Parvez Faruki
Parvez Faruki
Head of Department, Information Technology, AVPTI Rajkot
Verified email at mnit.ac.in - Homepage
Title
Cited by
Cited by
Year
Android security: a survey of issues, malware penetration, and defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ...
IEEE communications surveys & tutorials 17 (2), 998-1022, 2014
4012014
AndroSimilar: robust statistical feature signature for Android malware detection
P Faruki, V Ganmoor, V Laxmi, MS Gaur, A Bharmal
Proceedings of the 6th International Conference on Security of Information …, 2013
1182013
Network intrusion detection for IoT security based on learning techniques
N Chaabouni, M Mosbah, A Zemmari, C Sauvignac, P Faruki
IEEE Communications Surveys & Tutorials 21 (3), 2671-2701, 2019
882019
AndroSimilar: Robust signature for detecting variants of Android malware
P Faruki, V Laxmi, A Bharmal, MS Gaur, V Ganmoor
Journal of Information Security and Applications 22, 66-80, 2015
622015
Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
452012
Evaluation of android anti-malware techniques against dalvik bytecode obfuscation
P Faruki, A Bharmal, V Laxmi, MS Gaur, M Conti, M Rajarajan
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
402014
Droidanalyst: Synergic app framework for static and dynamic app analysis
P Faruki, S Bhandari, V Laxmi, M Gaur, M Conti
Recent Advances in Computational Intelligence in Defense and Security, 519-552, 2016
222016
Behavioural detection with API call-grams to identify malicious PE files.
P Faruki, V Laxmi, MS Gaur, P Vinod
SECURIT, 85-91, 2012
192012
Droidolytics: robust feature signature for repackaged android apps on official and third party android markets
P Faruki, V Laxmi, V Ganmoor, MS Gaur, A Bharmal
2013 2nd international conference on advanced computing, networking and …, 2013
162013
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks
V Laxmi, D Mehta, MS Gaur, P Faruki, C Lal
Proceedings of the 6th International Conference on Security of Information …, 2013
152013
Android code protection via obfuscation techniques: past, present and future directions
P Faruki, H Fereidooni, V Laxmi, M Conti, M Gaur
arXiv preprint arXiv:1611.10231, 2016
142016
Flowmine: Android app analysis via data flow
L Sinha, S Bhandari, P Faruki, MS Gaur, V Laxmi, M Conti
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
122016
MCF: MultiComponent features for malware analysis
P Vinod, V Laxmi, MS Gaur, S Naval, P Faruki
2013 27th International Conference on Advanced Information Networking and …, 2013
112013
Platform neutral sandbox for analyzing malware and resource hogger apps
P Faruki, V Kumar, B Ammar, MS Gaur, V Laxmi, M Conti
International conference on security and privacy in communication networks …, 2014
102014
PEAL—packed executable analysis
V Laxmi, MS Gaur, P Faruki, S Naval
International Conference on Advanced Computing, Networking and Security, 237-243, 2011
102011
Secure random encryption for deduplicated storage
J Dave, S Saharan, P Faruki, V Laxmi, MS Gaur
International Conference on Information Systems Security, 164-176, 2017
62017
Secure and efficient proof of ownership for deduplicated cloud storage
J Dave, P Faruki, V Laxmi, B Bezawada, M Gaur
Proceedings of the 10th International Conference on Security of Information …, 2017
62017
MimeoDroid: Large Scale Dynamic App analysis on Cloned Devices via Machine Learning Classifiers.
P Faruki, MS Gaur, V Laxmi, A Zemmari
The 3rd IEEE International Workshop on Reliability and Security Data …, 2016
52016
Android platform invariant sandbox for analyzing malware and resource hogger apps
P Faruki, V Ganmoor, L Vijay, M Gaur, M Conti
Proceedings of the 10th IEEE International Conference on Security and …, 2014
52014
Auction based scheme for resource allotment in cloud computing
R Bhan, A Singh, R Pamula, P Faruki
Digital Business, 119-141, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20