Picture of small jelly fish in ocean

Open Access research that better understands changing marine ecologies...

Strathprints makes available scholarly Open Access content by researchers in the Department of Mathematics & Statistics.

Mathematics & Statistics hosts the Marine Population Modelling group which is engaged in research into topics surrounding marine resource modelling and ecology. Recent work has included important developments in the population modelling of marine species.

Explore the Open Access research of Mathematics & Statistics. Or explore all of Strathclyde's Open Access research...

Browse by Author or creator

Group by: Publication Date | Item type | No Grouping
Number of items: 24.

Vaidya, Girish and Prabhakar, T.V. and Gnani, Nithish and Shah, Ryan and Nagaraja, Shishir (2023) Sensor identification via Acoustic Physically Unclonable Function (PUF). Digital Threats: Research and Practice, 4 (2). pp. 1-25. 20. ISSN 2692-1626

Ludvigsen, Kaspar Rosager and Nagaraja, Shishir and Daly, Angela (2022) The dangers of computational law and cybersecurity; perspectives from engineering and the AI Act. Other. arXiv.org, Ithaca, NY.

Ludvigsen, Kaspar Rosager and Nagaraja, Shishir and Daly, Angela (2022) YASM (Yet Another Surveillance Mechanism). Other. arXiv.org, Ithaca, NY.

Rosager Ludvigsen, Kaspar and Nagaraja, Shishir (2022) The opportunity to regulate cybersecurity in the EU (and the world) : recommendations for the Cybersecurity Resilience Act. Other. arXiv.org, Ithaca, NY.

Shah, Ryan and Ahmed, Chuadhry Mujeeb and Nagaraja, Shishir (2022) Can you still see me? Reconstructing robot operations over end-to-end encrypted channels. Other. arXiv.org, Ithaca, NY.

Shah, Ryan and Ahmed, Chuadhry Mujeeb and Nagaraja, Shishir; (2022) Can you still see me? Identifying robot operations over end-to-end encrypted channels. In: WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks . ACM, New York, pp. 298-300. ISBN 9781450392167

Rosager Ludvigsen, Kaspar and Nagaraja, Shishir (2022) Dissecting liabilities in adversarial surgical robot failures : a national (Danish) and EU law perspective. Computer Law and Security Review, 44. 105656. ISSN 0267-3649

Ludvigsen, Kaspar and Nagaraja, Shishir and Daly, Angela (2022) When is software a medical device? Understanding and determining the "intention" and requirements for software as a medical device in European union law. European Journal of Risk Regulation, 13 (1). pp. 78-93. ISSN 1867-299X

Gardiner, Joseph and Eiffert, Adam and Garraghan, Peter and Race, Nicholas and Nagaraja, Shishir and Rashid, Awais; (2021) Controller-in-the-middle : attacks on software defined networks in industrial control systems. In: CPSIoTSec 2021 - Proceedings of the 2nd Workshop on CPS and IoT Security and Privacy, co-located with CCS 2021. ACM, New York, NY., 63–68. ISBN 9781450384872

Nagaraja, Shishir and Shah, Ryan; (2021) VoIPLoc : passive VoIP call provenance via acoustic side-channels. In: WiSec '21. Association for Computing Machinery, ARE, pp. 323-334. ISBN 9781450383493

Shah, Ryan and Nagaraja, Shishir; Kanhere, Salil and Patil, Vishwas T and Sural, Shamik and Gaur, Manoj S, eds. (2020) A unified access control model for calibration traceability in safety-critical IoT. In: Information Systems Security - 16th International Conference, ICISS 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer, IND, pp. 3-22. ISBN 9783030656096

Nagaraja, Shishir (2020) Unlinking super-linkers : the topology of epidemic response (Covid-19). Preprint / Working Paper. arXiv.org.

Shah, Ryan and McIntee, Michael and Nagaraja, Shishir and Bhandary, Sahil and Arote, Prerna and Kuri, Joy (2019) Secure calibration in high-assurance IoT : traceability for safety resilience. Preprint / Working Paper. arXiv.org, Ithica, N.Y..

Nagaraja, Shishir and Shah, Ryan (2019) VoipLoc : VoIP call provenance using acoustic side-channels. In: IEEE Security and Privacy 2020, 2020-05-18 - 2020-05-20.

Shah, Ryan and Nagaraja, Shishir (2019) A game-theoretic analysis of DoS attacks on driverless vehicles. Preprint / Working Paper. arXiv.org, Ithica, N.Y..

Shah, Ryan and Nagaraja, Shishir (2019) Privacy with surgical robotics : challenges in applying contextual privacy theory. In: 2nd annual Symposium on Applications of Contextual Integrity, 2019-08-19 - 2019-08-20. (In Press)

Shah, Ryan and Nagaraja, Shishir; (2019) Poster : Unified access control for surgical robotics. In: SACMAT '19, Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM, CAN, pp. 231-233. ISBN 9781450367530

Shah, Ryan and Nagaraja, Shishir (2019) An access control model for robot calibration. Preprint / Working Paper. arXiv.org, Ithica, N.Y..

Nagaraja, Shishir and Shah, Ryan; (2019) Clicktok : click fraud detection using traffic analysis. In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. ACM, New York, NY., pp. 105-116. ISBN 9781450367264

Shah, Ryan and Nagaraja, Shishir; (2019) Do we have the time for IRM? : Service denial attacks and SDN-based defences. In: ICDCN 2019 - Proceedings of the 2019 International Conference on Distributed Computing and Networking. Association for Computing Machinery, IND, pp. 496-501. ISBN 9781450360944

Biswas, Arnab Kumar and Ghosal, Dipak and Nagaraja, Shishir (2017) A survey of timing channels and countermeasures. ACM Computing Surveys, 50 (1). 6. ISSN 1557-7341

Gardiner, Joseph and Nagaraja, Shishir (2016) On the security of machine learning in malware C&C detection : a survey. ACM Computing Surveys, 49 (3). 59. ISSN 1557-7341

Gardiner, Joseph and Nagaraja, Shishir (2014) Blindspot : indistinguishable anonymous communications. Preprint / Working Paper. arXiv.org, Ithaca, N.Y..

Nagaraja, Shishir and Anderson, Ross (2006) The topology of covert conflict. In: 5th Annual Workshop on the Economics of Information Security, 2006-06-26 - 2006-06-28.

This list was generated on Wed Dec 18 23:29:30 2024 GMT.