, M. Microprocess. Microsystems, 91: 104526. 2022.
Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture [link]Paper   doi   link   bibtex  
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. Singal, G.; Laxmi, V.; Gaur, M. S.; Rao, D. V.; Kushwaha, R.; Garg, D.; and Kumar, N. ACM Trans. Internet Techn., 22(1): 1:1–1:27. 2022.
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges [link]Paper   doi   link   bibtex   3 downloads  
  2021 (2)
MapperDroid: Verifying app capabilities from description to permissions and API calls. Solanki, R. K.; Laxmi, V.; Bezawada, B.; and Gaur, M. S. Comput. Secur., 111: 102493. 2021.
MapperDroid: Verifying app capabilities from description to permissions and API calls [link]Paper   doi   link   bibtex   1 download  
\emphScaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing. Saharan, S.; Laxmi, V.; Bezawada, B.; and Gaur, M. S. J. Inf. Secur. Appl., 60: 102850. 2021.
\emphScaling & fuzzing:  Personal image privacy from automated attacks in mobile cloud computing [link]Paper   doi   link   bibtex  
  2020 (12)
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Gajrani, J.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; Zemmari, A.; Mosbah, M.; and Conti, M. Adv. Comput., 119: 73–120. 2020.
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements [link]Paper   doi   link   bibtex   3 downloads  
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage. Dave, J.; Dutta, A.; Faruki, P.; Laxmi, V.; and Gaur, M. S. Autom. Control. Comput. Sci., 54(4): 358–370. 2020.
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage [link]Paper   doi   link   bibtex   1 download  
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Dave, J.; Faruki, P.; Laxmi, V.; Zemmari, A.; Gaur, M. S.; and Conti, M. Comput. Commun., 154: 148–159. 2020.
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage [link]Paper   doi   link   bibtex   1 download  
EspyDroid+: Precise reflection analysis of android apps. Gajrani, J.; Agarwal, U.; Laxmi, V.; Bezawada, B.; Gaur, M. S.; Tripathi, M.; and Zemmari, A. Comput. Secur., 90: 101688. 2020.
EspyDroid+: Precise reflection analysis of android apps [link]Paper   doi   link   bibtex   2 downloads  
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions. Manral, B.; Somani, G.; Choo, K. R.; Conti, M.; and Gaur, M. S. ACM Comput. Surv., 52(6): 124:1–124:38. 2020.
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions [link]Paper   doi   link   bibtex   1 download  
\emphVulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation. Gajrani, J.; Tripathi, M.; Laxmi, V.; Somani, G.; Zemmari, A.; and Gaur, M. S. DTRAP, 1(2): 10:1–10:25. 2020.
\emphVulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation [link]Paper   doi   link   bibtex  
\emphSneakLeak+: Large-scale klepto apps analysis. Bhandari, S.; Herbreteau, F.; Laxmi, V.; Zemmari, A.; Gaur, M. S.; and Roop, P. S. Future Gener. Comput. Syst., 109: 593–603. 2020.
\emphSneakLeak+: Large-scale klepto apps analysis [link]Paper   doi   link   bibtex   1 download  
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration. Jain, A.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Bishnoi, R. Integr., 72: 92–110. 2020.
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration [link]Paper   doi   link   bibtex   5 downloads  
QuickDedup: Efficient VM deduplication in cloud computing environments. Saharan, S.; Somani, G.; Gupta, G.; Verma, R.; Gaur, M. S.; and Buyya, R. J. Parallel Distributed Comput., 139: 18–31. 2020.
QuickDedup: Efficient VM deduplication in cloud computing environments [link]Paper   doi   link   bibtex   2 downloads  
Edge Preserving Image Fusion using Intensity Variation Approach. Panda, M. K.; Subudhi, B. N.; Veerakumar, T.; and Gaur, M. S. In 2020 IEEE Region 10 Conference, TENCON 2020, Osaka, Japan, November 16-19, 2020, pages 251–256, 2020.
Edge Preserving Image Fusion using Intensity Variation Approach [link]Paper   doi   link   bibtex  
Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution. Yadav, S.; Laxmi, V.; and Gaur, M. S. In 28th IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SOC 2020, Salt Lake City, UT, USA, October 5-7, 2020, pages 200–201, 2020.
Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution [link]Paper   doi   link   bibtex  
Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings. Kanhere, S. S.; Patil, V. T.; Sural, S.; and Gaur, M. S., editors. Volume 12553, of Lecture Notes in Computer Science.Springer. 2020.
Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings [link]Paper   doi   link   bibtex   1 download  
  2019 (11)
SLDP: A secure and lightweight link discovery protocol for software defined networking. Nehra, A.; Tripathi, M.; Gaur, M. S.; Battula, R. B.; and Lal, C. Comput. Networks, 150: 102–116. 2019.
SLDP: A secure and lightweight link discovery protocol for software defined networking [link]Paper   doi   link   bibtex   1 download  
ETGuard: Detecting D2D attacks using wireless Evil Twins. Jain, V.; Laxmi, V.; Gaur, M. S.; and Mosbah, M. Comput. Secur., 83: 389–405. 2019.
ETGuard: Detecting D2D attacks using wireless Evil Twins [link]Paper   doi   link   bibtex  
TILAK: A token-based prevention approach for topology discovery threats in SDN. Nehra, A.; Tripathi, M.; Gaur, M. S.; Battula, R. B.; and Lal, C. Int. J. Commun. Syst., 32(17). 2019.
TILAK: A token-based prevention approach for topology discovery threats in SDN [link]Paper   doi   link   bibtex   1 download  
You click, I steal: analyzing and detecting click hijacking attacks in web pages. Saini, A.; Gaur, M. S.; Laxmi, V.; and Conti, M. Int. J. Inf. Sec., 18(4): 481–504. 2019.
You click, I steal: analyzing and detecting click hijacking attacks in web pages [link]Paper   doi   link   bibtex   3 downloads  
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures. Jain, A.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Bishnoi, R. J. Supercomput., 75(10): 6855–6881. 2019.
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures [link]Paper   doi   link   bibtex   1 download  
MAPPER: Mapping Application Description to Permissions. Solanki, R. K.; Laxmi, V.; and Gaur, M. S. In Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings, pages 84–98, 2019.
MAPPER: Mapping Application Description to Permissions [link]Paper   doi   link   bibtex  
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs. Yadav, S.; Laxmi, V.; Gaur, M. S.; and Kapoor, H. K. In Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, June 02-06, 2019, pages 225, 2019.
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs [link]Paper   doi   link   bibtex  
Preventing Scan Attack through Test Response Encryption. Ahlawat, S.; Tudu, J. T.; Gaur, M. S.; Fujita, M.; and Singh, V. In 2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2019, Noordwijk, Netherlands, October 2-4, 2019, pages 1–6, 2019.
Preventing Scan Attack through Test Response Encryption [link]Paper   doi   link   bibtex  
UAVs Reliable Transmission for Multicast Protocols in FANETs. Singal, G.; Laxmi, V.; Gaur, M. S.; Rao, D. V.; and Kushwaha, R. In Sixth International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019, Granada, Spain, October 22-25, 2019, pages 130–135, 2019.
UAVs Reliable Transmission for Multicast Protocols in FANETs [link]Paper   doi   link   bibtex  
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019. Makarevich, O. B.; Popov, D.; Babenko, L. K.; Burnap, P.; Elçi, A.; Poet, R.; Vaidya, J.; Orgun, M. A.; Gaur, M. S.; and Shekhawat, R. S., editors. ACM. 2019.
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019 [link]Paper   doi   link   bibtex  
ETGuard: Detecting D2D Attacks using Wireless Evil Twins. Jain, V.; Laxmi, V.; Gaur, M. S.; and Mosbah, M. CoRR, abs/1903.05843. 2019.
ETGuard: Detecting D2D Attacks using Wireless Evil Twins [link]Paper   link   bibtex  
  2018 (11)
SWORD: Semantic aWare andrOid malwaRe Detector. Bhandari, S.; Panihar, R.; Naval, S.; Laxmi, V.; Zemmari, A.; and Gaur, M. S. J. Inf. Secur. Appl., 42: 46–56. 2018.
