Manoj Singh Gaur
Orcid: 0000-0002-0497-721X
According to our database1,
Manoj Singh Gaur
authored at least 204 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
15
20
25
30
2
3
2
2
9
5
3
11
8
9
4
1
2
1
2
4
8
17
9
14
18
16
12
22
12
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Deep Dive into Relevant Feature Identification for Unveiling PII Leakage in Smartphones.
Proceedings of the International Conference on Signal Processing and Communications, 2024
GAN-based Seed Generation for Efficient Fuzzing.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC.
J. Supercomput., October, 2023
Microprocess. Microsystems, 2023
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks.
IEEE Access, 2023
Tracking PII ex-filtration: Exploring decision tree and neural network with explainable AI.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023
2022
Microprocess. Microsystems, June, 2022
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges.
ACM Trans. Internet Techn., 2022
2021
<i>Scaling & fuzzing: </i> Personal image privacy from automated attacks in mobile cloud computing.
J. Inf. Secur. Appl., 2021
MapperDroid: Verifying app capabilities from description to permissions and API calls.
Comput. Secur., 2021
2020
J. Parallel Distributed Comput., 2020
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration.
Integr., 2020
Future Gener. Comput. Syst., 2020
DTRAP, 2020
ACM Comput. Surv., 2020
Comput. Commun., 2020
Autom. Control. Comput. Sci., 2020
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020
Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution.
Proceedings of the 28th IFIP/IEEE International Conference on Very Large Scale Integration, 2020
Proceedings of the 2020 IEEE Region 10 Conference, 2020
2019
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures.
J. Supercomput., 2019
Int. J. Inf. Sec., 2019
Int. J. Commun. Syst., 2019
SLDP: A secure and lightweight link discovery protocol for software defined networking.
Comput. Networks, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the 2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2019
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
2018
Wirel. Networks, 2018
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the Data Science and Big Data Analytics, 2018
Proceedings of the VLSI Design and Test - 22nd International Symposium, 2018
A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the 9th International Conference on Computing, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
Wirel. Pers. Commun., 2017
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs.
Wirel. Networks, 2017
Int. J. Inf. Commun. Technol., 2017
Int. J. Commun. Syst., 2017
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges.
CoRR, 2017
Comput. Secur., 2017
Comput. Commun., 2017
IEEE Cloud Comput., 2017
DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Comput. Electr. Eng., 2017
Ann. des Télécommunications, 2017
Ad Hoc Networks, 2017
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017
Proceedings of the VLSI Design and Test - 21st International Symposium, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems, 2017
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network.
Int. J. Commun. Syst., 2016
<i>σ</i> <sup> <i>n</i> </sup>LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip.
IET Comput. Digit. Tech., 2016
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016
Colluding browser extension attack on user privacy and its implication for web browsers.
Comput. Secur., 2016
Comput. Networks, 2016
Proceedings of the 2016 Wireless Days, 2016
A Power Efficient Dual Link Mesh NoC Architecture to Support Nonuniform Traffic Arbitration at Routing Logic.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016
Proceedings of the 20th International Symposium on VLSI Design and Test, 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Bandwidth-aware routing and admission control for efficient video streaming over MANETs.
Wirel. Networks, 2015
IEEE Trans. Inf. Forensics Secur., 2015
A Brief Comment on "A Complete Self-Testing and Self-Configuring NoC Infrastructure for Cost-Effective MPSoCs" [ACM Transactions on Embedded Computing Systems 12 (2013) Article 106].
ACM Trans. Embed. Comput. Syst., 2015
J. Inf. Secur. Appl., 2015
J. Inf. Secur. Appl., 2015
J. Inf. Secur. Appl., 2015
Probabilistic model for nanocell reliability evaluation in presence of transient errors.
IET Comput. Digit. Tech., 2015
IEEE Commun. Surv. Tutorials, 2015
Open Comput. Sci., 2015
Proceedings of the 28th International Conference on VLSI Design, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Characterizing impacts of multi-Vt routers on power and reliability of Network-on-Chip.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015
d<sup>2</sup>-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
2014
Exploiting convergence characteristics to tackle collusion attacks in OLSR for <i>Security and Communication Networks</i>.
Secur. Commun. Networks, 2014
ACM J. Emerg. Technol. Comput. Syst., 2014
Int. J. Secur. Networks, 2014
Int. J. Inf. Comput. Secur., 2014
Proceedings of the 2014 27th International Conference on VLSI Design, 2014
Proceedings of the 22nd International Conference on Very Large Scale Integration, 2014
Proceedings of the 18th International Symposium on VLSI Design and Test, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014
Proceedings of the Eighth IEEE/ACM International Symposium on Networks-on-Chip, 2014
Proceedings of the 3rd International Workshop on Many-core Embedded Systems (MES'2015) held on June 13, 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Seventh International Conference on Contemporary Computing, 2014
Proceedings of the Great Lakes Symposium on VLSI 2014, GLSVLSI '14, Houston, TX, USA - May 21, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2014
Proceedings of the 7th ACM India Computing Conference, 2014
2013
Int. J. Pattern Recognit. Artif. Intell., 2013
Proceedings of the Tenth International Conference on Wireless and Optical Communications Networks, 2013
Proceedings of the VLSI Design and Test, 17th International Symposium, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Proceedings of the Recent Advances in Intelligent Informatics, 2013
Proceedings of the International Conference on Advances in Computing, 2013
An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs.
Proceedings of the International Conference on Advances in Computing, 2013
Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2013
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013
2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Detection of incorrect position information using speed and time span verification in VANET.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Mining control flow graph as <i>API call-grams</i> to detect portable executable malware.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
Proceedings of the IEEE/IFIP 19th International Conference on VLSI and System-on-Chip, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the Computer and Information Sciences II, 2011
Proceedings of the Computer and Information Sciences II, 2011
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs.
Proceedings of the Advanced Communication and Networking, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
2010
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
Genetic algorithm based topology generation for application specific Network-on-Chip.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Proceedings of the 2010 East-West Design & Test Symposium, 2010
Proceedings of the 2010 East-West Design & Test Symposium, 2010
Minimal Path, Fault Tolerant, QoS Aware Routing with Node and Link Failure in 2-D Mesh NoC.
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010
Proceedings of the Recent Trends in Network Security and Applications, 2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the Contemporary Computing - Second International Conference, 2009
2008
Proceedings of the Nano-Net - Third International ICST Conference, 2008
2004
Integrating Self Testability with Design Space Exploration by a Controller based Estimation Technique.
Proceedings of the 17th International Conference on VLSI Design (VLSI Design 2004), 2004
2003