Ryan Shah

Orcid: 0000-0003-1348-8423

According to our database1, Ryan Shah authored at least 19 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics.
Comput. Stand. Interfaces, 2025

2023
Introducing and Interfacing with Cybersecurity - A Cards Approach.
CoRR, 2023

Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia.
CoRR, 2023

Communicating Complex Decisions in Robot-Assisted Therapy.
CoRR, 2023

2022
Fingerprinting Robot Movements via Acoustic Side Channel.
CoRR, 2022

Reconstructing Robot Operations via Radio-Frequency Side-Channel.
CoRR, 2022

Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels.
CoRR, 2022

Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

2021
VoIPLoc: passive VoIP call provenance via acoustic side-channels.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
VoipLoc: Establishing VoIP call provenance using acoustic side-channels.
CoRR, 2019

Privacy with Surgical Robotics: Challenges in Applying Contextual Privacy Theory.
CoRR, 2019

Secure Calibration for High-Assurance IoT: Traceability for Safety Resilience.
CoRR, 2019

Security Landscape for Robotics.
CoRR, 2019

A game-theoretic analysis of DoS attacks on driverless vehicles.
CoRR, 2019

An Access Control Model for Robot Calibration.
CoRR, 2019

Clicktok: click fraud detection using traffic analysis.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Poster: Unified Access Control for Surgical Robotics.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Do we have the time for IRM?: service denial attacks and SDN-based defences.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019


  Loading...