SWORD: Semantic aWare andrOid malwaRe Detector [link]Paper   doi   link   bibtex  
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Rajarajan, M. IEEE Trans. Dependable Secur. Comput., 15(6): 959–973. 2018.
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks [link]Paper   doi   link   bibtex   1 download  
Enhancing QoE for video streaming in MANETs via multi-constraint routing. Lal, C.; Laxmi, V.; Gaur, M. S.; and Conti, M. Wirel. Networks, 24(1): 235–256. 2018.
Enhancing QoE for video streaming in MANETs via multi-constraint routing [link]Paper   doi   link   bibtex  
Privacy Preserving Data Offloading Based on Transformation. Saharan, S.; Laxmi, V.; Gaur, M. S.; and Zemmari, A. In Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers, pages 86–92, 2018.
Privacy Preserving Data Offloading Based on Transformation [link]Paper   doi   link   bibtex  
Embedded Assistive Stick for Visually Impaired Persons. Sharma, H.; Tripathi, M.; Kumar, A.; and Gaur, M. S. In 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, Bengaluru, India, July 10-12, 2018, pages 1–6, 2018.
Embedded Assistive Stick for Visually Impaired Persons [link]Paper   doi   link   bibtex  
Bloom Filter Based Privacy Preserving Deduplication System. Dave, J.; Laxmi, V.; Faruki, P.; Gaur, M. S.; and Shah, B. In Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers, pages 17–34, 2018.
Bloom Filter Based Privacy Preserving Deduplication System [link]Paper   doi   link   bibtex  
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks. Faruki, P.; Buddhadev, B.; Shah, B.; Zemmari, A.; Laxmi, V.; and Gaur, M. S. In Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers, pages 125–139, 2018.
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks [link]Paper   doi   link   bibtex  
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android. Jain, V.; Laxmi, V.; Gaur, M. S.; and Mosbah, M. In Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers, pages 219–233, 2018.
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android [link]Paper   doi   link   bibtex  
A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic. Yadav, S.; Laxmi, V.; Kapoor, H. K.; Gaur, M. S.; and Zwolinski, M. In IEEE International Symposium on Smart Electronic Systems, iSES 2018 (Formerly iNiS), Hyderabad, India, December 17-19, 2018, pages 243–248, 2018.
A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic [link]Paper   doi   link   bibtex  
3D LBDR: Logic-Based Distributed Routing for 3D NoC. Sharma, A.; Tailor, M.; Bhargava, L.; and Gaur, M. S. In VLSI Design and Test - 22nd International Symposium, VDAT 2018, Madurai, India, June 28-30, 2018, Revised Selected Papers, pages 473–482, 2018.
3D LBDR: Logic-Based Distributed Routing for 3D NoC [link]Paper   doi   link   bibtex  
Human Face Detection Enabled Smart Stick for Visually Impaired People. Anand, S.; Kumar, A.; Tripathi, M.; and Gaur, M. S. In Data Science and Big Data Analytics, ACM-WIR 2018, Women In Research 2018, Indore, India, 5-6 January 2018, pages 277–289, 2018.
Human Face Detection Enabled Smart Stick for Visually Impaired People [link]Paper   doi   link   bibtex  
  2017 (29)
Multi-constraints link stable multicast routing protocol in MANETs. Singal, G.; Laxmi, V.; Gaur, M. S.; Todi, S.; Rao, D. V.; Tripathi, M.; and Kushwaha, R. Ad Hoc Networks, 63: 115–128. 2017.
Multi-constraints link stable multicast routing protocol in MANETs [link]Paper   doi   link   bibtex   1 download  
Service resizing for quick DDoS mitigation in cloud computing environment. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Buyya, R. Ann. des Télécommunications, 72(5-6): 237–252. 2017.
Service resizing for quick DDoS mitigation in cloud computing environment [link]Paper   doi   link   bibtex  
DDoS victim service containment to minimize the internal collateral damages in cloud computing. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Rajarajan, M. Comput. Electr. Eng., 59: 165–179. 2017.
DDoS victim service containment to minimize the internal collateral damages in cloud computing [link]Paper   doi   link   bibtex  
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; Rajarajan, M.; and Buyya, R. IEEE Cloud Comput., 4(1): 22–32. 2017.
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions [link]Paper   doi   link   bibtex  
DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Buyya, R. Comput. Commun., 107: 30–48. 2017.
DDoS attacks in cloud computing: Issues, taxonomy, and future directions [link]Paper   doi   link   bibtex  
Android inter-app communication threats and detection techniques. Bhandari, S.; Jaballah, W. B.; Jain, V.; Laxmi, V.; Zemmari, A.; Gaur, M. S.; Mosbah, M.; and Conti, M. Comput. Secur., 70: 392–421. 2017.
Android inter-app communication threats and detection techniques [link]Paper   doi   link   bibtex  
Improved multicast routing in MANETs using link stability and route stability. Singal, G.; Laxmi, V.; Rao, D. V.; Todi, S.; and Gaur, M. S. Int. J. Commun. Syst., 30(11). 2017.
Improved multicast routing in MANETs using link stability and route stability [link]Paper   doi   link   bibtex  
Balanced energy routing protocol for clustered wireless sensor network. Tripathi, M.; Gaur, M. S.; Laxmi, V.; and Battula, R. B. Int. J. Inf. Commun. Technol., 11(3): 396–411. 2017.
Balanced energy routing protocol for clustered wireless sensor network [link]Paper   doi   link   bibtex  
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs. Singal, G.; Laxmi, V.; Gaur, M. S.; and Rao, D. V. Wirel. Networks, 23(3): 663–679. 2017.
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs [link]Paper   doi   link   bibtex  
Path and Link Aware Routing Algorithm for Cognitive Radio Wireless Mesh Network. Battula, R. B.; Gopalani, D.; and Gaur, M. S. Wirel. Pers. Commun., 96(3): 3979–3993. 2017.
Path and Link Aware Routing Algorithm for Cognitive Radio Wireless Mesh Network [link]Paper   doi   link   bibtex   1 download  
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. Gajrani, J.; Tripathi, M.; Laxmi, V.; Gaur, M. S.; Conti, M.; and Rajarajan, M. In 14th IEEE Annual Consumer Communications & Networking Conference, CCNC 2017, Las Vegas, NV, USA, January 8-11, 2017, pages 854–860, 2017.
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps [link]Paper   doi   link   bibtex  
Detecting Inter-App Information Leakage Paths. Bhandari, S.; Herbreteau, F.; Laxmi, V.; Zemmari, A.; Roop, P. S.; and Gaur, M. S. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, pages 908–910, 2017.
Detecting Inter-App Information Leakage Paths [link]Paper   doi   link   bibtex  
Detection of Information Leaks via Reflection in Android Apps. Gajrani, J.; Li, L.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Conti, M. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, pages 911–913, 2017.
Detection of Information Leaks via Reflection in Android Apps [link]Paper   doi   link   bibtex  
FICUR: Employing SDN programmability to secure ARP. Nehra, A.; Tripathi, M.; and Gaur, M. S. In IEEE 7th Annual Computing and Communication Workshop and Conference, CCWC 2017, Las Vegas, NV, USA, January 9-11, 2017, pages 1–8, 2017.
FICUR: Employing SDN programmability to secure ARP [link]Paper   doi   link   bibtex  
Multiple distance sensors based smart stick for visually impaired people. Sharma, S.; Gupta, M.; Kumar, A.; Tripathi, M.; and Gaur, M. S. In IEEE 7th Annual Computing and Communication Workshop and Conference, CCWC 2017, Las Vegas, NV, USA, January 9-11, 2017, pages 1–5, 2017.
Multiple distance sensors based smart stick for visually impaired people [link]Paper   doi   link   bibtex   1 download  
Unraveling Reflection Induced Sensitive Leaks in Android Apps. Gajrani, J.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; Sharma, D. R.; Zemmari, A.; Mosbah, M.; and Conti, M. In Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers, pages 49–65, 2017.
Unraveling Reflection Induced Sensitive Leaks in Android Apps [link]Paper   doi   link   bibtex  
Secure Random Encryption for Deduplicated Storage. Dave, J.; Saharan, S.; Faruki, P.; Laxmi, V.; and Gaur, M. S. In Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pages 164–176, 2017.
