A rate adaptive and multipath routing protocol to support video streaming in MANETs.
Lal, C.; Laxmi, V.; and Gaur, M. S.
In
2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012, pages 262–268, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/icacci/LalLG12,
author = {Chhagan Lal and
Vijay Laxmi and
Manoj Singh Gaur},
title = {A rate adaptive and multipath routing protocol to support video streaming
in MANETs},
booktitle = {2012 International Conference on Advances in Computing, Communications
and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012},
pages = {262--268},
year = {2012},
crossref = {DBLP:conf/icacci/2012},
url = {https://doi.org/10.1145/2345396.2345440},
doi = {10.1145/2345396.2345440},
timestamp = {Sun, 29 Aug 2021 01:08:46 +0200},
biburl = {https://dblp.org/rec/conf/icacci/LalLG12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
n-Gram modeling of relevant features for lip-reading.
Singh, P.; Laxmi, V.; and Gaur, M. S.
In
2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012, pages 1199–1204, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/icacci/SinghLG12,
author = {Preety Singh and
Vijay Laxmi and
Manoj Singh Gaur},
title = {n-Gram modeling of relevant features for lip-reading},
booktitle = {2012 International Conference on Advances in Computing, Communications
and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012},
pages = {1199--1204},
year = {2012},
crossref = {DBLP:conf/icacci/2012},
url = {https://doi.org/10.1145/2345396.2345588},
doi = {10.1145/2345396.2345588},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icacci/SinghLG12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Speaker identification using optimal lip biometrics.
Singh, P.; Laxmi, V.; and Gaur, M. S.
In
5th IAPR International Conference on Biometrics, ICB 2012, New Delhi, India, March 29 - April 1, 2012, pages 472–477, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/icb/SinghLG12,
author = {Preety Singh and
Vijay Laxmi and
Manoj Singh Gaur},
title = {Speaker identification using optimal lip biometrics},
booktitle = {5th {IAPR} International Conference on Biometrics, {ICB} 2012, New
Delhi, India, March 29 - April 1, 2012},
pages = {472--477},
year = {2012},
crossref = {DBLP:conf/icb/2012},
url = {https://doi.org/10.1109/ICB.2012.6199795},
doi = {10.1109/ICB.2012.6199795},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icb/SinghLG12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Behavioural detection with \emphAPI call-grams to identify malicious PE files.
Faruki, P.; Laxmi, V.; Gaur, M. S.; and Vinod, P.
In
First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012, pages 85–91, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/securit/FarukiLGV12,
author = {Parvez Faruki and
Vijay Laxmi and
Manoj Singh Gaur and
P. Vinod},
title = {Behavioural detection with \emph{API call-grams} to identify malicious
{PE} files},
booktitle = {First International Conference on Security of Internet of Things,
{SECURIT} '12, Kollam, India - August 17 - 19, 2012},
pages = {85--91},
year = {2012},
crossref = {DBLP:conf/securit/2012},
url = {https://doi.org/10.1145/2490428.2490440},
doi = {10.1145/2490428.2490440},
timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/securit/FarukiLGV12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
SPADE: Signature based PAcker DEtection.
Naval, S.; Laxmi, V.; Gaur, M. S.; and Vinod, P.
In
First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012, pages 96–101, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/securit/NavalLGV12,
author = {Smita Naval and
Vijay Laxmi and
Manoj Singh Gaur and
P. Vinod},
title = {{SPADE:} Signature based PAcker DEtection},
booktitle = {First International Conference on Security of Internet of Things,
{SECURIT} '12, Kollam, India - August 17 - 19, 2012},
pages = {96--101},
year = {2012},
crossref = {DBLP:conf/securit/2012},
url = {https://doi.org/10.1145/2490428.2490442},
doi = {10.1145/2490428.2490442},
timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/securit/NavalLGV12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Mining control flow graph as \emphAPI call-grams to detect portable executable malware.
Faruki, P.; Laxmi, V.; Gaur, M. S.; and Vinod, P.
In
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 130–137, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/sin/FarukiLGV12,
author = {Parvez Faruki and
Vijay Laxmi and
Manoj Singh Gaur and
P. Vinod},
title = {Mining control flow graph as \emph{API call-grams} to detect portable
executable malware},
booktitle = {5th International Conference of Security of Information and Networks,
{SIN} '12, Jaipur, India, October 22 - 26, 2012},
pages = {130--137},
year = {2012},
crossref = {DBLP:conf/sin/2012},
url = {https://doi.org/10.1145/2388576.2388594},
doi = {10.1145/2388576.2388594},
timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sin/FarukiLGV12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Lip peripheral motion for visual surveillance.
Singh, P.; Laxmi, V.; and Gaur, M. S.
In
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 173–177, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/sin/SinghLG12,
author = {Preety Singh and
Vijay Laxmi and
Manoj Singh Gaur},
title = {Lip peripheral motion for visual surveillance},
booktitle = {5th International Conference of Security of Information and Networks,
{SIN} '12, Jaipur, India, October 22 - 26, 2012},
pages = {173--177},
year = {2012},
crossref = {DBLP:conf/sin/2012},
url = {https://doi.org/10.1145/2388576.2388602},
doi = {10.1145/2388576.2388602},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sin/SinghLG12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Detection attack analysis using partial watermark in DCT domain.
Gunjan, R.; Laxmi, V.; and Gaur, M. S.
In
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 188–192, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/sin/GunjanLG12,
author = {Reena Gunjan and
Vijay Laxmi and
Manoj Singh Gaur},
title = {Detection attack analysis using partial watermark in {DCT} domain},
booktitle = {5th International Conference of Security of Information and Networks,
{SIN} '12, Jaipur, India, October 22 - 26, 2012},
pages = {188--192},
year = {2012},
crossref = {DBLP:conf/sin/2012},
url = {https://doi.org/10.1145/2388576.2388605},
doi = {10.1145/2388576.2388605},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sin/GunjanLG12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
ESCAPE: entropy score analysis of packed executable.
Naval, S.; Laxmi, V.; Gaur, M. S.; and Vinod, P.
In
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 197–200, 2012.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/sin/NavalLGV12,
author = {Smita Naval and
Vijay Laxmi and
Manoj Singh Gaur and
P. Vinod},
title = {{ESCAPE:} entropy score analysis of packed executable},
booktitle = {5th International Conference of Security of Information and Networks,
{SIN} '12, Jaipur, India, October 22 - 26, 2012},
pages = {197--200},
year = {2012},
crossref = {DBLP:conf/sin/2012},
url = {https://doi.org/10.1145/2388576.2388607},
doi = {10.1145/2388576.2388607},
timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sin/NavalLGV12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}