{BotGrep}: Finding {P2P} Bots with Structured Graph Analysis S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov 19th USENIX Security Symposium (USENIX Security 10), 2010 | 349 | 2010 |
On the security of machine learning in malware c&c detection: A survey J Gardiner, S Nagaraja ACM Computing Surveys (CSUR) 49 (3), 1-39, 2016 | 160 | 2016 |
Stegobot: a covert social network botnet S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ... Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011 | 141 | 2011 |
Method and system for managing network resources based on a dynamic quorum S Nagaraj, N Sirisilla, HS Madhusudhana US Patent 8,285,825, 2012 | 99 | 2012 |
A survey of timing channels and countermeasures AK Biswas, D Ghosal, S Nagaraja ACM Computing Surveys (CSUR) 50 (1), 1-39, 2017 | 86 | 2017 |
New strategies for revocation in ad-hoc networks T Moore, J Clulow, S Nagaraja, R Anderson Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop …, 2007 | 81 | 2007 |
The impact of unlinkability on adversarial community detection: Effects and countermeasures S Nagaraja International Symposium on Privacy Enhancing Technologies Symposium, 253-272, 2010 | 58 | 2010 |
The snooping dragon: social-malware surveillance of the Tibetan movement S Nagaraja, R Anderson University of Cambridge, Computer Laboratory, 2009 | 58 | 2009 |
Topology of Covert Conflict: (Transcript of Discussion) S Nagaraja International Workshop on Security Protocols, 329-332, 2005 | 57 | 2005 |
Anonymity in the wild: Mixes on unstructured networks S Nagaraja International workshop on privacy enhancing technologies, 254-271, 2007 | 51 | 2007 |
Clicktok: Click fraud detection using traffic analysis S Nagaraja, R Shah Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 47 | 2019 |
Incentives and information security R Anderson, T Moore, S Nagaraja, A Ozment Algorithmic Game Theory, 633-649, 2007 | 42 | 2007 |
Method and system for enhancing network security using a multilateral authorization mechanism HS Madhusudhana, S Nagaraj, A Tripathi US Patent 7,136,489, 2006 | 31 | 2006 |
BotSpot: fast graph based identification of structured P2P bots B Venkatesh, SH Choudhury, S Nagaraja, N Balakrishnan Journal of Computer Virology and Hacking Techniques 11, 247-261, 2015 | 25 | 2015 |
When is software a medical device? Understanding and determining the “intention” and requirements for software as a medical device in European Union Law K Ludvigsen, S Nagaraja, D Angela European Journal of Risk Regulation 13 (1), 78-93, 2022 | 20 | 2022 |
Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences J Gardiner, M Cova, S Nagaraja arXiv preprint arXiv:1408.1136, 2014 | 18 | 2014 |
Command & control: Understanding, denying and detecting J Gardiner, M Cova, S Nagaraja | 18 | 2014 |
P3CA: Private anomaly detection across ISP networks S Nagaraja, V Jalaparti, M Caesar, N Borisov International Symposium on Privacy Enhancing Technologies Symposium, 38-56, 2011 | 17 | 2011 |
Evaluation framework of location privacy of wireless mobile systems with arbitrary beam pattern FL Wong, M Lin, S Nagaraja, I Wassell, F Stajano Fifth Annual Conference on Communication Networks and Services Research …, 2007 | 17 | 2007 |
Botyacc: Unified p2p botnet detection using behavioural analysis and graph analysis S Nagaraja Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 13 | 2014 |