Volgen
Ryan Shah
Ryan Shah
Security Consultant, Sapphire
Geverifieerd e-mailadres voor hw.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Clicktok: Click fraud detection using traffic analysis
S Nagaraja, R Shah
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
452019
VoIPLoc: passive VoIP call provenance via acoustic side-channels
S Nagaraja, R Shah
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
10*2021
Secure Calibration for Safety-Critical IoT: Traceability for Safety Resilience
R Shah, M McIntee, S Nagaraja, S Bhandary, P Arote, J Kuri
arXiv preprint arXiv:1908.00740, 2019
5*2019
Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia
T Georgiou, L Baillie, R Shah
arXiv preprint arXiv:2304.01617, 2023
42023
Security landscape for robotics
R Shah
arXiv preprint arXiv:1904.03033, 2019
32019
Sensor Identification via Acoustic Physically Unclonable Function
G Vaidya, TV Prabhakar, N Gnani, R Shah, S Nagaraja
Digital Threats: Research and Practice 4 (2), 1-25, 2023
22023
Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels
R Shah, CM Ahmed, S Nagaraja
arXiv preprint arXiv:2205.08426, 2022
22022
Privacy with surgical robotics: challenges in applying contextual privacy theory
R Shah, S Nagaraja
arXiv preprint arXiv:1909.01862, 2019
22019
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels
R Shah, CM Ahmed, S Nagaraja
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022
12022
A unified access control model for calibration traceability in safety-critical IoT
R Shah, S Nagaraja
Information Systems Security: 16th International Conference, ICISS 2020 …, 2020
1*2020
Introducing and Interfacing with Cybersecurity--A Cards Approach
R Shah, M Maarek, S Stals, L Baillie, SC Chan, R Stewart, HW Loidl, ...
arXiv preprint arXiv:2307.16535, 2023
2023
Communicating Complex Decisions in Robot-Assisted Therapy
C Bettosi, K Chen, R Shah, L Baillie
https://arxiv.org/abs/2303.14054, 2023
2023
Reconstructing Robot Operations via Radio-Frequency Side-Channel
R Shah, M Ahmed, S Nagaraja
arXiv preprint arXiv:2209.10179, 2022
2022
Fingerprinting Robot Movements via Acoustic Side Channel
R Shah, M Ahmed, S Nagaraja
arXiv preprint arXiv:2209.10240, 2022
2022
Security of robotic workflows
RK Shah
2022
Poster: Unified access control for surgical robotics
R Shah, S Nagaraja
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
2019
Clicktok
S Nagaraja, R Shah
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
2019
A game-theoretic analysis of DoS attacks on driverless vehicles
R Shah, S Nagaraja
arXiv preprint arXiv:1902.09590, 2019
2019
Do we have the time for IRM? service denial attacks and SDN-based defences
R Shah, S Nagaraja
Proceedings of the 20th International Conference on Distributed Computing …, 2019
2019
Cocaine delivery via driverless vehicles OR Scaling physical-proximity attacks on driverless vehicles using structured graph analysis
R Shah, S Nagaraja
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20