Rajib Ranjan Maiti

Orcid: 0000-0002-5510-8217

According to our database1, Rajib Ranjan Maiti authored at least 30 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards.
Int. J. Inf. Sec., June, 2024

iTieProbe: How Vulnerable Your IoT Provisioning via Wi-Fi AP Mode or EZ Mode?
IEEE Trans. Inf. Forensics Secur., 2024

IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2023

CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning.
IEEE Trans. Dependable Secur. Comput., 2023

ICCPS: Impact discovery using causal inference for cyber attacks in CPSs.
CoRR, 2023

Cyber Physical Aquaponic System (CyPhA): a CPS Testbed.
CoRR, 2023

POSTER: A Cyber Physical Aquaponics System (CyPhA) Testbed.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

2022
Detect and Classify IoT Camera Traffic.
CoRR, 2022

Face Recognition Systems: Are you sure they only consider your face?
Proceedings of the 43rd IEEE Security and Privacy, 2022

Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network Traffic.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

kTRACKER: Passively Tracking KRACK using ML Model.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Deriving invariant checkers for critical infrastructure using axiomatic design principles.
Cybersecur., 2021

IoTPerimeter: A Passive Fingerprinting of Smart Environment using Graph-based Features.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks with Contact Profiles.
IEEE Trans. Mob. Comput., 2020

2018
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods.
CoRR, 2017

Private mobility-cast for opportunistic networks.
Comput. Networks, 2017

Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios.
Proceedings of the Computer Security - ESORICS 2017, 2017

IoTScanner: Detecting Privacy Threats in IoT Neighborhoods.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

2016
LoSeRO: a locality sensitive routing protocol in opportunistic networks.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

On the MitM vulnerability in mobile banking applications for android devices.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
Location-Based Routing for Opportunistic Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

On the broadcast of segmented messages in dynamic networks.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2014
Understanding the Correlation of the Properties of Human movement Patterns.
Adv. Complex Syst., 2014

2013
POSTER: Using Directional Antennas for Epidemic Routing in DTNs in Practice.
Proceedings of the Distributed Computing and Networking, 14th International Conference, 2013

Analyzing the performance of epidemic broadcasting in DTNs using directional antenna.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
Epidemic broadcasting in DTNs using directional antenna.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012


  Loading...