Rajib Ranjan Maiti
Orcid: 0000-0002-5510-8217
According to our database1,
Rajib Ranjan Maiti
authored at least 30 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards.
Int. J. Inf. Sec., June, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2023
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023
2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Deriving invariant checkers for critical infrastructure using axiomatic design principles.
Cybersecur., 2021
IoTPerimeter: A Passive Fingerprinting of Smart Environment using Graph-based Features.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021
2020
LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks with Contact Profiles.
IEEE Trans. Mob. Comput., 2020
2018
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
2017
CoRR, 2017
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios.
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017
2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016
2015
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
2014
Adv. Complex Syst., 2014
2013
Proceedings of the Distributed Computing and Networking, 14th International Conference, 2013
Analyzing the performance of epidemic broadcasting in DTNs using directional antenna.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013
2012
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012