Publications

Security of robotic workflows

Published in University of Strathclyde Thesis Library, 2022

Use Google Scholar for full citation

Recommended citation: Ryan Shah, "Security of robotic workflows." University of Strathclyde Thesis Library, 2022.

(Poster) Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels

Published in Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022

Use Google Scholar for full citation

Recommended citation: Ryan Shah, Chuadhry Ahmed, Shishir Nagaraja, "(Poster) Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels." Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022.

VoIPLoc: Passive VoIP call provenance via acoustic side-channels

Published in Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021

Use Google Scholar for full citation

Recommended citation: Shishir Nagaraja, Ryan Shah, "VoIPLoc: Passive VoIP call provenance via acoustic side-channels." Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021.

A unified access control model for calibration traceability in safety-critical IoT

Published in Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16--20, 2020, Proceedings 16, 2020

Use Google Scholar for full citation

Recommended citation: Ryan Shah, Shishir Nagaraja, "A unified access control model for calibration traceability in safety-critical IoT." Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16--20, 2020, Proceedings 16, 2020.

Poster: Unified access control for surgical robotics

Published in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Use Google Scholar for full citation

Recommended citation: Ryan Shah, Shishir Nagaraja, "Poster: Unified access control for surgical robotics." Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019.

Clicktok: click fraud detection using traffic analysis

Published in Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Use Google Scholar for full citation

Recommended citation: Shishir Nagaraja, Ryan Shah, "Clicktok: click fraud detection using traffic analysis." Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019.