Ryan Shah
Ryan Shah
Verified email at strath.ac.uk - Homepage
Title
Cited by
Cited by
Year
Clicktok: click fraud detection using traffic analysis
S Nagaraja, R Shah
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
102019
Secure calibration in high-assurance IoT: traceability for safety resilience
R Shah, M McIntee, S Nagaraja, S Bhandary, P Arote, J Kuri
arXiv. org, 2019
22019
Privacy with surgical robotics: challenges in applying contextual privacy theory
R Shah, S Nagaraja
arXiv preprint arXiv:1909.01862, 2019
12019
VoipLoc: VoIP call provenance using acoustic side-channels
S Nagaraja, R Shah
IEEE Security and Privacy 2020, 2019
12019
Security Landscape for Robotics
R Shah
arXiv preprint arXiv:1904.03033, 2019
12019
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT
R Shah, S Nagaraja
International Conference on Information Systems Security, 3-22, 2020
2020
VoipLoc: Establishing VoIP call provenance using acoustic side-channels
S Nagaraja, R Shah
arXiv preprint arXiv:1909.01904, 2019
2019
Secure Calibration for Safety-Critical IoT: Traceability for Safety Resilience
R Shah, M McIntee, S Nagaraja, S Bhandary, P Arote, J Kuri
arXiv preprint arXiv:1908.00740, 2019
2019
Poster: Unified access control for surgical robotics
R Shah, S Nagaraja
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
2019
A game-theoretic analysis of DoS attacks on driverless vehicles
R Shah, S Nagaraja
arXiv preprint arXiv:1902.09590, 2019
2019
An access control model for robot calibration
R Shah, S Nagaraja
arXiv preprint arXiv:1902.09587, 2019
2019
Do we have the time for IRM? service denial attacks and SDN-based defences
R Shah, S Nagaraja
Proceedings of the 20th International Conference on Distributed Computing …, 2019
2019
Cocaine delivery via driverless vehicles OR Scaling physical-proximity attacks on driverless vehicles using structured graph analysis
R Shah, S Nagaraja
The system can't perform the operation now. Try again later.
Articles 1–13