Secure Random Encryption for Deduplicated Storage [link]Paper   doi   link   bibtex   1 download  
Panorama: Real-time bird's eye view of an OpenFlow network. Gangwal, A.; Conti, M.; and Gaur, M. S. In 14th IEEE International Conference on Networking, Sensing and Control, ICNSC 2017, Calabria, Italy, May 16-18, 2017, pages 204–209, 2017.
Panorama: Real-time bird's eye view of an OpenFlow network [link]Paper   doi   link   bibtex  
A Power, Thermal and Reliability-Aware Network-on-Chip. Sharma, A.; Gupta, Y.; Yadav, S.; Bhargava, L.; Gaur, M. S.; and Laxmi, V. In IEEE International Symposium on Nanoelectronic and Information Systems, iNIS 2017, Bhopal, India, December 18-20, 2017, pages 243–245, 2017.
A Power, Thermal and Reliability-Aware Network-on-Chip [link]Paper   doi   link   bibtex  
Secure and efficient proof of ownership for deduplicated cloud storage. Dave, J.; Faruki, P.; Laxmi, V.; Bezawada, B.; and Gaur, M. S. In Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017, pages 19–26, 2017.
Secure and efficient proof of ownership for deduplicated cloud storage [link]Paper   doi   link   bibtex  
Flooding in secure wireless sensor networks: Student contribution. Bondu, J.; Mishra, A.; Laxmi, V.; and Gaur, M. S. In Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017, pages 151–156, 2017.
Flooding in secure wireless sensor networks: Student contribution [link]Paper   doi   link   bibtex  
'Global view' in SDN: existing implementation, vulnerabilities & threats. Nehra, A.; Tripathi, M.; and Gaur, M. S. In Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017, pages 303–306, 2017.
'Global view' in SDN: existing implementation, vulnerabilities & threats [link]Paper   doi   link   bibtex  
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps. Bhandari, S.; Herbreteau, F.; Laxmi, V.; Zemmari, A.; Roop, P. S.; and Gaur, M. S. In 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, pages 285–292, 2017.
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps [link]Paper   doi   link   bibtex  
SniffDroid: Detection of Inter-App Privacy Leaks in Android. Jain, V.; Bhandari, S.; Laxmi, V.; Gaur, M. S.; and Mosbah, M. In 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, pages 331–338, 2017.
SniffDroid: Detection of Inter-App Privacy Leaks in Android [link]Paper   doi   link   bibtex  
Improving Leakage Path Coverage in Android Apps. Modi, G.; Laxmi, V.; Naval, S.; and Gaur, M. S. In 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, pages 355–362, 2017.
Improving Leakage Path Coverage in Android Apps [link]Paper   doi   link   bibtex  
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip. Jain, A.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; and Bishnoi, R. In VLSI Design and Test - 21st International Symposium, VDAT 2017, Roorkee, India, June 29 - July 2, 2017, Revised Selected Papers, pages 313–323, 2017.
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip [link]Paper   doi   link   bibtex   1 download  
A comprehensive and effective mechanism for DDoS detection in SDN. Conti, M.; Gangwal, A.; and Gaur, M. S. In 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2017, Rome, Italy, October 9-11, 2017, pages 1–8, 2017.
A comprehensive and effective mechanism for DDoS detection in SDN [link]Paper   doi   link   bibtex   1 download  
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges. Singal, G.; Laxmi, V.; Gaur, M. S.; Rao, D. V.; and Kushwaha, R. CoRR, abs/1708.09573. 2017.
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges [link]Paper   link   bibtex  
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. Shekhawat, R. S.; Gaur, M. S.; Elçi, A.; Vaidya, J.; Makarevich, O. B.; Poet, R.; Orgun, M. A.; Dhaka, V. S.; Bohra, M. K.; Singh, V.; Babenko, L. K.; Sheykhkanloo, N. M.; and Rahnama, B., editors. ACM. 2017.
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017 [link]Paper   doi   link   bibtex  
  2016 (20)
DDoS attacks in cloud computing: Collateral damage to non-targets. Somani, G.; Gaur, M. S.; Sanghi, D.; and Conti, M. Comput. Networks, 109: 157–171. 2016.
DDoS attacks in cloud computing: Collateral damage to non-targets [link]Paper   doi   link   bibtex  
Colluding browser extension attack on user privacy and its implication for web browsers. Saini, A.; Gaur, M. S.; Laxmi, V.; and Conti, M. Comput. Secur., 63: 14–28. 2016.
Colluding browser extension attack on user privacy and its implication for web browsers [link]Paper   doi   link   bibtex  
Guest Editorial. Zwolinski, M.; Gaur, M. S.; Laxmi, V.; and Mehta, U. S. IET Comput. Digit. Tech., 10(5): 203–204. 2016.
Guest Editorial [link]Paper   doi   link   bibtex  
\emph\(σ\) \(^\mbox \emphn \)LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip. Gupta, N.; Sharma, A.; Laxmi, V.; Gaur, M. S.; Zwolinski, M.; and Bishnoi, R. IET Comput. Digit. Tech., 10(5): 226–232. 2016.
\emph\(σ\) \(^\mbox \emphn \)LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip [link]Paper   doi   link   bibtex  
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network. Battula, R. B.; Gaur, M. S.; and Gopalani, D. Int. J. Commun. Syst., 29(17): 2503–2516. 2016.
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network [link]Paper   doi   link   bibtex  
Resilient routing implementation in 2D mesh NoC. Bishnoi, R.; Laxmi, V.; Gaur, M. S.; and Zwolinski, M. Microelectron. Reliab., 56: 189–201. 2016.
Resilient routing implementation in 2D mesh NoC [link]Paper   doi   link   bibtex  
Intersection Automata Based Model for Android Application Collusion. Bhandari, S.; Laxmi, V.; Zemmari, A.; and Gaur, M. S. In 30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016, pages 901–908, 2016.
Intersection Automata Based Model for Android Application Collusion [link]Paper   doi   link   bibtex  
FlowMine: Android app analysis via data flow. Sinha, L.; Bhandari, S.; Faruki, P.; Gaur, M. S.; Laxmi, V.; and Conti, M. In 13th IEEE Annual Consumer Communications & Networking Conference, CCNC 2016, Las Vegas, NV, USA, January 9-12, 2016, pages 435–441, 2016.
FlowMine: Android app analysis via data flow [link]Paper   doi   link   bibtex  
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers. Faruki, P.; Zemmari, A.; Gaur, M. S.; Laxmi, V.; and Conti, M. In 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2016, Toulouse, France, June 28 - July 1, 2016, pages 60–65, 2016.
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers [link]Paper   doi   link   bibtex  
ELBA: Efficient Layer Based Routing Algorithm in SDN. Gangwal, A.; Gupta, M.; Gaur, M. S.; Laxmi, V.; and Conti, M. In 25th International Conference on Computer Communication and Networks, ICCCN 2016, Waikoloa, HI, USA, August 1-4, 2016, pages 1–7, 2016.
ELBA: Efficient Layer Based Routing Algorithm in SDN [link]Paper   doi   link   bibtex  
Detection of SQLite Database Vulnerabilities in Android Apps. Jain, V.; Gaur, M. S.; Laxmi, V.; and Mosbah, M. In Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pages 521–531, 2016.
Detection of SQLite Database Vulnerabilities in Android Apps [link]Paper   doi   link   bibtex  
Android component vulnerabities: Proof of concepts and mitigation. Buddhdev, B.; Faruki, P.; Gaur, M. S.; and Laxmi, V. In 2016 International Conference on Information Networking, ICOIN 2016, Kota Kinabalu, Malaysia, January 13-15, 2016, pages 17–22, 2016.
Android component vulnerabities: Proof of concepts and mitigation [link]Paper   doi   link   bibtex  
Reducing FIFO buffer power using architectural alternatives at RTL. Sharma, A.; Ansar, R.; Gaur, M. S.; Bhargava, L.; and Laxmi, V. In 20th International Symposium on VLSI Design and Test, VDAT 2016, Guwahati, India, May 24-27, 2016, pages 1–2, 2016.
