EspyDroid+: Precise reflection analysis of android apps | 2 | 0.37 | 2020 |
QuickDedup: Efficient VM deduplication in cloud computing environments | 1 | 0.34 | 2020 |
SneakLeak+ : Large-scale klepto apps analysis | 2 | 0.36 | 2020 |
Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers | 0 | 0.34 | 2019 |
ETGuard: Detecting D2D Attacks using Wireless Evil Twins. | 0 | 0.34 | 2019 |
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures. | 2 | 0.37 | 2019 |
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs | 1 | 0.37 | 2019 |
SLDP: A secure and lightweight link discovery protocol for software defined networking. | 0 | 0.34 | 2019 |
UAVs Reliable Transmission for Multicast Protocols in FANETs | 0 | 0.34 | 2019 |
MAPPER - Mapping Application Description to Permissions. | 0 | 0.34 | 2019 |
Tilak: A Token-Based Prevention Approach For Topology Discovery Threats In Sdn | 0 | 0.34 | 2019 |
Privacy Preserving Data Offloading Based on Transformation. | 0 | 0.34 | 2018 |
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. | 2 | 0.42 | 2018 |
Bloom Filter Based Privacy Preserving Deduplication System. | 0 | 0.34 | 2018 |
DroidDivesDeep - Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks. | 0 | 0.34 | 2018 |
APPLADroid - Automaton Based Inter-app Privacy Leak Analysis for Android. | 0 | 0.34 | 2018 |
'Global view' in SDN: existing implementation, vulnerabilities & threats. | 1 | 0.36 | 2017 |
Flooding in secure wireless sensor networks: Student contribution. | 0 | 0.34 | 2017 |
Spectra: A Precise Framework For Analyzing Cryptographic Vulnerabilities In Android Apps | 3 | 0.42 | 2017 |
Secure Random Encryption for Deduplicated Storage. | 0 | 0.34 | 2017 |
DDoS victim service containment to minimize the internal collateral damages in cloud computing. | 1 | 0.36 | 2017 |
Unraveling Reflection Induced Sensitive Leaks In Android Apps | 1 | 0.35 | 2017 |
Secure and efficient proof of ownership for deduplicated cloud storage. | 0 | 0.34 | 2017 |
POSTER: Detection of Information Leaks via Reflection in Android Apps. | 1 | 0.36 | 2017 |
Service resizing for quick DDoS mitigation in cloud computing environment. | 5 | 0.45 | 2017 |
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges. | 0 | 0.34 | 2017 |
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip. | 0 | 0.34 | 2017 |
SniffDroid: Detection of Inter-App Privacy Leaks in Android | 0 | 0.34 | 2017 |
Multi-constraints link stable multicast routing protocol in MANETs. | 6 | 0.47 | 2017 |
A Power, Thermal and Reliability-Aware Network-on-Chip | 0 | 0.34 | 2017 |
Android inter-app communication threats and detection techniques. | 5 | 0.42 | 2017 |
POSTER: Detecting Inter-App Information Leakage Paths. | 1 | 0.35 | 2017 |
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. | 3 | 0.38 | 2017 |
Android App Collusion Threat and Mitigation Techniques. | 0 | 0.34 | 2016 |
Intersection Automata Based Model For Android Application Collusion | 7 | 0.52 | 2016 |
Reducing FIFO buffer power using architectural alternatives at RTL | 1 | 0.36 | 2016 |
DDoS attacks in cloud computing: Collateral damage to non-targets. | 10 | 0.56 | 2016 |
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers | 0 | 0.34 | 2016 |
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions. | 0 | 0.34 | 2016 |
FlowMine: Android app analysis via data flow | 4 | 0.39 | 2016 |
MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks | 1 | 0.36 | 2016 |
Colluding browser extension attack on user privacy and its implication for web browsers. | 3 | 0.37 | 2016 |
Detection Of Sqlite Database Vulnerabilities In Android Apps | 0 | 0.34 | 2016 |
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network. | 0 | 0.34 | 2016 |
DDoS/EDoS attack in cloud: affecting everyone out there! | 5 | 0.40 | 2015 |
Android Security: A Survey of Issues, Malware Penetration and Defenses | 105 | 3.11 | 2015 |
Employing Program Semantics for Malware Detection | 21 | 0.76 | 2015 |
sandFOX: secure sandboxed and isolated environment for firefox browser | 0 | 0.34 | 2015 |
d2-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs | 0 | 0.34 | 2015 |
AndroSimilar: Robust signature for detecting variants of Android malware | 22 | 0.77 | 2015 |