Sledovat
Parvez Faruki
Parvez Faruki
Head of Department, Information Technology, Gujarat India
E-mailová adresa ověřena na: mnit.ac.in - Domovská stránka
Název
Citace
Citace
Rok
Network intrusion detection for IoT security based on learning techniques
N Chaabouni, M Mosbah, A Zemmari, C Sauvignac, P Faruki
IEEE Communications Surveys & Tutorials 21 (3), 2671-2701, 2019
8022019
Android security: a survey of issues, malware penetration, and defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ...
IEEE communications surveys & tutorials 17 (2), 998-1022, 2014
7032014
AndroSimilar: robust statistical feature signature for Android malware detection
P Faruki, V Ganmoor, V Laxmi, MS Gaur, A Bharmal
Proceedings of the 6th International Conference on Security of Information …, 2013
1982013
AndroSimilar: Robust signature for detecting variants of Android malware
P Faruki, V Laxmi, A Bharmal, MS Gaur, V Ganmoor
Journal of Information Security and Applications 22, 66-80, 2015
1212015
Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
672012
Evaluation of android anti-malware techniques against dalvik bytecode obfuscation
P Faruki, A Bharmal, V Laxmi, MS Gaur, M Conti, M Rajarajan
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
582014
Android code protection via obfuscation techniques: past, present and future directions
P Faruki, H Fereidooni, V Laxmi, M Conti, M Gaur
arXiv preprint arXiv:1611.10231, 2016
382016
Droidanalyst: Synergic app framework for static and dynamic app analysis
P Faruki, S Bhandari, V Laxmi, M Gaur, M Conti
Recent Advances in Computational Intelligence in Defense and Security, 519-552, 2016
272016
Behavioural detection with API call-grams to identify malicious PE files.
P Faruki, V Laxmi, MS Gaur, P Vinod
SECURIT, 85-91, 2012
262012
Secure random encryption for deduplicated storage
J Dave, S Saharan, P Faruki, V Laxmi, MS Gaur
Information Systems Security: 13th International Conference, ICISS 2017 …, 2017
242017
Droidolytics: robust feature signature for repackaged android apps on official and third party android markets
P Faruki, V Laxmi, V Ganmoor, MS Gaur, A Bharmal
2013 2nd international conference on advanced computing, networking and …, 2013
232013
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks
V Laxmi, D Mehta, MS Gaur, P Faruki, C Lal
Proceedings of the 6th International Conference on Security of Information …, 2013
202013
Flowmine: Android app analysis via data flow
L Sinha, S Bhandari, P Faruki, MS Gaur, V Laxmi, M Conti
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
192016
Congestion control in Internet of Things: Classification, challenges, and future directions
VK Jain, AP Mazumdar, P Faruki, MC Govil
Sustainable Computing: Informatics and Systems 35, 100678, 2022
172022
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network
R Bhan, R Pamula, P Faruki, J Gajrani
The Journal of Supercomputing 79 (14), 16233-16274, 2023
162023
MCF: MultiComponent features for malware analysis
P Vinod, V Laxmi, MS Gaur, S Naval, P Faruki
2013 27th International Conference on Advanced Information Networking and …, 2013
162013
Secure and efficient proof of ownership for deduplicated cloud storage
J Dave, P Faruki, V Laxmi, B Bezawada, M Gaur
Proceedings of the 10th International Conference on Security of Information …, 2017
152017
Droiddivesdeep: Android malware classification via low level monitorable features with deep neural networks
P Faruki, B Buddhadev, B Shah, A Zemmari, V Laxmi, MS Gaur
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
142019
Spark: Secure pseudorandom key-based encryption for deduplicated storage
J Dave, P Faruki, V Laxmi, A Zemmari, M Gaur, M Conti
Computer Communications 154, 148-159, 2020
122020
Platform neutral sandbox for analyzing malware and resource hogger apps
P Faruki, V Kumar, MS Gaur, V Laxmi, M Conti
International Conference on Security and Privacy in Communication Networks …, 2015
122015
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20