Reducing FIFO buffer power using architectural alternatives at RTL [link]Paper   doi   link   bibtex  
A Power Efficient Dual Link Mesh NoC Architecture to Support Nonuniform Traffic Arbitration at Routing Logic. Yadav, S.; Laxmi, V.; and Gaur, M. S. In 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, VLSID 2016, Kolkata, India, January 4-8, 2016, pages 69–74, 2016.
A Power Efficient Dual Link Mesh NoC Architecture to Support Nonuniform Traffic Arbitration at Routing Logic [link]Paper   doi   link   bibtex  
MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks. Singal, G.; Laxmi, V.; Gaur, M. S.; Todi, S.; Rao, D. V.; and Zemmari, A. In 2016 Wireless Days, WD 2016, Toulouse, France, March 23-25, 2016, pages 1–6, 2016.
MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks [link]Paper   doi   link   bibtex  
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis. Faruki, P.; Bhandari, S.; Laxmi, V.; Gaur, M. S.; and Conti, M. In Recent Advances in Computational Intelligence in Defense and Security, pages 519–552. 2016.
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis [link]Paper   doi   link   bibtex  
Ninth International Conference on Contemporary Computing, IC3 2016, Noida, India, August 11-13, 2016. Goel, S.; Sanghi, D.; Zomaya, A. Y.; Boukerche, A.; Ghosh, R. K.; Gaur, M. S.; Banerjee, R.; and Saxena, V., editors. IEEE Computer Society. 2016.
Ninth International Conference on Contemporary Computing, IC3 2016, Noida, India, August 11-13, 2016 [link]Paper   link   bibtex  
Android App Collusion Threat and Mitigation Techniques. Bhandari, S.; Jaballah, W. B.; Jain, V.; Laxmi, V.; Zemmari, A.; Gaur, M. S.; and Conti, M. CoRR, abs/1611.10076. 2016.
Android App Collusion Threat and Mitigation Techniques [link]Paper   link   bibtex  
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions. Faruki, P.; Fereidooni, H.; Laxmi, V.; Conti, M.; and Gaur, M. S. CoRR, abs/1611.10231. 2016.
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions [link]Paper   link   bibtex  
Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Ray, I.; Gaur, M. S.; Conti, M.; Sanghi, D.; and Kamakoti, V., editors. Volume 10063, of Lecture Notes in Computer Science.Springer. 2016.
Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings [link]Paper   doi   link   bibtex  
  2015 (25)
Multivariate verification for sybil attack detection in VANET. Grover, J.; Gaur, M. S.; and Laxmi, V. Open Comput. Sci., 5(1). 2015.
Multivariate verification for sybil attack detection in VANET [link]Paper   doi   link   bibtex  
Android Security: A Survey of Issues, Malware Penetration, and Defenses. Faruki, P.; Bharmal, A.; Laxmi, V.; Ganmoor, V.; Gaur, M. S.; Conti, M.; and Rajarajan, M. IEEE Commun. Surv. Tutorials, 17(2): 998–1022. 2015.
Android Security: A Survey of Issues, Malware Penetration, and Defenses [link]Paper   doi   link   bibtex  
Probabilistic model for nanocell reliability evaluation in presence of transient errors. Kumawat, R.; Sahula, V.; and Gaur, M. S. IET Comput. Digit. Tech., 9(4): 213–220. 2015.
Probabilistic model for nanocell reliability evaluation in presence of transient errors [link]Paper   doi   link   bibtex  
Editorial: Special issue on security of information and networks. Elçi, A.; Orgun, M. A.; Chefranov, A. G.; and Gaur, M. S. J. Inf. Secur. Appl., 22: 1–2. 2015.
Editorial: Special issue on security of information and networks [link]Paper   doi   link   bibtex  
AndroSimilar: Robust signature for detecting variants of Android malware. Faruki, P.; Laxmi, V.; Bharmal, A.; Gaur, M. S.; and Ganmoor, V. J. Inf. Secur. Appl., 22: 66–80. 2015.
AndroSimilar: Robust signature for detecting variants of Android malware [link]Paper   doi   link   bibtex  
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. Laxmi, V.; Lal, C.; Gaur, M. S.; and Mehta, D. J. Inf. Secur. Appl., 22: 99–112. 2015.
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET [link]Paper   doi   link   bibtex  
A Brief Comment on "A Complete Self-Testing and Self-Configuring NoC Infrastructure for Cost-Effective MPSoCs" [ACM Transactions on Embedded Computing Systems 12 (2013) Article 106]. Bishnoi, R.; Laxmi, V.; Gaur, M. S.; Flich, J.; and Triviño, F. ACM Trans. Embed. Comput. Syst., 14(1): 2:1–2:9. 2015.
A Brief Comment on "A Complete Self-Testing and Self-Configuring NoC Infrastructure for Cost-Effective MPSoCs" [ACM Transactions on Embedded Computing Systems 12 (2013) Article 106] [link]Paper   doi   link   bibtex  
Bandwidth-aware routing and admission control for efficient video streaming over MANETs. Lal, C.; Laxmi, V.; Gaur, M. S.; and Ko, S. Wirel. Networks, 21(1): 95–114. 2015.
Bandwidth-aware routing and admission control for efficient video streaming over MANETs [link]Paper   doi   link   bibtex  
d\(^\mbox2\)-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs. Bishnoi, R.; Laxmi, V.; Gaur, M. S.; and Flich, J. In Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9-13, 2015, pages 800–805, 2015.
d\(^\mbox2\)-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs [link]Paper   link   bibtex  
Characterizing impacts of multi-Vt routers on power and reliability of Network-on-Chip. Ansar, R.; Upadhyay, P.; Singhal, M.; Sharma, A.; and Gaur, M. S. In Eighth International Conference on Contemporary Computing, IC3 2015, Noida, India, August 20-22, 2015, pages 476–480, 2015.
Characterizing impacts of multi-Vt routers on power and reliability of Network-on-Chip [link]Paper   doi   link   bibtex  
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud. Somani, G.; Johri, A.; Taneja, M.; Pyne, U.; Gaur, M. S.; and Sanghi, D. In Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pages 263–282, 2015.
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud [link]Paper   doi   link   bibtex  
sandFOX: secure sandboxed and isolated environment for firefox browser. Saini, A.; Gaur, M. S.; Laxmi, V.; and Nanda, P. In Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015, pages 20–27, 2015.
sandFOX: secure sandboxed and isolated environment for firefox browser [link]Paper   doi   link   bibtex  
DDoS/EDoS attack in cloud: affecting everyone out there!. Somani, G.; Gaur, M. S.; and Sanghi, D. In Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015, pages 169–176, 2015.
DDoS/EDoS attack in cloud: affecting everyone out there! [link]Paper   doi   link   bibtex  
DRACO: DRoid analyst combo an android malware analysis framework. Bhandari, S.; Gupta, R.; Laxmi, V.; Gaur, M. S.; Zemmari, A.; and Anikeev, M. In Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015, pages 283–289, 2015.
DRACO: DRoid analyst combo an android malware analysis framework [link]Paper   doi   link   bibtex   1 download  
A robust dynamic analysis system preventing SandBox detection by Android malware. Gajrani, J.; Sarswat, J.; Tripathi, M.; Laxmi, V.; Gaur, M. S.; and Conti, M. In Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015, pages 290–295, 2015.
A robust dynamic analysis system preventing SandBox detection by Android malware [link]Paper   doi   link   bibtex  
DynaDroid: dynamic binary instrumentation based app behavior monitoring framework. Buddhdev, B.; Bhan, R.; Gaur, M. S.; and Laxmi, V. In Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015, pages 322–325, 2015.
DynaDroid: dynamic binary instrumentation based app behavior monitoring framework [link]Paper   doi   link   bibtex  
Network-on-chip: Current issues and challenges. Gaur, M. S.; Laxmi, V.; Zwolinski, M.; Kumar, M.; Gupta, N.; and Sharma, A. In 19th International Symposium on VLSI Design and Test, VDAT 2015, Ahmedabad, India, June 26-29, 2015, pages 1–3, 2015.
Network-on-chip: Current issues and challenges [link]Paper   doi   link   bibtex  
\(σ\)LBDR: Congestion-aware logic based distributed routing for 2D NoC. Gupta, N.; Kumar, M.; Laxmi, V.; Gaur, M. S.; and Zwolinski, M. In 19th International Symposium on VLSI Design and Test, VDAT 2015, Ahmedabad, India, June 26-29, 2015, pages 1–6, 2015.
