Clicktok: click fraud detection using traffic analysis S Nagaraja, R Shah Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 10 | 2019 |
Secure calibration in high-assurance IoT: traceability for safety resilience R Shah, M McIntee, S Nagaraja, S Bhandary, P Arote, J Kuri arXiv. org, 2019 | 2 | 2019 |
Privacy with surgical robotics: challenges in applying contextual privacy theory R Shah, S Nagaraja arXiv preprint arXiv:1909.01862, 2019 | 1 | 2019 |
VoipLoc: VoIP call provenance using acoustic side-channels S Nagaraja, R Shah IEEE Security and Privacy 2020, 2019 | 1 | 2019 |
Security Landscape for Robotics R Shah arXiv preprint arXiv:1904.03033, 2019 | 1 | 2019 |
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT R Shah, S Nagaraja International Conference on Information Systems Security, 3-22, 2020 | | 2020 |
VoipLoc: Establishing VoIP call provenance using acoustic side-channels S Nagaraja, R Shah arXiv preprint arXiv:1909.01904, 2019 | | 2019 |
Secure Calibration for Safety-Critical IoT: Traceability for Safety Resilience R Shah, M McIntee, S Nagaraja, S Bhandary, P Arote, J Kuri arXiv preprint arXiv:1908.00740, 2019 | | 2019 |
Poster: Unified access control for surgical robotics R Shah, S Nagaraja Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019 | | 2019 |
A game-theoretic analysis of DoS attacks on driverless vehicles R Shah, S Nagaraja arXiv preprint arXiv:1902.09590, 2019 | | 2019 |
An access control model for robot calibration R Shah, S Nagaraja arXiv preprint arXiv:1902.09587, 2019 | | 2019 |
Do we have the time for IRM? service denial attacks and SDN-based defences R Shah, S Nagaraja Proceedings of the 20th International Conference on Distributed Computing …, 2019 | | 2019 |
Cocaine delivery via driverless vehicles OR Scaling physical-proximity attacks on driverless vehicles using structured graph analysis R Shah, S Nagaraja | | |