default search action
Shishir Nagaraja
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i25]Chuadhry Mujeeb Ahmed, Matthew Calder, Sean Gunawan, Jay Prakash, Shishir Nagaraja, Jianying Zhou:
Time Constant: Actuator Fingerprinting using Transient Response of Device and Process in ICS. CoRR abs/2409.16536 (2024) - 2023
- [c30]Matthew Calder, Mujeeb Ahmed, Shishir Nagaraja:
SWaP: A Water Process Testbed for ICS Security Research. COINS 2023: 1-4 - [c29]Carl Dickinson, Shishir Nagaraja, Chuadhry Mujeeb Ahmed, Richard Hyde:
AGRITRUST: A Testbed to Enable Trustworthy Smart AgriTech. TAS 2023: 22:1-22:13 - [i24]Ping Wang, Shishir Nagaraja, Aurélien Bourquard, Haichang Gao, Jeff Yan:
SoK: Acoustic Side Channels. CoRR abs/2308.03806 (2023) - 2022
- [j4]Kaspar Rosager Ludvigsen, Shishir Nagaraja:
Dissecting liabilities in adversarial surgical robot failures: A national (Danish) and EU law perspective. Comput. Law Secur. Rev. 44: 105656 (2022) - [c28]Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly:
Preventing or Mitigating Adversarial Supply Chain Attacks: A Legal Analysis. SCORED@CCS 2022: 25-34 - [c27]Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja:
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels. WISEC 2022: 298-300 - [i23]Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly:
When is Software a Medical Device? Understanding and Determining the 'Intention' and Requirements for Software as a Medical device in EU law. CoRR abs/2202.12049 (2022) - [i22]Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja:
Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels. CoRR abs/2205.08426 (2022) - [i21]Kaspar Rosager Ludvigsen, Shishir Nagaraja:
The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act. CoRR abs/2205.13196 (2022) - [i20]Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly:
YASM (Yet Another Surveillance Mechanism). CoRR abs/2205.14601 (2022) - [i19]Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly:
The Dangers of Computational Law and Cybersecurity; Perspectives from Engineering and the AI Act. CoRR abs/2207.00295 (2022) - [i18]Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly:
Preventing or Mitigating Adversarial Supply Chain Attacks; a legal analysis. CoRR abs/2208.03466 (2022) - [i17]Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja:
Reconstructing Robot Operations via Radio-Frequency Side-Channel. CoRR abs/2209.10179 (2022) - [i16]Ryan Shah, Mujeeb Ahmed, Shishir Nagaraja:
Fingerprinting Robot Movements via Acoustic Side Channel. CoRR abs/2209.10240 (2022) - 2021
- [c26]Joseph Gardiner, Adam Eiffert, Peter Garraghan, Nicholas J. P. Race, Shishir Nagaraja, Awais Rashid:
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems. CPSIOTSEC@CCS 2021: 63-68 - [c25]Shishir Nagaraja, Ryan Shah:
VoIPLoc: passive VoIP call provenance via acoustic side-channels. WISEC 2021: 323-334 - 2020
- [c24]Ryan Shah, Shishir Nagaraja:
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT. ICISS 2020: 3-22 - [i15]Shishir Nagaraja:
Unlinking super-linkers: the topology of epidemic response (Covid-19). CoRR abs/2006.02241 (2020) - [i14]Kaspar Rosager Ludvigsen, Shishir Nagaraja:
Dissecting liabilities in adversarial surgical robot failures: A national (Danish) and European law perspective. CoRR abs/2008.07381 (2020)
2010 – 2019
- 2019
- [c23]Ryan Shah, Shishir Nagaraja:
Do we have the time for IRM?: service denial attacks and SDN-based defences. ICDCN 2019: 496-501 - [c22]Ryan Shah, Shishir Nagaraja:
Poster: Unified Access Control for Surgical Robotics. SACMAT 2019: 231-233 - [c21]Shishir Nagaraja, Ryan Shah:
Clicktok: click fraud detection using traffic analysis. WiSec 2019: 105-116 - [i13]Ryan Shah, Shishir Nagaraja:
An Access Control Model for Robot Calibration. CoRR abs/1902.09587 (2019) - [i12]Ryan Shah, Shishir Nagaraja:
A game-theoretic analysis of DoS attacks on driverless vehicles. CoRR abs/1902.09590 (2019) - [i11]Shishir Nagaraja, Ryan Shah:
Clicktok: Click Fraud Detection using Traffic Analysis. CoRR abs/1903.00733 (2019) - [i10]Ryan Shah, Michael McIntee, Shishir Nagaraja, Sahil Bhandary, Prerna Arote, Joy Kuri:
Secure Calibration for High-Assurance IoT: Traceability for Safety Resilience. CoRR abs/1908.00740 (2019) - [i9]Ryan Shah, Shishir Nagaraja:
Privacy with Surgical Robotics: Challenges in Applying Contextual Privacy Theory. CoRR abs/1909.01862 (2019) - [i8]Shishir Nagaraja, Ryan Shah:
