Follow
Vijay Laxmi
Vijay Laxmi
Professor (Computer Science and Engineering), Malaviya National Institute of Technology Jaipur
Verified email at mnit.ac.in
Title
Cited by
Cited by
Year
Android security: a survey of issues, malware penetration, and defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ...
IEEE communications surveys & tutorials 17 (2), 998-1022, 2014
7212014
Survey on malware detection methods
P Vinod, R Jaipur, V Laxmi, M Gaur
Proceedings of the 3rd Hackers’ Workshop on computer and internet security …, 2009
2472009
AndroSimilar: robust statistical feature signature for Android malware detection
P Faruki, V Ganmoor, V Laxmi, MS Gaur, A Bharmal
Proceedings of the 6th International Conference on Security of Information …, 2013
2012013
Machine learning approach for multiple misbehavior detection in VANET
J Grover, NK Prajapati, V Laxmi, MS Gaur
Advances in Computing and Communications: First International Conference …, 2011
1702011
NIRGAM: a simulator for NoC interconnect routing and application modeling
L Jain, B Al-Hashimi, MS Gaur, V Laxmi, A Narayanan
Design, automation and test in Europe conference, 16-20, 2007
1682007
Employing program semantics for malware detection
S Naval, V Laxmi, M Rajarajan, MS Gaur, M Conti
IEEE Transactions on Information Forensics and Security 10 (12), 2591-2604, 2015
1292015
AndroSimilar: Robust signature for detecting variants of Android malware
P Faruki, V Laxmi, A Bharmal, MS Gaur, V Ganmoor
Journal of Information Security and Applications 22, 66-80, 2015
1232015
Medusa: Metamorphic malware dynamic analysis usingsignature from api
VP Nair, H Jain, YK Golecha, MS Gaur, V Laxmi
Proceedings of the 3rd International Conference on Security of Information …, 2010
1222010
Comparing the impact of black hole and gray hole attack on LEACH in WSN
M Tripathi, MS Gaur, V Laxmi
Procedia Computer Science 19, 1101-1107, 2013
962013
A sybil attack detection approach using neighboring vehicles in VANET
J Grover, MS Gaur, V Laxmi, NK Prajapati
Proceedings of the 4th international conference on Security of information …, 2011
882011
Passive marker based optical system for gait kinematics for lower extremity
C Prakash, K Gupta, A Mittal, R Kumar, V Laxmi
Procedia Computer Science 45, 176-185, 2015
742015
Energy efficient LEACH-C protocol for wireless sensor network
M Tripathi, MS Gaur, V Laxmi, RB Battula
IET Digital Library, 2013
712013
Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
712012
Misbehavior detection based on ensemble learning in vanet
J Grover, V Laxmi, MS Gaur
Advanced Computing, Networking and Security: International Conference …, 2012
672012
A novel defense mechanism against sybil attacks in VANET
J Grover, MS Gaur, V Laxmi
Proceedings of the 3rd international conference on Security of information …, 2010
672010
Evaluation of android anti-malware techniques against dalvik bytecode obfuscation
P Faruki, A Bharmal, V Laxmi, MS Gaur, M Conti, M Rajarajan
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
632014
A node-disjoint multipath routing method based on AODV protocol for MANETs
C Lal, V Laxmi, MS Gaur
2012 IEEE 26th International Conference on Advanced Information Networking …, 2012
612012
Android inter-app communication threats and detection techniques
S Bhandari, WB Jaballah, V Jain, V Laxmi, A Zemmari, MS Gaur, ...
Computers & Security 70, 392-421, 2017
572017
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET
V Laxmi, C Lal, MS Gaur, D Mehta
Journal of Information Security and Applications 22, 99-112, 2015
562015
Multi-constraints link stable multicast routing protocol in MANETs
G Singal, V Laxmi, MS Gaur, S Todi, V Rao, M Tripathi, R Kushwaha
Ad Hoc Networks 63, 115-128, 2017
532017
The system can't perform the operation now. Try again later.
Articles 1–20