Picture of WWI infirmary patient surrounded by wellwishers

Understanding our future through Open Access research about our past...

Strathprints makes available scholarly Open Access content by researchers in History, based within the School of Humanities. This include the Centre for the Social History of Health & Healthcare (CSHHH), considered Scotland's leading centre for the history of health and medicine.

Research at CSHHH explores the modern world since 1800 in locations as diverse as the UK, Asia, Africa, North America, and Europe. Areas of specialism include contraception and sexuality; family health and medical services; occupational health and medicine; disability; the history of psychiatry; conflict and warfare; and, drugs, pharmaceuticals and intoxicants.

Explore the Open Access research of the Centre for the Social History of Health and Healthcare. Or explore all of Strathclyde's Open Access research...

Image: Louis Théophile Binot entouré de patients et infirmières - 1915 | CC BY-SA.

Browse by Author or creator

Group by: Publication Date | Item type | No Grouping
Jump to: 2022 | 2021 | 2020 | 2019 | 2017 | 2016 | 2014 | 2006
Number of items: 25.

2022

Ludvigsen, Kaspar Rosager and Nagaraja, Shishir and Daly, Angela (2022) The dangers of computational law and cybersecurity; perspectives from engineering and the AI Act. Other. arXiv.org, Ithaca, NY.

Ludvigsen, Kaspar Rosager and Nagaraja, Shishir and Daly, Angela (2022) YASM (Yet Another Surveillance Mechanism). Other. arXiv.org, Ithaca, NY.

Rosager Ludvigsen, Kaspar and Nagaraja, Shishir (2022) The opportunity to regulate cybersecurity in the EU (and the world) : recommendations for the Cybersecurity Resilience Act. Other. arXiv.org, Ithaca, NY.

Shah, Ryan and Ahmed, Chuadhry Mujeeb and Nagaraja, Shishir (2022) Can you still see me? Reconstructing robot operations over end-to-end encrypted channels. Other. arXiv.org, Ithaca, NY.

Shah, Ryan and Ahmed, Chuadhry Mujeeb and Nagaraja, Shishir; (2022) Can you still see me? Identifying robot operations over end-to-end encrypted channels. In: WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks . ACM, New York, pp. 298-300. ISBN 9781450392167

Rosager Ludvigsen, Kaspar and Nagaraja, Shishir (2022) Dissecting liabilities in adversarial surgical robot failures : a national (Danish) and EU law perspective. Computer Law and Security Review, 44. 105656. ISSN 0267-3649

Ludvigsen, Kaspar and Nagaraja, Shishir and Daly, Angela (2022) When is software a medical device? Understanding and determining the "intention" and requirements for software as a medical device in European union law. European Journal of Risk Regulation, 13 (1). pp. 78-93. ISSN 1867-299X

2021

Gardiner, Joseph and Eiffert, Adam and Garraghan, Peter and Race, Nicholas and Nagaraja, Shishir and Rashid, Awais; (2021) Controller-in-the-middle : attacks on software defined networks in industrial control systems. In: CPSIoTSec 2021 - Proceedings of the 2nd Workshop on CPS and IoT Security and Privacy, co-located with CCS 2021. ACM, New York, NY., 63–68. ISBN 9781450384872

Vaidya, Girish and Prabhakar, T.V. and Gnani, Nithish and Shah, Ryan and Nagaraja, Shishir (2021) A novel approach for identification of sensor devices through acoustic PUF. Digital Threats: Research and Practice. ISSN 2692-1626

Nagaraja, Shishir and Shah, Ryan; (2021) VoIPLoc : passive VoIP call provenance via acoustic side-channels. In: WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, ARE, pp. 323-334. ISBN 9781450383493

Nagaraja, Shishir and Shah, Ryan (2021) VoIPLoc : passive VoIP call provenance using acoustic side-channels. In: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2021, 2021-06-28 - 2021-07-02, Virtual Event. Hosted by New York University. (In Press)

2020

Shah, Ryan and Nagaraja, Shishir; Kanhere, Salil and Patil, Vishwas T and Sural, Shamik and Gaur, Manoj S, eds. (2020) A unified access control model for calibration traceability in safety-critical IoT. In: Information Systems Security - 16th International Conference, ICISS 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer, IND, pp. 3-22. ISBN 9783030656096

Nagaraja, Shishir (2020) Unlinking super-linkers : the topology of epidemic response (Covid-19). Preprint / Working Paper. arXiv.org.

2019

Shah, Ryan and McIntee, Michael and Nagaraja, Shishir and Bhandary, Sahil and Arote, Prerna and Kuri, Joy (2019) Secure calibration in high-assurance IoT : traceability for safety resilience. Preprint / Working Paper. arXiv.org, Ithica, N.Y..

Nagaraja, Shishir and Shah, Ryan (2019) VoipLoc : VoIP call provenance using acoustic side-channels. In: IEEE Security and Privacy 2020, 2020-05-18 - 2020-05-20.

Shah, Ryan and Nagaraja, Shishir (2019) A game-theoretic analysis of DoS attacks on driverless vehicles. Preprint / Working Paper. arXiv.org, Ithica, N.Y..

Shah, Ryan and Nagaraja, Shishir (2019) Privacy with surgical robotics : challenges in applying contextual privacy theory. In: 2nd annual Symposium on Applications of Contextual Integrity, 2019-08-19 - 2019-08-20. (In Press)

Shah, Ryan and Nagaraja, Shishir; (2019) Poster : Unified access control for surgical robotics. In: SACMAT '19, Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM, CAN, pp. 231-233. ISBN 9781450367530

Shah, Ryan and Nagaraja, Shishir (2019) An access control model for robot calibration. Preprint / Working Paper. arXiv.org, Ithica, N.Y..

Nagaraja, Shishir and Shah, Ryan; (2019) Clicktok : click fraud detection using traffic analysis. In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. ACM, New York, NY., pp. 105-116. ISBN 9781450367264

Shah, Ryan and Nagaraja, Shishir; (2019) Do we have the time for IRM? : Service denial attacks and SDN-based defences. In: ICDCN 2019 - Proceedings of the 2019 International Conference on Distributed Computing and Networking. Association for Computing Machinery, IND, pp. 496-501. ISBN 9781450360944

2017

Biswas, Arnab Kumar and Ghosal, Dipak and Nagaraja, Shishir (2017) A survey of timing channels and countermeasures. ACM Computing Surveys, 50 (1). 6. ISSN 1557-7341

2016

Gardiner, Joseph and Nagaraja, Shishir (2016) On the security of machine learning in malware C&C detection : a survey. ACM Computing Surveys, 49 (3). 59. ISSN 1557-7341

2014

Gardiner, Joseph and Nagaraja, Shishir (2014) Blindspot : indistinguishable anonymous communications. Preprint / Working Paper. arXiv.org, Ithaca, N.Y..

2006

Nagaraja, Shishir and Anderson, Ross (2006) The topology of covert conflict. In: 5th Annual Workshop on the Economics of Information Security, 2006-06-26 - 2006-06-28.

This list was generated on Sun Oct 2 13:17:26 2022 BST.