Carlton Shepherd
Orcid: 0000-0002-7366-9034
According to our database1,
Carlton Shepherd
authored at least 36 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies.
IEEE Internet Things J., June, 2024
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2024
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey.
Eng. Appl. Artif. Intell., 2024
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study.
IEEE Access, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
IEEE Trans. Computers, July, 2023
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2021
CoRR, 2021
Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices.
CoRR, 2021
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey.
CoRR, 2021
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis.
Comput. Secur., 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
2019
Techniques for establishing trust in modern constrained sensing platforms with trusted execution environments.
PhD thesis, 2019
Providing Confidential Cloud-based Fall Detection from Remote Sensor Data Using Multi-Party Computation.
CoRR, 2019
Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication.
CoRR, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs.
CoRR, 2018
Remote Credential Management with Mutual Attestation for Trusted Execution Environments.
Proceedings of the Information Security Theory and Practice, 2018
2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Proceedings of the Symposium on Applied Computing, 2017
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2015
BlobSnake: gamification of feature extraction for 'plug and play' human activity recognition.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015
2013
Proceedings of the Security Protocols XXI, 2013