VoipLoc: Establishing VoIP call provenance using acoustic side-channels. CoRR abs/1909.01904 (2019) - 2018
- [i7]Ryan Shah, Shishir Nagaraja:
Do we have the time for IRM?: Service denial attacks and SDN-based defences. CoRR abs/1812.10875 (2018) - 2017
- [j3]Arnab Kumar Biswas, Dipak Ghosal, Shishir Nagaraja:
A Survey of Timing Channels and Countermeasures. ACM Comput. Surv. 50(1): 6:1-6:39 (2017) - [c20]Jonathan Weekes, Shishir Nagaraja:
Controlling Your Neighbour's Bandwidth for Fun and for Profit. Security Protocols Workshop 2017: 214-223 - 2016
- [j2]Joseph Gardiner, Shishir Nagaraja:
On the Security of Machine Learning in Malware C&C Detection: A Survey. ACM Comput. Surv. 49(3): 59:1-59:39 (2016) - 2015
- [j1]Bharath Venkatesh, Sudip Hazra Choudhury, Shishir Nagaraja, N. Balakrishnan:
BotSpot: fast graph based identification of structured P2P bots. J. Comput. Virol. Hacking Tech. 11(4): 247-261 (2015) - 2014
- [c19]Shishir Nagaraja:
Botyacc: Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis. ESORICS (2) 2014: 439-456 - [c18]Joseph Gardiner, Shishir Nagaraja:
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis. Security Protocols Workshop 2014: 321-333 - [c17]Shishir Nagaraja:
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion). Security Protocols Workshop 2014: 334-339 - [i6]Joseph Gardiner, Shishir Nagaraja:
Blindspot: Indistinguishable Anonymous Communications. CoRR abs/1408.0784 (2014) - [i5]Joseph Gardiner, Marco Cova, Shishir Nagaraja:
Command & Control: Understanding, Denying and Detecting. CoRR abs/1408.1136 (2014) - 2013
- [c16]Rushil Khurana, Shishir Nagaraja:
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks. Security Protocols Workshop 2013: 143-151 - [c15]Shishir Nagaraja:
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion). Security Protocols Workshop 2013: 152-160 - 2011
- [c14]Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: A Covert Social Network Botnet. Information Hiding 2011: 299-313 - [c13]Shishir Nagaraja, Virajith Jalaparti, Matthew Caesar, Nikita Borisov:
P3CA: Private Anomaly Detection Across ISP Networks. PETS 2011: 38-56 - [c12]Shishir Nagaraja, Péter Schaffer, Djamila Aouada:
Who clicks there!: anonymising the photographer in a camera saturated society. WPES 2011: 13-22 - [i4]Péter Schaffer, Djamila Aouada, Shishir Nagaraja:
Who clicks there!: Anonymizing the photographer in a camera saturated society. CoRR abs/1106.2696 (2011) - [i3]Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: construction of an unobservable communication network leveraging social behavior. CoRR abs/1107.2031 (2011) - 2010
- [c11]Shishir Nagaraja:
The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures. Privacy Enhancing Technologies 2010: 253-272 - [c10]Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov:
BotGrep: Finding P2P Bots with Structured Graph Analysis. USENIX Security Symposium 2010: 95-110
2000 – 2009
- 2009
- [b1]Shishir Nagaraja:
Robust covert network topologies. University of Cambridge, UK, 2009 - 2008
- [c9]Shishir Nagaraja:
The Economics of Covert Community Detection and Hiding. WEIS 2008 - 2007
- [c8]Shishir Nagaraja, Ross J. Anderson:
Dynamic Topologies for Robust Scale-Free Networks. BIOWIRE 2007: 411-426 - [c7]Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. Wassell, Frank Stajano:
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern. CNSR 2007: 157-165 - [c6]Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson:
New Strategies for Revocation in Ad-Hoc Networks. ESAS 2007: 232-246 - [c5]Shishir Nagaraja:
Anonymity in the Wild: Mixes on Unstructured Networks. Privacy Enhancing Technologies 2007: 254-271 - [c4]Shishir Nagaraja:
Privacy Amplification with Social Networks. Security Protocols Workshop 2007: 58-73 - [c3]Shishir Nagaraja:
Privacy Amplification with Social Networks (Transcript of Discussion). Security Protocols Workshop 2007: 74-80 - [i2]Shishir Nagaraja:
Anonymity in the Wild: Mixes on unstructured networks. CoRR abs/0706.0430 (2007) - 2006
- [c2]Shishir Nagaraja, Ross J. Anderson:
The Topology of Covert Conflict. WEIS 2006 - 2005
- [c1]Shishir Nagaraja:
Topology of Covert Conflict. Security Protocols Workshop 2005: 329-332 - [i1]Shishir Nagaraja, Ross J. Anderson:
The topology of covert conflict. IACR Cryptol. ePrint Arch. 2005: 250 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint