Industrial CASE Account - University of Strathclyde 2017 | Shah, Ryan

  • Revie, Crawford (Principal Investigator)
  • Ahmed, Chuadhry Mujeeb (Co-investigator)
  • Shah, Ryan (Research Co-investigator)

Project: Research Studentship Case - Internally allocated

Search results

  • 2023

    Sensor identification via Acoustic Physically Unclonable Function (PUF)

    Vaidya, G., Prabhakar, T. V., Gnani, N., Shah, R. & Nagaraja, S., 30 Jun 2023, In: Digital Threats: Research and Practice. 4, 2, p. 1-25 25 p., 20.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    1 Citation (Scopus)
    89 Downloads (Pure)
  • 2022

    Can you still see me? Reconstructing robot operations over end-to-end encrypted channels

    Shah, R., Ahmed, C. M. & Nagaraja, S., 17 May 2022, (Submitted) Ithaca, NY, 13 p.

    Research output: Working paperWorking Paper/Preprint

    File
    27 Downloads (Pure)
  • Can you still see me? Identifying robot operations over end-to-end encrypted channels

    Shah, R., Ahmed, C. M. & Nagaraja, S., 16 May 2022, WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, p. 298-300 3 p. (WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Citation (Scopus)
    33 Downloads (Pure)
  • 2021

    VoIPLoc: passive VoIP call provenance via acoustic side-channels

    Nagaraja, S. & Shah, R., 21 Jun 2021, WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, p. 323-334 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    2 Citations (Scopus)
    31 Downloads (Pure)
  • 2020

    A unified access control model for calibration traceability in safety-critical IoT

    Shah, R. & Nagaraja, S., 31 Dec 2020, Information Systems Security - 16th International Conference, ICISS 2020, Proceedings. Kanhere, S., Patil, V. T., Sural, S. & Gaur, M. S. (eds.). [Switzerland]: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12553 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    17 Downloads (Pure)
  • 2019

    Secure calibration in high-assurance IoT: traceability for safety resilience

    Shah, R., McIntee, M., Nagaraja, S., Bhandary, S., Arote, P. & Kuri, J., 2 Aug 2019, (E-pub ahead of print) Ithica, N.Y., 12 p.

    Research output: Working paper

    Open Access
    File
    74 Downloads (Pure)
  • VoipLoc: VoIP call provenance using acoustic side-channels

    Nagaraja, S. & Shah, R., 31 Jul 2019, (Submitted).

    Research output: Contribution to conferencePaper

    File
    66 Downloads (Pure)
  • A game-theoretic analysis of DoS attacks on driverless vehicles

    Shah, R. & Nagaraja, S., 25 Jul 2019, (E-pub ahead of print) Ithica, N.Y., 15 p.

    Research output: Working paper

    Open Access
    File
    29 Downloads (Pure)
  • Privacy with surgical robotics: challenges in applying contextual privacy theory

    Shah, R. & Nagaraja, S., 25 Jun 2019, (Accepted/In press) p. 1-5. 5 p.

    Research output: Contribution to conferencePaperpeer-review

    Open Access
    File
    26 Downloads (Pure)
  • Poster: Unified access control for surgical robotics

    Shah, R. & Nagaraja, S., 28 May 2019, SACMAT '19, Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York, NY., p. 231-233 3 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

    Open Access
    File
    21 Downloads (Pure)
  • An access control model for robot calibration

    Shah, R. & Nagaraja, S., 25 May 2019, (E-pub ahead of print) Ithica, N.Y., 7 p.

    Research output: Working paper

    Open Access
    File
    49 Downloads (Pure)
  • Clicktok: click fraud detection using traffic analysis

    Nagaraja, S. & Shah, R., 15 May 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY., p. 105-116 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    31 Citations (Scopus)
    48 Downloads (Pure)
  • Do we have the time for IRM? Service denial attacks and SDN-based defences

    Shah, R. & Nagaraja, S., 4 Jan 2019, ICDCN 2019 - Proceedings of the 2019 International Conference on Distributed Computing and Networking. New York, p. 496-501 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Citation (Scopus)
    27 Downloads (Pure)