Name
Affiliation
Papers
MANOJ S. GAUR
Malaviya National Institute of Technology, Jaipur, India
149
Collaborators
Citations 
PageRank 
181
501
63.38
Referers 
Referees 
References 
1291
2803
1609
Search Limit
1001000
Title
Citations
PageRank
Year
EspyDroid+: Precise reflection analysis of android apps20.372020
QuickDedup: Efficient VM deduplication in cloud computing environments10.342020
SneakLeak+ : Large-scale klepto apps analysis20.362020
Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers00.342019
ETGuard: Detecting D2D Attacks using Wireless Evil Twins.00.342019
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures.20.372019
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs10.372019
SLDP: A secure and lightweight link discovery protocol for software defined networking.00.342019
UAVs Reliable Transmission for Multicast Protocols in FANETs00.342019
MAPPER - Mapping Application Description to Permissions.00.342019
Tilak: A Token-Based Prevention Approach For Topology Discovery Threats In Sdn00.342019
Privacy Preserving Data Offloading Based on Transformation.00.342018
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks.20.422018
Bloom Filter Based Privacy Preserving Deduplication System.00.342018
DroidDivesDeep - Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks.00.342018
APPLADroid - Automaton Based Inter-app Privacy Leak Analysis for Android.00.342018
'Global view' in SDN: existing implementation, vulnerabilities & threats.10.362017
Flooding in secure wireless sensor networks: Student contribution.00.342017
Spectra: A Precise Framework For Analyzing Cryptographic Vulnerabilities In Android Apps30.422017
Secure Random Encryption for Deduplicated Storage.00.342017
DDoS victim service containment to minimize the internal collateral damages in cloud computing.10.362017
Unraveling Reflection Induced Sensitive Leaks In Android Apps10.352017
Secure and efficient proof of ownership for deduplicated cloud storage.00.342017
POSTER: Detection of Information Leaks via Reflection in Android Apps.10.362017
Service resizing for quick DDoS mitigation in cloud computing environment.50.452017
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges.00.342017
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip.00.342017
SniffDroid: Detection of Inter-App Privacy Leaks in Android00.342017
Multi-constraints link stable multicast routing protocol in MANETs.60.472017
A Power, Thermal and Reliability-Aware Network-on-Chip00.342017
Android inter-app communication threats and detection techniques.50.422017
POSTER: Detecting Inter-App Information Leakage Paths.10.352017
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions.30.382017
Android App Collusion Threat and Mitigation Techniques.00.342016
Intersection Automata Based Model For Android Application Collusion70.522016
Reducing FIFO buffer power using architectural alternatives at RTL10.362016
DDoS attacks in cloud computing: Collateral damage to non-targets.100.562016
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers00.342016
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.00.342016
FlowMine: Android app analysis via data flow40.392016
MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks10.362016
Colluding browser extension attack on user privacy and its implication for web browsers.30.372016
Detection Of Sqlite Database Vulnerabilities In Android Apps00.342016
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network.00.342016
DDoS/EDoS attack in cloud: affecting everyone out there!50.402015
Android Security: A Survey of Issues, Malware Penetration and Defenses1053.112015
Employing Program Semantics for Malware Detection210.762015
sandFOX: secure sandboxed and isolated environment for firefox browser00.342015
d2-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs00.342015
AndroSimilar: Robust signature for detecting variants of Android malware220.772015
  • 1
  • 2