Shishir Nagaraja

Dr

  • United Kingdom

Accepting PhD Students

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution book

Search results

  • 2020

    A unified access control model for calibration traceability in safety-critical IoT

    Shah, R. & Nagaraja, S., 31 Dec 2020, Information Systems Security - 16th International Conference, ICISS 2020, Proceedings. Kanhere, S., Patil, V. T., Sural, S. & Gaur, M. S. (eds.). [Switzerland]: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12553 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Downloads (Pure)
  • 2019

    Clicktok: click fraud detection using traffic analysis

    Nagaraja, S. & Shah, R., 15 May 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY., p. 105-116 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    6 Citations (Scopus)
    32 Downloads (Pure)
  • Do we have the time for IRM? Service denial attacks and SDN-based defences

    Shah, R. & Nagaraja, S., 4 Jan 2019, ICDCN 2019 - Proceedings of the 2019 International Conference on Distributed Computing and Networking. New York, p. 496-501 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    11 Downloads (Pure)
  • 2017

    Controlling your neighbour’s bandwidth for fun and for profit

    Weekes, J. & Nagaraja, S., 1 Jan 2017, Security Protocols XXV - 25th International Workshop, Revised Selected Papers. Stajano, F., Christianson, B., Matyas, V. & Anderson, J. (eds.). Cham: Springer-Verlag, p. 214-223 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10476 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2014

    Botyacc: unified P2P botnet detection using behavioural analysis and graph analysis

    Nagaraja, S., 1 Jan 2014, Computer Security, ESORICS 2014 - 19th European Symposium on Research in Computer Security, Proceedings. Kutyłowski, M. & Vaidya, J. (eds.). PART 2 ed. Cham: Springer-Verlag, Vol. 8713. p. 439-456 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    12 Citations (Scopus)
  • On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion)

    Nagaraja, S., 1 Jan 2014, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Stajano, F., Matyáš, V., Švenda, P., Anderson, J., Christianson, B. & Malcolm, J. (eds.). Cham: Springer-Verlag, Vol. 8809. p. 334-339 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8809).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2013

    Simple defences against vibration-based keystroke fingerprinting attacks

    Khurana, R. & Nagaraja, S., 1 Jan 2013, Security Protocols XXI - 21st International Workshop, Revised Selected Papers. Christianson, B., Malcolm, J., Stajano, F., Anderson, J. & Bonneau, J. (eds.). Berlin: Springer-Verlag, Vol. 8263 . p. 143-151 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8263 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    2 Citations (Scopus)
  • Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion)

    Nagaraja, S., 1 Jan 2013, Security Protocols XXI - 21st International Workshop, Revised Selected Papers. Christianson, B., Malcolm, J., Stajano, F., Anderson, J. & Bonneau, J. (eds.). Berlin: Springer-Verlag, Vol. 8263 . p. 152-160 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8263 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2011

    P3CA: private anomaly detection across ISP networks

    Nagaraja, S., Jalaparti, V., Caesar, M. & Borisov, N., 11 Aug 2011, Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Proceedings. Fischer-Hübner, S. & Hopper, N. (eds.). Berlin: Springer, Vol. 6794 . p. 38-56 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6794 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    8 Citations (Scopus)
  • Stegobot: a covert social network botnet

    Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P. & Borisov, N., 26 Sep 2011, Information Hiding - 13th International Conference, IH 2011, Revised Selected Papers. Filler, T., Pevný, T., Craver, S. & Ker, A. (eds.). Berlin: Springer, Vol. 6958 . p. 299-313 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6958 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    48 Citations (Scopus)
  • Who clicks there! anonymising the photographer in a camera saturated society

    Nagaraja, S., Schaffer, P. & Aouada, D., 16 Nov 2011, WPES'11 - Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society. p. 13-22 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    4 Citations (Scopus)
  • 2010

    BotGrep: finding P2P bots with structured graph analysis

    Nagaraja, S., Mittal, P., Hong, C. Y., Caesar, M. & Borisov, N., 11 Aug 2010, Proceedings of the 19th USENIX Security Symposium. p. 95-110 16 p. (Proceedings of the 19th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    160 Citations (Scopus)
  • Privacy amplification with social networks

    Nagaraja, S., 1 Jan 2010, Security Protocols - 15th International Workshop, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer, Vol. 5964 . p. 58-73 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5964 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    1 Citation (Scopus)
  • Privacy amplification with social networks (transcript of discussion)

    Nagaraja, S., 1 Dec 2010, Security Protocols - 15th International Workshop, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer, Vol. 5964 . p. 74-80 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5964 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • The impact of unlinkability on adversarial community detection: effects and countermeasures

    Nagaraja, S., 16 Aug 2010, Privacy Enhancing Technologies - 10th International Symposium, PETS 2010, Proceedings. Berlin: Springer, Vol. 6205 . p. 253-272 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6205 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    15 Citations (Scopus)
  • 2008

    Dynamic topologies for robust scale-free networks

    Nagaraja, S. & Anderson, R., 1 Dec 2008, Bio-Inspired Computing and Communication - First Workshop on Bio-Inspired Design of Networks, BIOWIRE 2007, Revised Selected Papers. Liò, P., Yoneki, E., Crowcroft, J. & Verma, D. C. (eds.). Berlin: Springer, Vol. 5151 . p. 411-426 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5151 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    4 Citations (Scopus)
  • 2007

    Anonymity in the wild: mixes on unstructured networks

    Nagaraja, S., 1 Dec 2007, Privacy Enhancing Technologies - 7th International Symposium, PET 2007, Revised Selected Papers. Borisov, N. & Golle, P. (eds.). Berlin: Springer, p. 254-271 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4776 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    14 Citations (Scopus)
  • Evaluation framework of location privacy of wireless mobile systems with arbitrary beam pattern

    Wong, F. L., Lin, M., Nagaraja, S., Wassell, I. & Stajano, F., 4 Sep 2007, Proceedings - CNSR 2007: Fifth Annual Conference on Communication Networks and Services Research. IEEE, p. 157-165 9 p. 4215509

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    6 Citations (Scopus)
  • New strategies for revocation in ad-hoc networks

    Moore, T., Clulow, J., Nagaraja, S. & Anderson, R., 1 Dec 2007, Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Proceedings. Stajano, F., Meadows, C., Capkun, S. & Moore, T. (eds.). Berlin: IEEE, Vol. 4572 . p. 232-246 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4572 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    35 Citations (Scopus)
  • Topology of covert conflict

    Nagaraja, S., 1 Dec 2007, Security Protocols 2005 - 13th International Workshop, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer, Vol. 4631 . p. 329-332 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4631 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    1 Citation (Scopus)