\(σ\)LBDR: Congestion-aware logic based distributed routing for 2D NoC [link]Paper   doi   link   bibtex  
Modeling and synthesis of molecular memory. Kumawat, R.; Sahula, V.; and Gaur, M. S. In 19th International Symposium on VLSI Design and Test, VDAT 2015, Ahmedabad, India, June 26-29, 2015, pages 1–2, 2015.
Modeling and synthesis of molecular memory [link]Paper   doi   link   bibtex  
A framework for thermal aware reliability estimation in 2D NoC. Sharma, A.; Upadhyay, P.; Ansar, R.; Laxmi, V.; Bhargava, L.; Gaur, M. S.; and Zwolinski, M. In 19th International Symposium on VLSI Design and Test, VDAT 2015, Ahmedabad, India, June 26-29, 2015, pages 1–6, 2015.
A framework for thermal aware reliability estimation in 2D NoC [link]Paper   doi   link   bibtex  
C\(^\mbox2\)-DLM: Cache coherence aware dual link mesh for on-chip interconnect. Yadav, S.; Laxmi, V.; Gaur, M. S.; and Bhargava, M. In 19th International Symposium on VLSI Design and Test, VDAT 2015, Ahmedabad, India, June 26-29, 2015, pages 1–2, 2015.
C\(^\mbox2\)-DLM: Cache coherence aware dual link mesh for on-chip interconnect [link]Paper   doi   link   bibtex  
CERI: Cost-Effective Routing Implementation Technique for Network-on-Chip. Bishnoi, R.; Laxmi, V.; Gaur, M. S.; Ramlee, R. H. B.; and Zwolinski, M. In 28th International Conference on VLSI Design, VLSID 2015, Bangalore, India, January 3-7, 2015, pages 59–64, 2015.
CERI: Cost-Effective Routing Implementation Technique for Network-on-Chip [link]Paper   doi   link   bibtex  
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Buyya, R. CoRR, abs/1512.08187. 2015.
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions [link]Paper   link   bibtex  
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015. Makarevich, O. B.; Poet, R.; Elçi, A.; Gaur, M. S.; Orgun, M. A.; Babenko, L. K.; Ferdous, M. S.; Ho, A. T. S.; Laxmi, V.; and Pieprzyk, J., editors. ACM. 2015.
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015 [link]Paper   link   bibtex  
  2014 (22)
Detecting malicious files using non-signature-based methods. Vinod, P.; Laxmi, V.; Gaur, M. S.; and Chauhan, G. Int. J. Inf. Comput. Secur., 6(3): 199–240. 2014.
Detecting malicious files using non-signature-based methods [link]Paper   doi   link   bibtex  
Sybil attack detection in VANET using neighbouring vehicles. Grover, J.; Laxmi, V.; and Gaur, M. S. Int. J. Secur. Networks, 9(4): 222–233. 2014.
Sybil attack detection in VANET using neighbouring vehicles [link]Paper   doi   link   bibtex  
Probabilistic modeling and analysis of molecular memory. Kumawat, R.; Sahula, V.; and Gaur, M. S. ACM J. Emerg. Technol. Comput. Syst., 11(1): 6:1–6:16. 2014.
Probabilistic modeling and analysis of molecular memory [link]Paper   doi   link   bibtex  
Exploiting convergence characteristics to tackle collusion attacks in OLSR for \emphSecurity and Communication Networks. Gaur, M. S.; Kaur, R.; Suresh, P. L.; and Laxmi, V. Secur. Commun. Networks, 7(1): 108–122. 2014.
Exploiting convergence characteristics to tackle collusion attacks in OLSR for \emphSecurity and Communication Networks [link]Paper   doi   link   bibtex  
Dynamic fault injection model for on-chip 2D mesh network. Yadav, S.; Gaur, M. S.; Laxmi, V.; and Bhargava, M. In Proceedings of the 7th ACM India Computing Conference, COMPUTE 2014, Nagpur, India, October 9-11, 2014, pages 18:1–18:6, 2014.
Dynamic fault injection model for on-chip 2D mesh network [link]Paper   doi   link   bibtex  
Fault tolerant and highly adaptive routing for 2D NoCs. Kumar, M.; Laxmi, V.; Gaur, M. S.; Daneshtalab, M.; Ebrahimi, M.; and Zwolinski, M. In 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2014, Amsterdam, The Netherlands, October 1-3, 2014, pages 104–109, 2014.
Fault tolerant and highly adaptive routing for 2D NoCs [link]Paper   doi   link   bibtex  
Highly adaptive and congestion-aware routing for 3D NoCs. Kumar, M.; Laxmi, V.; Gaur, M. S.; Daneshtalab, M.; Ko, S.; and Zwolinski, M. In Great Lakes Symposium on VLSI 2014, GLSVLSI '14, Houston, TX, USA - May 21 - 23, 2014, pages 97–98, 2014.
Highly adaptive and congestion-aware routing for 3D NoCs [link]Paper   doi   link   bibtex   1 download  
LSMRP: Link stability based multicast routing protocol in MANETs. Singal, G.; Laxmi, V.; Gaur, M. S.; and Lal, C. In Seventh International Conference on Contemporary Computing, IC3 2014, Noida, India, August 7-9, 2014, pages 254–259, 2014.
LSMRP: Link stability based multicast routing protocol in MANETs [link]Paper   doi   link   bibtex  
Privacy Leakage Attacks in Browsers by Colluding Extensions. Saini, A.; Gaur, M. S.; Laxmi, V.; Singhal, T.; and Conti, M. In Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pages 257–276, 2014.
Privacy Leakage Attacks in Browsers by Colluding Extensions [link]Paper   doi   link   bibtex  
TMAC - Token based MAC protocol for cognitive radio wireless mesh network. Battula, R. B.; Gopalani, D.; Gaur, M. S.; and Kakarla, J. In International Conference on Information and Communication Technology Convergence, ICTC 2014, Busan, South Korea, October 22-24, 2014, pages 151–156, 2014.
TMAC - Token based MAC protocol for cognitive radio wireless mesh network [link]Paper   doi   link   bibtex  
Improved Route Selection Approaches using Q-learning framework for 2D NoCs. Gupta, N.; Kumar, M.; Sharma, A.; Gaur, M. S.; Laxmi, V.; Daneshtalab, M.; and Ebrahimi, M. In Proceedings of the 3rd International Workshop on Many-core Embedded Systems (MES'2015) held on June 13, 2015 in conjunction with the 42nd International Symposium on Computer Architecture (ISCA'2015), Portland, OR, USA, pages 33–40, 2014.
Improved Route Selection Approaches using Q-learning framework for 2D NoCs [link]Paper   doi   link   bibtex  
A novel non-minimal/minimal turn model for highly adaptive routing in 2D NoCs. Kumar, M.; Laxmi, V.; Gaur, M. S.; Daneshtalab, M.; Srivastava, P. K.; Ko, S.; and Zwolinski, M. In Eighth IEEE/ACM International Symposium on Networks-on-Chip, NoCS 2014, Ferrara, Italy, September 17-19, 2014, pages 184–185, 2014.
A novel non-minimal/minimal turn model for highly adaptive routing in 2D NoCs [link]Paper   doi   link   bibtex  
Fault tolerant routing implementation mechanism for irregular 2D mesh NoCs. Bishnoi, R.; Laxmi, V.; Gaur, M. S.; Ramlee, R. H. B.; and Zwolinski, M. In 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, pages 1–4, 2014.
Fault tolerant routing implementation mechanism for irregular 2D mesh NoCs [link]Paper   doi   link   bibtex  
P-SPADE: GPU accelerated malware packer detection. Gupta, N.; Naval, S.; Laxmi, V.; Gaur, M. S.; and Rajarajan, M. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pages 257–263, 2014.
P-SPADE: GPU accelerated malware packer detection [link]Paper   doi   link   bibtex  
Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps. Faruki, P.; Kumar, V.; Bharmal, A.; Gaur, M. S.; Laxmi, V.; and Conti, M. In International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I, pages 556–560, 2014.
Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps [link]Paper   doi   link   bibtex  
Analysis of Identity Forging Attack in MANETs. Garg, N.; Pareek, K.; Gaur, M. S.; Laxmi, V.; and Lal, C. In Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pages 441, 2014.
Analysis of Identity Forging Attack in MANETs [link]Paper   doi   link   bibtex  
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. Faruki, P.; Bharmal, A.; Laxmi, V.; Gaur, M. S.; Conti, M.; and Rajarajan, M. In 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, pages 414–421, 2014.
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation [link]Paper   doi   link   bibtex  
Distributed adaptive routing for spidergon NoC. Bishnoi, R.; Srivastava, P. K.; Laxmi, V.; Gaur, M. S.; and Sikka, A. In 18th International Symposium on VLSI Design and Test, VDAT 2014, Coimbatore, India, July 16-18, 2014, pages 1–6, 2014.
Distributed adaptive routing for spidergon NoC [link]Paper   doi   link   bibtex  
A novel non-minimal turn model for highly adaptive routing in 2D NoCs. Kumar, M.; Laxmi, V.; Gaur, M. S.; Daneshtalab, M.; and Zwolinski, M. In 22nd International Conference on Very Large Scale Integration, VLSI-SoC, Playa del Carmen, Mexico, October 6-8, 2014, pages 1–6, 2014.
A novel non-minimal turn model for highly adaptive routing in 2D NoCs [link]Paper   doi   link   bibtex  
CARM: Congestion Adaptive Routing Method for On Chip Networks. Kumar, M.; Laxmi, V.; Gaur, M. S.; Ko, S.; and Zwolinski, M. In 2014 27th International Conference on VLSI Design, VLSID 2014, and 2014 13th International Conference on Embedded Systems, Mumbai, India, January 5-9, 2014, pages 240–245, 2014.
CARM: Congestion Adaptive Routing Method for On Chip Networks [link]Paper   doi   link   bibtex  
  2013 (20)
Near-Optimal Geometric Feature Selection for Visual speech Recognition. Singh, P.; Laxmi, V.; and Gaur, M. S. Int. J. Pattern Recognit. Artif. Intell., 27(8). 2013.
Near-Optimal Geometric Feature Selection for Visual speech Recognition [link]Paper   doi   link   bibtex   1 download  
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets. Faruki, P.; Laxmi, V.; Ganmoor, V.; Gaur, M. S.; and Bharmal, A. In 2013 2nd International Conference on Advanced Computing, Networking and Security, Mangalore, India, December 15-17, 2013, pages 247–252, 2013.
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets [link]Paper   doi   link   bibtex  
MCF: MultiComponent Features for Malware Analysis. Vinod, P.; Laxmi, V.; Gaur, M. S.; Naval, S.; and Faruki, P. In 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013, pages 1076–1081, 2013.
MCF: MultiComponent Features for Malware Analysis [link]Paper   doi   link   bibtex  
Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN. Tripathi, M.; Gaur, M. S.; and Laxmi, V. In Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013, pages 1101–1107, 2013.
Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN [link]Paper   doi   link   bibtex  
QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs. Lal, C.; Laxmi, V.; and Gaur, M. S. In 19th Asia-Pacific Conference on Communications, APCC 2013, Denpasar, Indonesia, August 29-31, 2013, pages 104–109, 2013.
QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs [link]Paper   doi   link   bibtex  
Video streaming over MANETs: Testing and analysis using real-time emulation. Lal, C.; Laxmi, V.; and Gaur, M. S. In 19th Asia-Pacific Conference on Communications, APCC 2013, Denpasar, Indonesia, August 29-31, 2013, pages 190–195, 2013.
Video streaming over MANETs: Testing and analysis using real-time emulation [link]Paper   doi   link   bibtex  
Reconfigurable distributed fault tolerant routing algorithm for on-chip networks. Kumar, M.; Srivastava, P. K.; Laxmi, V.; Gaur, M. S.; and Ko, S. In 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2013, New York City, NY, USA, October 2-4, 2013, pages 290–295, 2013.
Reconfigurable distributed fault tolerant routing algorithm for on-chip networks [link]Paper   doi   link   bibtex  
An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs. Lal, C.; Laxmi, V.; and Gaur, M. S. In International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, Mysore, India, August 22-25, 2013, pages 610–615, 2013.
An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs [link]Paper   doi   link   bibtex  
Ns-3 emulation on ORBIT testbed. Yadav, S.; Gaur, M. S.; and Laxmi, V. In International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, Mysore, India, August 22-25, 2013, pages 616–619, 2013.
Ns-3 emulation on ORBIT testbed [link]Paper   doi   link   bibtex  
Energy Scavenging Based HybridGSM Model for Mobile Towers. Yadav, S.; Gaur, M. S.; and Laxmi, V. In Recent Advances in Intelligent Informatics - Proceedings of the Second International Symposium on Intelligent Informatics, ISI 2013, August 23-24 2013, Mysore, India, pages 343–349, 2013.
Energy Scavenging Based HybridGSM Model for Mobile Towers [link]Paper   doi   link   bibtex  
Energy Efficient Clustered Routing for Wireless Sensor Network. Tripathi, M.; Battula, R. B.; Gaur, M. S.; and Laxmi, V. In IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, Dalian, MSN 2013, China, December 11-13, 2013, pages 330–335, 2013.
Energy Efficient Clustered Routing for Wireless Sensor Network [link]Paper   doi   link   bibtex  
AndroSimilar: robust statistical feature signature for Android malware detection. Faruki, P.; Ganmoor, V.; Laxmi, V.; Gaur, M. S.; and Bharmal, A. In The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pages 152–159, 2013.
AndroSimilar: robust statistical feature signature for Android malware detection [link]Paper   doi   link   bibtex  
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. Laxmi, V.; Mehta, D.; Gaur, M. S.; Faruki, P.; and Lal, C. In The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pages 189–195, 2013.
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks [link]Paper   doi   link   bibtex  
The darker side of Firefox extension. Saini, A.; Gaur, M. S.; and Laxmi, V. In The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pages 316–320, 2013.
The darker side of Firefox extension [link]Paper   doi   link   bibtex  
Insecurities within browser: issues and challenges. Gaur, M. S.; Patel, D. R.; and Saini, A. In The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pages 458, 2013.
Insecurities within browser: issues and challenges [link]Paper   doi   link   bibtex  
Fault Aware Dynamic Adaptive Routing Using LBDR. Bishnoi, R.; Laxmi, V.; Gaur, M. S.; and Baskota, M. In VLSI Design and Test, 17th International Symposium, VDAT 2013, Jaipur, India, July 27-30, 2013, Revised Selected Papers, pages 304–311, 2013.
Fault Aware Dynamic Adaptive Routing Using LBDR [link]Paper   doi   link   bibtex  
Information theft through covert channel by exploiting HTTP post method. Tomar, N.; and Gaur, M. S. In Tenth International Conference on Wireless and Optical Communications Networks, WOCN 2013, Bhopal, India, July 26-28, 2013, pages 1–5, 2013.
Information theft through covert channel by exploiting HTTP post method [link]Paper   doi   link   bibtex  
Trust Establishment Techniques in VANET. Grover, J.; Gaur, M. S.; and Laxmi, V. In Wireless Networks and Security, Issues, Challenges and Research Trends, pages 273–301. 2013.
Trust Establishment Techniques in VANET [link]Paper   doi   link   bibtex  
The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013. Elçi, A.; Gaur, M. S.; Orgun, M. A.; and Makarevich, O. B., editors. ACM. 2013.
The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013 [link]Paper   link   bibtex  
VLSI Design and Test, 17th International Symposium, VDAT 2013, Jaipur, India, July 27-30, 2013, Revised Selected Papers. Gaur, M. S.; Zwolinski, M.; Laxmi, V.; Boolchandani, D.; Singh, V.; and Singh, A. D., editors. Volume 382, of Communications in Computer and Information Science.Springer. 2013.
VLSI Design and Test, 17th International Symposium, VDAT 2013, Jaipur, India, July 27-30, 2013, Revised Selected Papers [link]Paper   doi   link   bibtex  
  2012 (13)
A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs. Lal, C.; Laxmi, V.; and Gaur, M. S. In IEEE 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012, pages 399–405, 2012.
