Pallavi Khatri
YOU?
Author Swipe
View article: Android Smart Phone Forensics using Open Source Tools
Android Smart Phone Forensics using Open Source Tools Open
Mobile Smart Phone Technology (MSPT) is one of the greatest civilizations in history, but, unfortunately, the same is being taken advantage of and unseemly conduct is inevitable. Android Technology is fast evolving and dominating over its …
View article: MODIFIED COAP TO ENSURE AUTHENTICATION IN IOT NETWORK
MODIFIED COAP TO ENSURE AUTHENTICATION IN IOT NETWORK Open
Abstract The IoT environment must be capable of inter connecting large number of heterogeneous devices. There have been numerous attempts by researchers to build countermeasures unique to IoT layers and devices in order to solve the securi…
View article: ANALYSIS OF MACHINE LEARNING CLASSIFICATION TECHNIQUES FOR IOT ATTACK VECTORS
ANALYSIS OF MACHINE LEARNING CLASSIFICATION TECHNIQUES FOR IOT ATTACK VECTORS Open
Abstract: Internet of Things (IoT) revolution has challenged IoT security architects to great extent by exploiting the entire layered IoT architecture as attack surface for different cyber-attacks. Rather it has become easier to execute at…
View article: HM2LP: Hybrid Multilevel Multihop LEACH Protocol for Conserving Energy in Large Area WSN
HM2LP: Hybrid Multilevel Multihop LEACH Protocol for Conserving Energy in Large Area WSN Open
Wireless Sensor Network (WSN) for a large area is the need of the hour due to ever-growing demand on the fly services in different application fields.More senders deployed in a large area will generate an enormous amount of data and will c…
View article: Comparison of Segmentation-Based Image Compression Using Threshold, Region Growing, and Edge Detection
Comparison of Segmentation-Based Image Compression Using Threshold, Region Growing, and Edge Detection Open
In the presenting paper we are dealing with to develop a lossless image compression (IC) method to utilize spatial redundancies inbuilt in image data which employs a best possible amount of segmentation information. To obtaining Multiscale…
View article: Timer Based Optimized Clustering for Lifetime Enhancement in WSN
Timer Based Optimized Clustering for Lifetime Enhancement in WSN Open
The energy of a wireless sensor network is crucial.Energy optimization is one of the key areas where research is being conducted.The upgraded technology in wireless sensor network (WSN) protocols has been seen tending towards clustering of…
View article: Vulnerability Assessment and Malware Analysis of Android Apps Using Machine Learning
Vulnerability Assessment and Malware Analysis of Android Apps Using Machine Learning Open
Mobile devices and their use are rapidly growing to the zenith in the market. Android devices are the most popular and handy when it comes to the mobile devices. With the rapid increase in the use of Android phones, more applications are a…
View article: Digital Auditing: A Technique to Ensure Security
Digital Auditing: A Technique to Ensure Security Open
Security is one of the ever-rising provinces in about every field of society and computers are no freak. The system on the network can be attacked if it is easy to break its security or it is vulnerable. Security issues that exist in conne…
View article: Improvement in LEACH Protocol for Energy Efficiency
Improvement in LEACH Protocol for Energy Efficiency Open
Clustering methods in WSN for the sake of energy efficiency has been addressed by various researchers due to promising improvements in the performances. The energy consumption still possesses an opportunity for improvement in terms of comp…
View article: Forensic of an unrooted mobile device
Forensic of an unrooted mobile device Open
With the people switching over to mobiles for all their computing needs, these ubiquitous devices have become huge data warehouses. In order to extract the required data, the inbuilt critical security mechanism of the device needs to be by…