Shishir Nagaraja
Shishir Nagaraja
Verified email at strath.ac.uk - Homepage
TitleCited byYear
BotGrep: Finding P2P Bots with Structured Graph Analysis.
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
USENIX Security Symposium 10, 95-110, 2010
2432010
Stegobot: a covert social network botnet
S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ...
International Workshop on Information Hiding, 299-313, 2011
912011
New strategies for revocation in ad-hoc networks
T Moore, J Clulow, S Nagaraja, R Anderson
European Workshop on Security in Ad-hoc and Sensor Networks, 232-246, 2007
772007
Topology of covert conflict
S Nagaraja
International Workshop on Security Protocols, 329-332, 2005
622005
On the security of machine learning in malware c&c detection: A survey
J Gardiner, S Nagaraja
ACM Computing Surveys (CSUR) 49 (3), 59, 2016
482016
The snooping dragon: social-malware surveillance of the Tibetan movement
S Nagaraja, R Anderson
University of Cambridge, Computer Laboratory, 2009
482009
Anonymity in the wild: Mixes on unstructured networks
S Nagaraja
International Workshop on Privacy Enhancing Technologies, 254-271, 2007
452007
Incentives and information security
R Anderson, T Moore, S Nagaraja, A Ozment
Algorithmic Game Theory, 633-649, 2007
352007
A survey of timing channels and countermeasures
AK Biswas, D Ghosal, S Nagaraja
ACM Computing Surveys (CSUR) 50 (1), 6, 2017
292017
Method and system for enhancing network security using a multilateral authorization mechanism
HS Madhusudhana, S Nagaraj, A Tripathi
US Patent 7,136,489, 2006
212006
Evaluation framework of location privacy of wireless mobile systems with arbitrary beam pattern
FL Wong, M Lin, S Nagaraja, I Wassell, F Stajano
Fifth Annual Conference on Communication Networks and Services Research …, 2007
162007
Botyacc: unified p2p botnet detection using behavioural analysis and graph analysis
S Nagaraja
European Symposium on Research in Computer Security, 439-456, 2014
132014
P3CA: Private anomaly detection across ISP networks
S Nagaraja, V Jalaparti, M Caesar, N Borisov
International Symposium on Privacy Enhancing Technologies Symposium, 38-56, 2011
132011
BotSpot: fast graph based identification of structured P2P bots
B Venkatesh, SH Choudhury, S Nagaraja, N Balakrishnan
Journal of Computer Virology and Hacking Techniques 11 (4), 247-261, 2015
102015
The impact of unlinkability on adversarial community detection: effects and countermeasures
S Nagaraja
International Symposium on Privacy Enhancing Technologies Symposium, 253-272, 2010
72010
Dynamic topologies for robust scale-free networks
S Nagaraja, R Anderson
Workshop on Bio-Inspired Design of Networks, 411-426, 2007
72007
Method and system for automatically grouping objects in a directory system based on their access patterns
UVSR Kiran, S Nagaraja
US Patent 6,996,577, 2006
72006
BotGrep: finding bots with structured graph analysis
S Nagaraja, P Mittal, C Hong, M Caesar, N Borisov
Usenix Security 10, 2000
72000
On the reliability of network measurement techniques used for malware traffic analysis
J Gardiner, S Nagaraja
Cambridge International Workshop on Security Protocols, 321-333, 2014
62014
Method and system for managing network resources based on a dynamic quorum
S Nagaraj, N Sirisilla, HS Madhusudhana
US Patent 8,285,825, 2012
62012
The system can't perform the operation now. Try again later.
Articles 1–20