Clicktok: Click fraud detection using traffic analysis S Nagaraja, R Shah Proceedings of the 12th conference on security and privacy in wireless and …, 2019 | 52 | 2019 |
VoIPLoc: passive VoIP call provenance via acoustic side-channels S Nagaraja, R Shah Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 10* | 2021 |
Secure Calibration for Safety-Critical IoT: Traceability for Safety Resilience R Shah, M McIntee, S Nagaraja, S Bhandary, P Arote, J Kuri arXiv preprint arXiv:1908.00740, 2019 | 6* | 2019 |
Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia T Georgiou, L Baillie, R Shah arXiv preprint arXiv:2304.01617, 2023 | 4 | 2023 |
Privacy with surgical robotics: challenges in applying contextual privacy theory R Shah, S Nagaraja arXiv preprint arXiv:1909.01862, 2019 | 4 | 2019 |
Introducing and Interfacing with Cybersecurity--A Cards Approach R Shah, M Maarek, S Stals, L Baillie, SC Chan, R Stewart, HW Loidl, ... arXiv preprint arXiv:2307.16535, 2023 | 3 | 2023 |
Security landscape for robotics R Shah arXiv preprint arXiv:1904.03033, 2019 | 3 | 2019 |
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics S Stals, L Baillie, R Shah, JI Ferguson, M Maarek Computer Standards & Interfaces 92, 103924, 2025 | 2 | 2025 |
Evaluating serious slow game jams as a mechanism for co-designing serious games to improve understanding of cybersecurity S Stals, L Baillie, JI Ferguson, D Abbott, M Maarek, R Shah, S Louchart ACM Games: Research and Practice, 2025 | 2 | 2025 |
Sensor Identification via Acoustic Physically Unclonable Function G Vaidya, TV Prabhakar, N Gnani, R Shah, S Nagaraja Digital Threats: Research and Practice 4 (2), 1-25, 2023 | 2 | 2023 |
Reconstructing robot operations via radio-frequency side-channel R Shah, M Ahmed, S Nagaraja arXiv preprint arXiv:2209.10179, 2022 | 2 | 2022 |
Fingerprinting robot movements via acoustic side channel R Shah, M Ahmed, S Nagaraja arXiv preprint arXiv:2209.10240, 2022 | 2 | 2022 |
Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels R Shah, CM Ahmed, S Nagaraja arXiv preprint arXiv:2205.08426, 2022 | 2 | 2022 |
Can you still see me?: identifying robot operations over end-to-end encrypted channels R Shah, CM Ahmed, S Nagaraja Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 2 | 2022 |
A unified access control model for calibration traceability in safety-critical IoT R Shah, S Nagaraja Information Systems Security: 16th International Conference, ICISS 2020 …, 2020 | 1* | 2020 |
Poster: Unified access control for surgical robotics R Shah, S Nagaraja Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019 | 1 | 2019 |
Do we have the time for IRM? service denial attacks and SDN-based defences R Shah, S Nagaraja Proceedings of the 20th International Conference on Distributed Computing …, 2019 | 1 | 2019 |
Empower New Code Citizens to Reflect and Communicate on Code Security M Maarek, D Abbott, O Chatzifoti, R Shah, SC Chan, HW Loidl, RJ Stewart, ... IEEE Security & Privacy, 2025 | | 2025 |
Communicating Complex Decisions in Robot-Assisted Therapy C Bettosi, K Chen, R Shah, L Baillie https://arxiv.org/abs/2303.14054, 2023 | | 2023 |
Security of robotic workflows RK Shah | | 2022 |