401 results on '"Gaur, Manoj Singh"'
Search Results
2. An improved reconfiguration algorithm for handling 1-point NoC failures
3. ETGuard: Detecting D2D Attacks using Wireless Evil Twins
4. Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture
5. Android Inter-App Communication Threats and Detection Techniques
6. Comparative Study of Object Recognition Algorithms for Effective Electronic Travel Aids
7. APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android
8. DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks
9. MapperDroid: Verifying app capabilities from description to permissions and API calls
10. MAPPER: Mapping Application Description to Permissions
11. Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing
12. DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions
13. 3D LBDR: Logic-Based Distributed Routing for 3D NoC
14. Human Face Detection Enabled Smart Stick for Visually Impaired People
15. QuickDedup: Efficient VM deduplication in cloud computing environments
16. TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration
17. EspyDroid+: Precise reflection analysis of android apps
18. Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage
19. Comparative Study of Object Recognition Algorithms for Effective Electronic Travel Aids
20. SLDP: A secure and lightweight link discovery protocol for software defined networking
21. SAP: A Secure Low-latency Protocol for Mitigating High Computation Overhead in WI-FI Networks
22. Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements
23. Performance-Enhanced -LBDR for 2D Mesh Network-on-Chip
24. Secure Random Encryption for Deduplicated Storage
25. SWORD: Semantic aWare andrOid malwaRe Detector
26. S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures
27. You click, I steal: analyzing and detecting click hijacking attacks in web pages
28. Visual Speech Recognition with Selected Boundary Descriptors
29. Android inter-app communication threats and detection techniques
30. DDoS attacks in cloud computing: Issues, taxonomy, and future directions
31. Integration of Built In Self Test during behavioural synthesis
32. DDoS attacks in cloud computing: Collateral damage to non-targets
33. Colluding browser extension attack on user privacy and its implication for web browsers
34. Fault Aware Dynamic Adaptive Routing Using LBDR
35. DDoS Protection and Security Assurance in Cloud
36. DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
37. Resilient routing implementation in 2D mesh NoC
38. Energy Scavenging Based HybridGSM Model for Mobile Towers
39. Privacy Leakage Attacks in Browsers by Colluding Extensions
40. Human Face Detection Enabled Smart Stick for Visually Impaired People
41. Multivariate verification for sybil attack detection in VANET
42. Path and Link Aware Routing Algorithm for Cognitive Radio Wireless Mesh Network
43. Service resizing for quick DDoS mitigation in cloud computing environment
44. Trust Establishment Techniques in VANET
45. Misbehavior Detection Based on Ensemble Learning in VANET
46. PEAL—Packed Executable AnaLysis
47. Detection of Broken Link Fraud in DSDV Routing
48. Machine Learning Approach for Multiple Misbehavior Detection in VANET
49. A Novel Attack Model Simulation in OLSR
50. Broken Link Fraud in DSDV Routing - Detection and Countermeasure
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.