Shishir Nagaraja

Dr

  • United Kingdom

Accepting PhD Students

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2014

    On the reliability of network measurement techniques used for malware traffic analysis

    Gardiner, J. & Nagaraja, S., 1 Jan 2014, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Stajano, F., Matyáš, V., Švenda, P., Anderson, J., Christianson, B. & Malcolm, J. (eds.). Cham: Springer-Verlag, Vol. 8809. p. 321-333 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8809).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Citations (Scopus)
  • 2007

    Incentives and information security

    Anderson, R., Moore, T., Nagaraja, S. & Ozment, A., 31 Dec 2007, Algorithmic Game Theory. Nisan, N., Roughgarden, T., Tardos, E. & Vazirani, V. V. (eds.). Cambridge: Cambridge University Press, p. 633-650 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    13 Citations (Scopus)