Gajrani, Jyoti
15  results:
Search for persons X
?
1

Blockchain-enabled secure and efficient data sharing scheme..:

Bhan, Rati ; Pamula, Rajendra ; Faruki, Parvez.
The Journal of Supercomputing.  79 (2023)  14 - p. 16233-16274 , 2023
 
?
2

Fuzzing REST APIs for Bugs: An Empirical Analysis:

, In: Evolution in Computational Intelligence; Smart Innovation, Systems and Technologies,
 
?
3

K-Means Algorithm to Form Dynamic Cluster Formation to Coun..:

, In: Proceedings of International Conference on Data Science and Applications; Lecture Notes in Networks and Systems,
 
?
4

Detection of Ransomware Attacks Using Weight of Evidence Te..:

, In: 2023 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC),
 
?
6

IoT Security: A Survey of Issues, Attacks and Defences:

, In: Intelligent Learning for Computer Vision; Lecture Notes on Data Engineering and Communications Technologies,
Kumar Jain, Vinesh ; Gajrani, Jyoti - p. 219-236 , 2021
 
?
7

Performance Measurement of RPL Protocol Using Modified MRHO..:

, In: Conference Proceedings of ICDLAIR2019; Lecture Notes in Networks and Systems,
Sharma, Bhawana ; Gajrani, Jyoti ; Jain, Vinesh - p. 235-245 , 2021
 
?
8

Android Malware Analysis Using Machine Learning Classifiers:

, In: Algorithms for Intelligent Systems; Proceedings of International Conference on Computational Intelligence and Emerging Power System,
Jain, Sakshi ; Khandelwal, Tarul ; Jain, Yash. - p. 171-179 , 2021
 
?
9

Vulvet : Vetting of Vulnerabilities in Android Apps to T..:

Gajrani, Jyoti ; Tripathi, Meenakshi ; Laxmi, Vijay...
Digital Threats: Research and Practice.  1 (2020)  2 - p. 1-25 , 2020
 
?
10

Vulvet: Vetting of Vulnerabilities in Android Apps to Thwar..:

Gajrani, Jyoti ; Tripathi, Meenakshi ; Laxmi, Vijay...
Digital Threats: Research and Practice.  1 (2020)  2 - p. 1-25 , 2020
 
?
12

Detection of Information Leaks via Reflection in Android Ap..:

, In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security,
Gajrani, Jyoti ; Li, Li ; Laxmi, Vijay... - p. 911-913 , 2017
 
?
13

Enhancement of the Classification Performance of Least Squa..:

, In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies,
 
?
14

A robust dynamic analysis system preventing SandBox detecti..:

, In: Proceedings of the 8th International Conference on Security of Information and Networks,
 
1-15