A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs [link]Paper   doi   link   bibtex  
REFORM: Relevant Features for Malware Analysis. Nair, V. P.; Laxmi, V.; and Gaur, M. S. In 26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26-29, 2012, pages 738–744, 2012.
REFORM: Relevant Features for Malware Analysis [link]Paper   doi   link   bibtex  
A rate adaptive and multipath routing protocol to support video streaming in MANETs. Lal, C.; Laxmi, V.; and Gaur, M. S. In 2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012, pages 262–268, 2012.
A rate adaptive and multipath routing protocol to support video streaming in MANETs [link]Paper   doi   link   bibtex  
n-Gram modeling of relevant features for lip-reading. Singh, P.; Laxmi, V.; and Gaur, M. S. In 2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012, pages 1199–1204, 2012.
n-Gram modeling of relevant features for lip-reading [link]Paper   doi   link   bibtex  
Speaker identification using optimal lip biometrics. Singh, P.; Laxmi, V.; and Gaur, M. S. In 5th IAPR International Conference on Biometrics, ICB 2012, New Delhi, India, March 29 - April 1, 2012, pages 472–477, 2012.
Speaker identification using optimal lip biometrics [link]Paper   doi   link   bibtex  
Behavioural detection with \emphAPI call-grams to identify malicious PE files. Faruki, P.; Laxmi, V.; Gaur, M. S.; and Vinod, P. In First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012, pages 85–91, 2012.
Behavioural detection with \emphAPI call-grams to identify malicious PE files [link]Paper   doi   link   bibtex  
Detection of incorrect position information using speed and time span verification in VANET. Grover, J.; Gaur, M. S.; Laxmi, V.; and Tiwari, R. K. In 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 53–59, 2012.
Detection of incorrect position information using speed and time span verification in VANET [link]Paper   doi   link   bibtex  
Mining control flow graph as \emphAPI call-grams to detect portable executable malware. Faruki, P.; Laxmi, V.; Gaur, M. S.; and Vinod, P. In 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 130–137, 2012.
Mining control flow graph as \emphAPI call-grams to detect portable executable malware [link]Paper   doi   link   bibtex  
Lip peripheral motion for visual surveillance. Singh, P.; Laxmi, V.; and Gaur, M. S. In 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 173–177, 2012.
Lip peripheral motion for visual surveillance [link]Paper   doi   link   bibtex  
Detection attack analysis using partial watermark in DCT domain. Gunjan, R.; Laxmi, V.; and Gaur, M. S. In 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 188–192, 2012.
Detection attack analysis using partial watermark in DCT domain [link]Paper   doi   link   bibtex  
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012. Gaur, M. S.; Elçi, A.; Makarevich, O. B.; Orgun, M. A.; and Singh, V., editors. ACM. 2012.
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012 [link]Paper   link   bibtex  
  2011 (24)
A Novel Attack Model Simulation in OLSR. Kumar, M.; Kaur, R.; Laxmi, V.; and Gaur, M. S. In Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I, pages 44–53, 2011.
A Novel Attack Model Simulation in OLSR [link]Paper   doi   link   bibtex  
Broken Link Fraud in DSDV Routing - Detection and Countermeasure. Sharma, H. M.; Kaur, R.; Gaur, M. S.; and Laxmi, V. In Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I, pages 162–171, 2011.
Broken Link Fraud in DSDV Routing - Detection and Countermeasure [link]Paper   doi   link   bibtex  
Contribution of Oral Periphery on Visual Speech Intelligibility. Singh, P.; Gupta, D.; Laxmi, V.; and Gaur, M. S. In Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, pages 183–190, 2011.
Contribution of Oral Periphery on Visual Speech Intelligibility [link]Paper   doi   link   bibtex  
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs. Lal, C.; Laxmi, V.; and Gaur, M. S. In Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, pages 452–459, 2011.
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs [link]Paper   doi   link   bibtex  
Robust Watermarking through Spatially Disjoint Transformations. Gunjan, R.; Maheshwari, S.; Laxmi, V.; and Gaur, M. S. In Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III, pages 478–487, 2011.
Robust Watermarking through Spatially Disjoint Transformations [link]Paper   doi   link   bibtex  
Scattered Feature Space for Malware Analysis. Vinod, P.; Laxmi, V.; and Gaur, M. S. In Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I, pages 562–571, 2011.
Scattered Feature Space for Malware Analysis [link]Paper   doi   link   bibtex  
Machine Learning Approach for Multiple Misbehavior Detection in VANET. Grover, J.; Prajapati, N. K.; Laxmi, V.; and Gaur, M. S. In Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III, pages 644–653, 2011.
Machine Learning Approach for Multiple Misbehavior Detection in VANET [link]Paper   doi   link   bibtex  
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs. Lal, C.; Laxmi, V.; and Gaur, M. S. In Advanced Communication and Networking - Third International Conference, ACN 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings, pages 86–95, 2011.
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs [link]Paper   doi   link   bibtex  
PEAL - Packed Executable AnaLysis. Laxmi, V.; Gaur, M. S.; Faruki, P.; and Naval, S. In Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers, pages 237–243, 2011.
PEAL - Packed Executable AnaLysis [link]Paper   doi   link   bibtex  
Misbehavior Detection Based on Ensemble Learning in VANET. Grover, J.; Laxmi, V.; and Gaur, M. S. In Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers, pages 602–611, 2011.
Misbehavior Detection Based on Ensemble Learning in VANET [link]Paper   doi   link   bibtex  
GA Based Congestion Aware Topology Generation for Application Specific NoC. Choudhary, N.; Gaur, M. S.; Laxmi, V.; and Singh, V. In Sixth IEEE International Symposium on Electronic Design, Test and Application, DELTA 2011, Queenstown, New Zealand, 17-19 January, 2011, pages 93–98, 2011.
GA Based Congestion Aware Topology Generation for Application Specific NoC [link]Paper   doi   link   bibtex  
A Traffic Model for Concurrent Core Tasks in Networks-on-Chip. Chuggani, R.; Laxmi, V.; Gaur, M. S.; Khandelwal, P.; and Bansal, P. In Sixth IEEE International Symposium on Electronic Design, Test and Application, DELTA 2011, Queenstown, New Zealand, 17-19 January, 2011, pages 205–210, 2011.
A Traffic Model for Concurrent Core Tasks in Networks-on-Chip [link]Paper   doi   link   bibtex  
Acceleration of Functional Validation Using GPGPU. Suresh, P. L.; Rameshan, N.; Gaur, M. S.; Zwolinski, M.; and Laxmi, V. In Sixth IEEE International Symposium on Electronic Design, Test and Application, DELTA 2011, Queenstown, New Zealand, 17-19 January, 2011, pages 211–216, 2011.
Acceleration of Functional Validation Using GPGPU [link]Paper   doi   link   bibtex  
Parallelizing TUNAMI-N1 Using GPGPU. Gidra, H.; Haque, I.; Kumar, N. P.; Sargurunathan, M.; Gaur, M. S.; Laxmi, V.; Zwolinski, M.; and Singh, V. In 13th IEEE International Conference on High Performance Computing & Communication, HPCC 2011, Banff, Alberta, Canada, September 2-4, 2011, pages 845–850, 2011.
Parallelizing TUNAMI-N1 Using GPGPU [link]Paper   doi   link   bibtex  
Boundary Descriptors for Visual Speech Recognition. Gupta, D.; Singh, P.; Laxmi, V.; and Gaur, M. S. In Computer and Information Sciences II - 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011, pages 307–313, 2011.
Boundary Descriptors for Visual Speech Recognition [link]Paper   doi   link   bibtex   1 download  
Detection of Broken Link Fraud in DSDV Routing. Kaur, R.; Laxmi, V.; and Gaur, M. S. In Computer and Information Sciences II - 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011, pages 419–424, 2011.
Detection of Broken Link Fraud in DSDV Routing [link]Paper   doi   link   bibtex  
Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection. Grover, J.; Gaur, M. S.; and Laxmi, V. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey, 4-8 July, 2011, pages 701–706, 2011.
Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection [link]Paper   doi   link   bibtex  
A Novel Attack Model Simulation in DSDV Routing. Kaur, R.; Gaur, M. S.; and Laxmi, V. In 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011, Paris, France, February 7-10, 2011, pages 1–5, 2011.
A Novel Attack Model Simulation in DSDV Routing [link]Paper   doi   link   bibtex  
Detour attack in OLSR. Gaur, M. S.; Laxmi, V.; Kumar, M.; and Kaur, R. In Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pages 137–142, 2011.
Detour attack in OLSR [link]Paper   doi   link   bibtex  
A sybil attack detection approach using neighboring vehicles in VANET. Grover, J.; Gaur, M. S.; Laxmi, V.; and Prajapati, N. K. In Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pages 151–158, 2011.
A sybil attack detection approach using neighboring vehicles in VANET [link]Paper   doi   link   bibtex  
Acceleration of packet filtering using gpgpu. Gaur, M. S.; Laxmi, V.; V., L.; Cahndra, K.; and Zwolinski, M. In Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pages 227–230, 2011.
Acceleration of packet filtering using gpgpu [link]Paper   doi   link   bibtex  
C-Routing: An adaptive hierarchical NoC routing methodology. Puthal, M. K.; Singh, V.; Gaur, M. S.; and Laxmi, V. In IEEE/IFIP 19th International Conference on VLSI and System-on-Chip, VLSI-SoC 2011, Kowloon, Hong Kong, China, October 3-5, 2011, pages 392–397, 2011.
C-Routing: An adaptive hierarchical NoC routing methodology [link]Paper   doi   link   bibtex  
DoS Attacks in MANETs: Detection and Countermeasures. Kaur, R.; Gaur, M. S.; Suresh, P. L.; and Laxmi, V. In Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives, pages 124–145. 2011.
DoS Attacks in MANETs: Detection and Countermeasures [link]Paper   doi   link   bibtex  
Metamorphic Malware Analysis and Detection Methods. Vinod, P.; Laxmi, V.; and Gaur, M. S. In Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives, pages 178–202. 2011.
Metamorphic Malware Analysis and Detection Methods [link]Paper   doi   link   bibtex  
  2010 (12)
Lipreading Using \emphn-Gram Feature Vector. Singh, P.; Laxmi, V.; Gupta, D.; and Gaur, M. S. In Computational Intelligence in Security for Information Systems 2010 - Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), León, Spain, November 11-12, 2010, pages 81–88, 2010.
Lipreading Using \emphn-Gram Feature Vector [link]Paper   doi   link   bibtex  
Permuted Image DCT Watermarking. Gunjan, R.; Maheshwari, S.; Gaur, M. S.; and Laxmi, V. In Computational Intelligence in Security for Information Systems 2010 - Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), León, Spain, November 11-12, 2010, pages 163–171, 2010.
Permuted Image DCT Watermarking [link]Paper   doi   link   bibtex  
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. Grover, J.; Kumar, D.; Sargurunathan, M.; Gaur, M. S.; and Laxmi, V. In Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings, pages 473–482, 2010.
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks [link]Paper   doi   link   bibtex  
Minimal Path, Fault Tolerant, QoS Aware Routing with Node and Link Failure in 2-D Mesh NoC. Rameshan, N.; Laxmi, V.; Gaur, M. S.; Ahmed, M.; and Paliwal, K. K. In 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, DFT 2010, Kyoto, Japan, October 6-8, 2010, pages 60–66, 2010.
Minimal Path, Fault Tolerant, QoS Aware Routing with Node and Link Failure in 2-D Mesh NoC [link]Paper   doi   link   bibtex  
Thermal aware test scheduling for stacked multi-chip-modules. Vinay, N. S.; Rawat, I.; Larsson, E.; Gaur, M. S.; and Singh, V. In 2010 East-West Design & Test Symposium, EWDTS 2010, St. Petersburg, Russia, September 17-20, 2010, pages 343–349, 2010.
Thermal aware test scheduling for stacked multi-chip-modules [link]Paper   doi   link   bibtex  
Fault grading using Instruction-Execution graph. Vinutha, K. R.; Singh, V.; Matrosova, A. Y.; and Gaur, M. S. In 2010 East-West Design & Test Symposium, EWDTS 2010, St. Petersburg, Russia, September 17-20, 2010, pages 350–357, 2010.
Fault grading using Instruction-Execution graph [link]Paper   doi   link   bibtex  
Genetic algorithm based topology generation for application specific Network-on-Chip. Choudhary, N.; Gaur, M. S.; Laxmi, V.; and Singh, V. In International Symposium on Circuits and Systems (ISCAS 2010), May 30 - June 2, 2010, Paris, France, pages 3156–3159, 2010.
Genetic algorithm based topology generation for application specific Network-on-Chip [link]Paper   doi   link   bibtex   2 downloads  
ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips. Sharma, V.; Agarwal, R.; Gaur, M. S.; Laxmi, V.; and V., V. In Network and Parallel Computing, IFIP International Conference, NPC 2010, Zhengzhou, China, September 13-15, 2010. Proceedings, pages 481–490, 2010.
ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips [link]Paper   doi   link   bibtex   5 downloads  
A novel defense mechanism against sybil attacks in VANET. Grover, J.; Gaur, M. S.; and Laxmi, V. In Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pages 249–255, 2010.
A novel defense mechanism against sybil attacks in VANET [link]Paper   doi   link   bibtex  
A collusion attack detection method for OLSR-based MANETS employing scruple packets. Suresh, P. L.; Kaur, R.; Gaur, M. S.; and Laxmi, V. In Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pages 256–262, 2010.
A collusion attack detection method for OLSR-based MANETS employing scruple packets [link]Paper   doi   link   bibtex  
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API. Nair, V. P.; Jain, H.; Golecha, Y. K.; Gaur, M. S.; and Laxmi, V. In Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pages 263–269, 2010.
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API [link]Paper   doi   link   bibtex  
Collusion attack resistance through forced MPR switching in OLSR. Suresh, P. L.; Kaur, R.; Gaur, M. S.; and Laxmi, V. In Proceedings of the 3rd IFIP Wireless Days Conference 2010, Venice, Italy, October 20-22, 2010, pages 1–5, 2010.
Collusion attack resistance through forced MPR switching in OLSR [link]Paper   doi   link   bibtex  
  2009 (3)
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip. Paliwal, K. K.; George, J. S.; Rameshan, N.; Laxmi, V.; Gaur, M. S.; Janyani, V.; and Narasimhan, R. In Contemporary Computing - Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings, pages 370–380, 2009.
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip [link]Paper   doi   link   bibtex  
Static CFG analyzer for metamorphic Malware code. Nair, V. P.; Laxmi, V.; Gaur, M. S.; Kumar, G. V. S. S. P.; and Chundawat, Y. S. In Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pages 225–228, 2009.
Static CFG analyzer for metamorphic Malware code [link]Paper   doi   link   bibtex  
Buyer seller watermarking protocol for digital rights management. Laxmi, V.; Khan, M. N.; Kumar, S. S.; and Gaur, M. S. In Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pages 298–301, 2009.
Buyer seller watermarking protocol for digital rights management [link]Paper   doi   link   bibtex  
  2008 (1)
Structural Fault Modelling in Nano Devices. Gaur, M. S.; Narasimhan, R.; Laxmi, V.; and Kumar, U. In Nano-Net - Third International ICST Conference, NanoNet 2008, Boston, MA, USA, September 14-16, 2008, Revised Selected Papers, pages 6–10, 2008.
Structural Fault Modelling in Nano Devices [link]Paper   doi   link   bibtex  
  2004 (1)
Integrating Self Testability with Design Space Exploration by a Controller based Estimation Technique. Gaur, M. S.; and Zwolinski, M. In 17th International Conference on VLSI Design (VLSI Design 2004), with the 3rd International Conference on Embedded Systems Design, 5-9 January 2004, Mumbai, India, pages 901–906, 2004.
Integrating Self Testability with Design Space Exploration by a Controller based Estimation Technique [link]Paper   doi   link   bibtex  
  2003 (1)
Integrating testability with design space exploration. Zwolinski, M.; and Gaur, M. S. Microelectron. Reliab., 43(5): 685–693. 2003.
Integrating testability with design space exploration [link]Paper   doi   link   bibtex   3 downloads