Shishir Nagaraja
Orcid: 0000-0001-7272-0611
According to our database1,
Shishir Nagaraja
authored at least 56 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Time Constant: Actuator Fingerprinting using Transient Response of Device and Process in ICS.
CoRR, 2024
2023
Proceedings of the First International Symposium on Trustworthy Autonomous Systems, 2023
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023
2022
The Dangers of Computational Law and Cybersecurity; Perspectives from Engineering and the AI Act.
CoRR, 2022
The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act.
CoRR, 2022
Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels.
CoRR, 2022
When is Software a Medical Device? Understanding and Determining the 'Intention' and Requirements for Software as a Medical device in EU law.
CoRR, 2022
Dissecting liabilities in adversarial surgical robot failures: A national (Danish) and EU law perspective.
Comput. Law Secur. Rev., 2022
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022
2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
2020
Dissecting liabilities in adversarial surgical robot failures: A national (Danish) and European law perspective.
CoRR, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
2019
CoRR, 2019
CoRR, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019
2017
Proceedings of the Security Protocols XXV, 2017
2016
ACM Comput. Surv., 2016
2015
J. Comput. Virol. Hacking Tech., 2015
2014
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis.
Proceedings of the Security Protocols XXII, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013
Proceedings of the Security Protocols XXI, 2013
2011
Stegobot: construction of an unobservable communication network leveraging social behavior
CoRR, 2011
CoRR, 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
2009
2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
2007
Proceedings of the Security Protocols, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
Proceedings of the Bio-Inspired Computing and Communication, 2007
2005