Urmăriți
Parvez Faruki
Parvez Faruki
Head of Department, Information Technology, AVPTI Rajkot
Adresă de e-mail confirmată pe mnit.ac.in - Pagina de pornire
Titlu
Citat de
Citat de
Anul
Android security: a survey of issues, malware penetration, and defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ...
IEEE communications surveys & tutorials 17 (2), 998-1022, 2014
5982014
Network intrusion detection for IoT security based on learning techniques
N Chaabouni, M Mosbah, A Zemmari, C Sauvignac, P Faruki
IEEE Communications Surveys & Tutorials 21 (3), 2671-2701, 2019
4732019
AndroSimilar: robust statistical feature signature for Android malware detection
P Faruki, V Ganmoor, V Laxmi, MS Gaur, A Bharmal
Proceedings of the 6th International Conference on Security of Information …, 2013
1692013
AndroSimilar: Robust signature for detecting variants of Android malware
P Faruki, V Laxmi, A Bharmal, MS Gaur, V Ganmoor
Journal of Information Security and Applications 22, 66-80, 2015
952015
Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
562012
Evaluation of android anti-malware techniques against dalvik bytecode obfuscation
P Faruki, A Bharmal, V Laxmi, MS Gaur, M Conti, M Rajarajan
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
502014
Android code protection via obfuscation techniques: past, present and future directions
P Faruki, H Fereidooni, V Laxmi, M Conti, M Gaur
arXiv preprint arXiv:1611.10231, 2016
282016
Droidanalyst: Synergic app framework for static and dynamic app analysis
P Faruki, S Bhandari, V Laxmi, M Gaur, M Conti
Recent Advances in Computational Intelligence in Defense and Security, 519-552, 2016
252016
Behavioural detection with API call-grams to identify malicious PE files.
P Faruki, V Laxmi, MS Gaur, P Vinod
SECURIT, 85-91, 2012
212012
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks
V Laxmi, D Mehta, MS Gaur, P Faruki, C Lal
Proceedings of the 6th International Conference on Security of Information …, 2013
202013
Flowmine: Android app analysis via data flow
L Sinha, S Bhandari, P Faruki, MS Gaur, V Laxmi, M Conti
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
182016
Droidolytics: robust feature signature for repackaged android apps on official and third party android markets
P Faruki, V Laxmi, V Ganmoor, MS Gaur, A Bharmal
2013 2nd international conference on advanced computing, networking and …, 2013
182013
MCF: MultiComponent features for malware analysis
P Vinod, V Laxmi, MS Gaur, S Naval, P Faruki
2013 27th International Conference on Advanced Information Networking and …, 2013
152013
Secure random encryption for deduplicated storage
J Dave, S Saharan, P Faruki, V Laxmi, MS Gaur
International Conference on Information Systems Security, 164-176, 2017
122017
Platform neutral sandbox for analyzing malware and resource hogger apps
P Faruki, V Kumar, MS Gaur, V Laxmi, M Conti
International conference on security and privacy in communication networks …, 2014
102014
PEAL—packed executable analysis
V Laxmi, MS Gaur, P Faruki, S Naval
International Conference on Advanced Computing, Networking and Security, 237-243, 2011
92011
DroidDivesDeep: Android malware classification via low level monitorable features with deep neural networks
P Faruki, B Buddhadev, B Shah, A Zemmari, V Laxmi, MS Gaur
International Conference on Security & Privacy, 125-139, 2019
82019
Auction based scheme for resource allotment in cloud computing
R Bhan, A Singh, R Pamula, P Faruki
Digital Business, 119-141, 2019
72019
MimeoDroid: Large Scale Dynamic App analysis on Cloned Devices via Machine Learning Classifiers.
P Faruki, MS Gaur, V Laxmi, A Zemmari
The 3rd IEEE International Workshop on Reliability and Security Data …, 2016
62016
Secure and efficient proof of ownership for deduplicated cloud storage
J Dave, P Faruki, V Laxmi, B Bezawada, M Gaur
Proceedings of the 10th International Conference on Security of Information …, 2017
52017
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20