Zobrazeno 1 - 10
of 214
pro vyhledávání: '"Manoj Singh Gaur"'
Publikováno v:
IEEE Access, Vol 11, Pp 84620-84635 (2023)
The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-
Externí odkaz:
https://doaj.org/article/78f088c2b3d94fcdba152b30ef4d6a49
Publikováno v:
The Journal of Supercomputing.
The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::60a74942c60c533d5f06c60048fbefb0
https://doi.org/10.36227/techrxiv.20118803.v2
https://doi.org/10.36227/techrxiv.20118803.v2
Publikováno v:
Applied Smart Health Care Informatics. :31-65
Autor:
Deepak Garg, D. Vijay Rao, Riti Kushwaha, Gaurav Singal, Manoj Singh Gaur, Neeraj Kumar, Vijay Laxmi
Publikováno v:
ACM Transactions on Internet Technology. 22:1-27
Multicast communication plays a pivotal role in Edge based Mobile Ad hoc Networks (MANETs). MANETs can provide low-cost self-configuring devices for multimedia data communication that can be used in military battlefield, disaster management, connecte
In this manuscript, we analyze the security offered by existing 802.11 protocols against one of the most basic yet detrimental Evil Twin (ET) attacks. To comprehensively protect Wi-Fi networks against such attacks, vulnerabilities in the IEEE 802.11
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79697750216c33aa9abb9af7a10c3867
https://doi.org/10.36227/techrxiv.20118803.v1
https://doi.org/10.36227/techrxiv.20118803.v1
Autor:
Frédéric Herbreteau, Manoj Singh Gaur, Shweta Bhandari, Partha S. Roop, Akka Zemmari, Vijay Laxmi
Publikováno v:
Future Generation Computer Systems. 109:593-603
User data is touted as new oil in our times of digital economy. Colluding apps can pose a threat to leak private information in Android. In this paper, a technique is proposed to address the threat emanating from multiple colluding Android applicatio
Publikováno v:
Automatic Control and Computer Sciences. 54:358-370
In cloud services, deduplication is a widely used data reduction technique to minimize storage and communication overhead. Nonetheless, deduplication introduces a serious security risk: a malicious client can obtain access to a file on storage by lea
Autor:
Vijay Laxmi, Gaurav Somani, Akka Zemmari, Jyoti Gajrani, Manoj Singh Gaur, Meenakshi Tripathi
Publikováno v:
Digital Threats: Research and Practice. 1:1-25
Data security and privacy of Android users is one of the challenging security problems addressed by the security research community. A major source of the security vulnerabilities in Android apps is attributed to bugs within source code, insecure API
Publikováno v:
Integration. 72:92-110
Network-on-chip (NoC) is a reliable and scalable on-chip interconnect solution particularly used for MPSoCs and CMPs. Increasing susceptibility of NoC to failures is becoming a new research concern. Failures in components such as on-chip link or rout