Picture of automobiles stacked in industrial facility

Open Access research that power business decision making...

Strathprints makes available scholarly Open Access research by the Department of Management Science. This includes research that seeks to develop theory, solution methods and algorithms for confronting solving optimisation and predictive analytics problems arising from real-world situations, such as those arising in manufacturing, logistics, health and energy.

Management Science also explores the application of management science within healthcare organisations, the deployment of data analytics in the creation of risk-based decision support systems, and supply chain risk management.

Explore research outputs by Management Science -- or explore all of Strathclyde's Open Access research...

Browse by Author or creator

Group by: Publication Date | Item type | No Grouping
Jump to: 2021 | 2020 | 2019 | 2017 | 2016 | 2014 | 2006
Number of items: 14.

2021

Nagaraja, Shishir and Shah, Ryan (2021) VoIPLoc : passive VoIP call provenance using acoustic side-channels. In: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2021, 2021-06-28 - 2021-07-02, Virtual Event. Hosted by New York University. (In Press)

2020

Nagaraja, Shishir (2020) Unlinking super-linkers : the topology of epidemic response (Covid-19). Working paper. arXiv.org.

2019

Shah, Ryan and McIntee, Michael and Nagaraja, Shishir and Bhandary, Sahil and Arote, Prerna and Kuri, Joy (2019) Secure calibration in high-assurance IoT : traceability for safety resilience. Working paper. arXiv.org, Ithica, N.Y..

Nagaraja, Shishir and Shah, Ryan (2019) VoipLoc : VoIP call provenance using acoustic side-channels. In: IEEE Security and Privacy 2020, 2020-05-18 - 2020-05-20.

Shah, Ryan and Nagaraja, Shishir (2019) A game-theoretic analysis of DoS attacks on driverless vehicles. Working paper. arXiv.org, Ithica, N.Y..

Shah, Ryan and Nagaraja, Shishir (2019) Privacy with surgical robotics : challenges in applying contextual privacy theory. In: 2nd annual Symposium on Applications of Contextual Integrity, 2019-08-19 - 2019-08-20. (In Press)

Shah, Ryan and Nagaraja, Shishir; (2019) Poster : Unified access control for surgical robotics. In: SACMAT '19, Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM, CAN, pp. 231-233. ISBN 9781450367530

Shah, Ryan and Nagaraja, Shishir (2019) An access control model for robot calibration. Working paper. arXiv.org, Ithica, N.Y..

Nagaraja, Shishir and Shah, Ryan; (2019) Clicktok : click fraud detection using traffic analysis. In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. ACM, New York, NY., pp. 105-116. ISBN 9781450367264

Shah, Ryan and Nagaraja, Shishir; (2019) Do we have the time for IRM? : Service denial attacks and SDN-based defences. In: ICDCN 2019 - Proceedings of the 2019 International Conference on Distributed Computing and Networking. Association for Computing Machinery, IND, pp. 496-501. ISBN 9781450360944

2017

Biswas, Arnab Kumar and Ghosal, Dipak and Nagaraja, Shishir (2017) A survey of timing channels and countermeasures. ACM Computing Surveys, 50 (1). 6. ISSN 1557-7341

2016

Gardiner, Joseph and Nagaraja, Shishir (2016) On the security of machine learning in malware C&C detection : a survey. ACM Computing Surveys, 49 (3). 59. ISSN 1557-7341

2014

Gardiner, Joseph and Nagaraja, Shishir (2014) Blindspot : indistinguishable anonymous communications. Working paper. arXiv.org, Ithaca, N.Y..

2006

Nagaraja, Shishir and Anderson, Ross (2006) The topology of covert conflict. In: 5th Annual Workshop on the Economics of Information Security, 2006-06-26 - 2006-06-28.

This list was generated on Wed Aug 4 13:30:39 2021 BST.