Sankardas Roy

According to our database1, Sankardas Roy authored at least 35 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Impact of Train-Test Leakage on Machine Learning-based Android Malware Detection.
CoRR, 2024

Deleted File Recovery for the Linux File System (Ext4): Finding the State-of-the-Art.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

2022
FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

2021
Leveraging attention-based deep neural networks for security vetting of Android applications.
EAI Endorsed Trans. Security Safety, 2021

2020
Hybrid Analysis of Android Apps for Security Vetting using Deep Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines?
EAI Endorsed Trans. Security Safety, 2019

Experience of Incorporating NIST Standards in a Digital Forensics Curricula.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

Identifying Android malware using network-based approaches.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps.
ACM Trans. Priv. Secur., 2018

Optimizing Message Ferry Scheduling in a DTN.
Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018

Static Analysis for Security Vetting of Android Apps.
Proceedings of the From Database to Cyber Security, 2018

2017
Deep Ground Truth Analysis of Current Android Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Quantification of microbial species in solid state fermentation samples using signature genomic sequences.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

2015
Mitigating congestion based DoS attacks with an enhanced AQM technique.
Comput. Commun., 2015

Practical Always-on Taint Tracking on Mobile Devices.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
IEEE Trans. Inf. Forensics Secur., 2014

A game inspired defense mechanism against distributed denial of service attacks.
Secur. Commun. Networks, 2014

2013
Minimizing the Average Delay of Messages in Pigeon Networks.
IEEE Trans. Commun., 2013

Mitigating congestion-based denial of service attacks with active queue management.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Quasi-Optimal Dual-Phase Scheduling for Pigeon Networks.
IEEE Trans. Veh. Technol., 2012

Secure Data Aggregation in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2012

A geographical partitioning-based pigeon assignment in a pigeon network.
Proceedings of IEEE International Conference on Communications, 2012

2011
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
IEEE Trans. Mob. Comput., 2010

On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

A Survey of Game Theory as Applied to Network Security.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Game theory for cyber security.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Privacy-preserving robust data aggregation in wireless sensor networks.
Secur. Commun. Networks, 2009

Secure median computation in wireless sensor networks.
Ad Hoc Networks, 2009

2008
Secure Data Aggregation in Wireless Sensor Networks.
PhD thesis, 2008

Securely computing an approximate median in wireless sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Attack-resilient hierarchical data aggregation in sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

2005
Securing MAODV: attacks and countermeasures.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005


  Loading...