Parvez Faruki

According to our database1, Parvez Faruki authored at least 31 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network.
J. Supercomput., September, 2023

A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks.
Inf., 2023

Towards Learning Based Detection and Mitigation of DDoS Attacks in Software Defined Networks.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

2022
Congestion control in Internet of Things: Classification, challenges, and future directions.
Sustain. Comput. Informatics Syst., 2022

Visibility enhancement and dehazing: Research contribution challenges and direction.
Comput. Sci. Rev., 2022

Formal model for inter-component communication and its security in android.
Computing, 2022

Dense spatially-weighted attentive residual-haze network for image dehazing.
Appl. Intell., 2022

2020
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage.
Comput. Commun., 2020

Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage.
Autom. Control. Comput. Sci., 2020

A Semi-automated Approach for Identification of Trends in Android Ransomware Literature.
Proceedings of the Machine Learning for Networking - Third International Conference, 2020

2019
Network Intrusion Detection for IoT Security Based on Learning Techniques.
IEEE Commun. Surv. Tutorials, 2019

2018
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Bloom Filter Based Privacy Preserving Deduplication System.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

2017
Secure and efficient proof of ownership for deduplicated cloud storage.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Secure Random Encryption for Deduplicated Storage.
Proceedings of the Information Systems Security - 13th International Conference, 2017

2016
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis.
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016

Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016

Android component vulnerabities: Proof of concepts and mitigation.
Proceedings of the 2016 International Conference on Information Networking, 2016

MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

FlowMine: Android app analysis via data flow.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
AndroSimilar: Robust signature for detecting variants of Android malware.
J. Inf. Secur. Appl., 2015

Android Security: A Survey of Issues, Malware Penetration, and Defenses.
IEEE Commun. Surv. Tutorials, 2015

2014
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

AndroSimilar: robust statistical feature signature for Android malware detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

MCF: MultiComponent Features for Malware Analysis.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2012
Mining control flow graph as <i>API call-grams</i> to detect portable executable malware.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Behavioural detection with <i>API call-grams</i> to identify malicious PE files.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
PEAL - Packed Executable AnaLysis.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011


  Loading...