Parvez Faruki
Parvez Faruki
Head of Department, Information Technology, Gujarat India
Verified email at - Homepage
Cited by
Cited by
Network intrusion detection for IoT security based on learning techniques
N Chaabouni, M Mosbah, A Zemmari, C Sauvignac, P Faruki
IEEE Communications Surveys & Tutorials 21 (3), 2671-2701, 2019
Android security: a survey of issues, malware penetration, and defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ...
IEEE communications surveys & tutorials 17 (2), 998-1022, 2014
AndroSimilar: robust statistical feature signature for Android malware detection
P Faruki, V Ganmoor, V Laxmi, MS Gaur, A Bharmal
Proceedings of the 6th International Conference on Security of Information …, 2013
AndroSimilar: Robust signature for detecting variants of Android malware
P Faruki, V Laxmi, A Bharmal, MS Gaur, V Ganmoor
Journal of Information Security and Applications 22, 66-80, 2015
Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
Evaluation of android anti-malware techniques against dalvik bytecode obfuscation
P Faruki, A Bharmal, V Laxmi, MS Gaur, M Conti, M Rajarajan
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
Android code protection via obfuscation techniques: past, present and future directions
P Faruki, H Fereidooni, V Laxmi, M Conti, M Gaur
arXiv preprint arXiv:1611.10231, 2016
Droidanalyst: Synergic app framework for static and dynamic app analysis
P Faruki, S Bhandari, V Laxmi, M Gaur, M Conti
Recent Advances in Computational Intelligence in Defense and Security, 519-552, 2016
Behavioural detection with API call-grams to identify malicious PE files.
P Faruki, V Laxmi, MS Gaur, P Vinod
SECURIT, 85-91, 2012
Droidolytics: robust feature signature for repackaged android apps on official and third party android markets
P Faruki, V Laxmi, V Ganmoor, MS Gaur, A Bharmal
2013 2nd international conference on advanced computing, networking and …, 2013
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks
V Laxmi, D Mehta, MS Gaur, P Faruki, C Lal
Proceedings of the 6th International Conference on Security of Information …, 2013
Flowmine: Android app analysis via data flow
L Sinha, S Bhandari, P Faruki, MS Gaur, V Laxmi, M Conti
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
Secure random encryption for deduplicated storage
J Dave, S Saharan, P Faruki, V Laxmi, MS Gaur
Information Systems Security: 13th International Conference, ICISS 2017 …, 2017
MCF: MultiComponent features for malware analysis
P Vinod, V Laxmi, MS Gaur, S Naval, P Faruki
2013 27th International Conference on Advanced Information Networking and …, 2013
Droiddivesdeep: Android malware classification via low level monitorable features with deep neural networks
P Faruki, B Buddhadev, B Shah, A Zemmari, V Laxmi, MS Gaur
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
Platform neutral sandbox for analyzing malware and resource hogger apps
P Faruki, V Kumar, MS Gaur, V Laxmi, M Conti
International Conference on Security and Privacy in Communication Networks …, 2015
Congestion control in Internet of Things: Classification, challenges, and future directions
VK Jain, AP Mazumdar, P Faruki, MC Govil
Sustainable Computing: Informatics and Systems 35, 100678, 2022
PEAL—packed executable analysis
V Laxmi, MS Gaur, P Faruki, S Naval
Advanced Computing, Networking and Security: International Conference …, 2012
Secure and efficient proof of ownership for deduplicated cloud storage
J Dave, P Faruki, V Laxmi, B Bezawada, M Gaur
Proceedings of the 10th International Conference on Security of Information …, 2017
Auction based scheme for resource allotment in cloud computing
R Bhan, A Singh, R Pamula, P Faruki
Digital Business: Business Algorithms, Cloud Computing and Data Engineering …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20