On the economic significance of ransomware campaigns: A Bitcoin transactions perspective M Conti, A Gangwal, S Ruj Computers & Security 79, 162-189, 2018 | 195 | 2018 |
Improving password guessing via representation learning D Pasquini, A Gangwal, G Ateniese, M Bernaschi, M Conti 2021 IEEE Symposium on Security and Privacy (SP), 1382-1399, 2021 | 83 | 2021 |
A survey of Layer-two blockchain protocols A Gangwal, HR Gangavalli, A Thirupathi Journal of Network and Computer Applications 209, 103539, 2023 | 71 | 2023 |
A comprehensive and effective mechanism for DDoS detection in SDN M Conti, A Gangwal, MS Gaur 2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017 | 59 | 2017 |
The road ahead for networking: A survey on icn-ip coexistence solutions M Conti, A Gangwal, M Hassan, C Lal, E Losiouk IEEE Communications Surveys & Tutorials 22 (3), 2104-2129, 2020 | 47 | 2020 |
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages M Conti, A Gangwal, M Todero Proceedings of the 14th International Conference on Availability …, 2019 | 47 | 2019 |
Mind your wallet's privacy: identifying bitcoin wallet apps and user's actions through network traffic analysis F Aiolli, M Conti, A Gangwal, M Polato Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1484-1491, 2019 | 37 | 2019 |
Detecting covert cryptomining using hpc A Gangwal, SG Piazzetta, G Lain, M Conti Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020 | 29 | 2020 |
Cryptomining cannot change its spots: Detecting covert cryptomining using magnetic side-channel A Gangwal, M Conti IEEE Transactions on Information Forensics and Security 15, 1630-1639, 2019 | 21 | 2019 |
ELBA: Efficient layer based routing algorithm in SDN A Gangwal, M Gupta, MS Gaur, V Laxmi, M Conti 2016 25th International Conference on Computer Communication and Networks …, 2016 | 19 | 2016 |
Blocking intrusions at border using software defined-internet exchange point (SD-IXP) M Conti, A Gangwal 2017 IEEE Conference on Network Function Virtualization and Software Defined …, 2017 | 9 | 2017 |
Panorama: Real-time bird's eye view of an OpenFlow network A Gangwal, M Conti, MS Gaur 2017 IEEE 14th International Conference on Networking, Sensing and Control …, 2017 | 7 | 2017 |
Spot the difference: Your bucket is leaking: A novel methodology to expose A/B testing effortlessly M Conti, A Gangwal, SP Gochhayat, G Tolomei 2018 IEEE Conference on Communications and Network Security (CNS), 1-7, 2018 | 6 | 2018 |
Averages don’t characterise the heavy tails of ransoms É Leverett, E Jardine, E Burns, A Gangwal, D Geer 2020 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2020 | 5 | 2020 |
On the Exploitation of Online SMS Receiving Services to Forge ID Verification MH Berenjestanaki, M Conti, A Gangwal Proceedings of the 14th International Conference on Availability …, 2019 | 4 | 2019 |
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration A Gangwal, S Singh, R Spolaor, A Srivastava 27th European Symposium on Research in Computer Security (ESORICS), 698-717, 2022 | 2 | 2022 |
Bitcoin Blockchain System: An Overview of Security and Privacy Aspects M Conti, A Gangwal, C Lal, S Ruj Blockchains: A Handbook on Fundamentals, Platforms and Applications, 75-108, 2023 | 1 | 2023 |
AutoSpill: Credential Leakage from Mobile Password Managers A Gangwal, S Singh, A Srivastava Proceedings of the 13th ACM Conference on Data and Application Security and …, 2023 | 1 | 2023 |
On the Feasibility of Profiling Electric Vehicles through Charging Data A Gangwal, A Jain, M Conti 2023 Network and Distributed System Security Symposium (NDSS), 1-8, 2023 | 1 | 2023 |
Analyzing Price Deviations in DeFi Oracles A Gangwal, R Valluri, M Conti Proceedings of the 21st International Conference on Cryptology and Network …, 2022 | 1 | 2022 |