Следене
Ryan Shah
Ryan Shah
Security Consultant, Sapphire
Потвърден имейл адрес: hw.ac.uk - Начална страница
Заглавие
Позовавания
Позовавания
Година
Clicktok: Click fraud detection using traffic analysis
S Nagaraja, R Shah
Proceedings of the 12th conference on security and privacy in wireless and …, 2019
522019
VoIPLoc: passive VoIP call provenance via acoustic side-channels
S Nagaraja, R Shah
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
10*2021
Secure Calibration for Safety-Critical IoT: Traceability for Safety Resilience
R Shah, M McIntee, S Nagaraja, S Bhandary, P Arote, J Kuri
arXiv preprint arXiv:1908.00740, 2019
6*2019
Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia
T Georgiou, L Baillie, R Shah
arXiv preprint arXiv:2304.01617, 2023
42023
Privacy with surgical robotics: challenges in applying contextual privacy theory
R Shah, S Nagaraja
arXiv preprint arXiv:1909.01862, 2019
42019
Introducing and Interfacing with Cybersecurity--A Cards Approach
R Shah, M Maarek, S Stals, L Baillie, SC Chan, R Stewart, HW Loidl, ...
arXiv preprint arXiv:2307.16535, 2023
32023
Security landscape for robotics
R Shah
arXiv preprint arXiv:1904.03033, 2019
32019
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics
S Stals, L Baillie, R Shah, JI Ferguson, M Maarek
Computer Standards & Interfaces 92, 103924, 2025
22025
Evaluating serious slow game jams as a mechanism for co-designing serious games to improve understanding of cybersecurity
S Stals, L Baillie, JI Ferguson, D Abbott, M Maarek, R Shah, S Louchart
ACM Games: Research and Practice, 2025
22025
Sensor Identification via Acoustic Physically Unclonable Function
G Vaidya, TV Prabhakar, N Gnani, R Shah, S Nagaraja
Digital Threats: Research and Practice 4 (2), 1-25, 2023
22023
Reconstructing robot operations via radio-frequency side-channel
R Shah, M Ahmed, S Nagaraja
arXiv preprint arXiv:2209.10179, 2022
22022
Fingerprinting robot movements via acoustic side channel
R Shah, M Ahmed, S Nagaraja
arXiv preprint arXiv:2209.10240, 2022
22022
Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels
R Shah, CM Ahmed, S Nagaraja
arXiv preprint arXiv:2205.08426, 2022
22022
Can you still see me?: identifying robot operations over end-to-end encrypted channels
R Shah, CM Ahmed, S Nagaraja
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022
22022
A unified access control model for calibration traceability in safety-critical IoT
R Shah, S Nagaraja
Information Systems Security: 16th International Conference, ICISS 2020 …, 2020
1*2020
Poster: Unified access control for surgical robotics
R Shah, S Nagaraja
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
12019
Do we have the time for IRM? service denial attacks and SDN-based defences
R Shah, S Nagaraja
Proceedings of the 20th International Conference on Distributed Computing …, 2019
12019
Empower New Code Citizens to Reflect and Communicate on Code Security
M Maarek, D Abbott, O Chatzifoti, R Shah, SC Chan, HW Loidl, RJ Stewart, ...
IEEE Security & Privacy, 2025
2025
Communicating Complex Decisions in Robot-Assisted Therapy
C Bettosi, K Chen, R Shah, L Baillie
https://arxiv.org/abs/2303.14054, 2023
2023
Security of robotic workflows
RK Shah
2022
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20