Sankardas Roy
According to our database1,
Sankardas Roy
authored at least 35 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The Impact of Train-Test Leakage on Machine Learning-based Android Malware Detection.
CoRR, 2024
Deleted File Recovery for the Linux File System (Ext4): Finding the State-of-the-Art.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
2022
FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022
2021
Leveraging attention-based deep neural networks for security vetting of Android applications.
EAI Endorsed Trans. Security Safety, 2021
2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
2018
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps.
ACM Trans. Priv. Secur., 2018
Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Quantification of microbial species in solid state fermentation samples using signature genomic sequences.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017
2015
Comput. Commun., 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
IEEE Trans. Inf. Forensics Secur., 2014
Secur. Commun. Networks, 2014
2013
IEEE Trans. Commun., 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
IEEE Trans. Veh. Technol., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
2010
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
IEEE Trans. Mob. Comput., 2010
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks.
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Secur. Commun. Networks, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
2005
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005