Select Publications
Book Chapters
2022, 'Tracking and personalization', in Modern Socio-Technical Perspectives on Privacy, pp. 171 - 202, http://dx.doi.org/10.1007/978-3-030-82786-1_9
,2014, 'Access Control As a Service in Cloud: Challenges, Impact and Strategies', in Computer Communications and Networks, Springer London, pp. 55 - 99, http://dx.doi.org/10.1007/978-1-4471-6452-4_3
,2014, 'Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing', in Computer Communications and Networks, Springer International Publishing, pp. 297 - 324, http://dx.doi.org/10.1007/978-3-319-10530-7_13
,Journal articles
2024, 'A Comprehensive Threat Modelling Analysis for Distributed Energy Resources', ACM Transactions on Cyber-Physical Systems, 8, pp. 1 - 32, http://dx.doi.org/10.1145/3678260
,2024, 'Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics', IEEE Internet of Things Journal, 11, pp. 27303 - 27321, http://dx.doi.org/10.1109/JIOT.2024.3401101
,2023, 'Don't Be a Victim during a Pandemic! Analysing Security and Privacy Threats in Twitter during COVID-19', IEEE Access, 11, pp. 29769 - 29789, http://dx.doi.org/10.1109/ACCESS.2023.3260643
,2021, 'A review of computer vision methods in network security', IEEE Communications Surveys and Tutorials, 23, pp. 1838 - 1878, http://dx.doi.org/10.1109/COMST.2021.3086475
,2020, 'Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading', ACM Transactions on Privacy and Security, 23, http://dx.doi.org/10.1145/3380466
,2018, 'Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking', Proceedings on Privacy Enhancing Technologies, 2018, pp. 122 - 142, http://dx.doi.org/10.1515/popets-2018-0016
,2018, 'CRESCENT+: a self-protecting framework for reliable composite web service delivery', Iran Journal of Computer Science, 1, pp. 65 - 87, http://dx.doi.org/10.1007/s42044-018-0008-3
,2017, 'EACF: extensible access control framework for cloud environments', Annales des Telecommunications/Annals of Telecommunications, 72, pp. 307 - 323, http://dx.doi.org/10.1007/s12243-016-0548-1
,2016, 'DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases', Eurasip Journal on Information Security, 2016, http://dx.doi.org/10.1186/s13635-016-0040-5
,2015, 'Taxonomy for trust models in cloud computing', Computer Journal, 58, pp. 601 - 626, http://dx.doi.org/10.1093/comjnl/bxu138
,2015, 'MagicNET: Mobile agents data protection system', Transactions on Emerging Telecommunications Technologies, 26, pp. 813 - 835, http://dx.doi.org/10.1002/ett.2742
,2015, 'Cloud authorization: exploring techniques and approach towards effective access control framework', Frontiers of Computer Science, 9, pp. 297 - 321, http://dx.doi.org/10.1007/s11704-014-3160-4
,2014, 'Cloud identity management security issues & solutions: a taxonomy', Complex Adaptive Systems Modeling, 2, http://dx.doi.org/10.1186/s40294-014-0005-9
,Conference Papers
2024, 'Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach', in 2024 IEEE 49th Conference on Local Computer Networks (LCN), IEEE, pp. 1 - 9, presented at 2024 IEEE 49th Conference on Local Computer Networks (LCN), 08 October 2024 - 10 October 2024, http://dx.doi.org/10.1109/lcn60385.2024.10639764
,2024, 'DEMO : Passive Identification of WiFi Devices in Real-Time', in SIGCOMM Posters and Demos 2024 - Proceedings of the 2024 SIGCOMM Poster and Demo Sessions, Part of: SIGCOMM 2024, pp. 92 - 94, http://dx.doi.org/10.1145/3672202.3673716
,2024, 'Privacy Preserving Release of Mobile Sensor Data', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3664476.3664519
,2024, 'SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations', in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1784 - 1800, http://dx.doi.org/10.1145/3634737.3644998
,2023, 'Towards Automatic Annotation and Detection of Fake News', in Proceedings - Conference on Local Computer Networks, LCN, http://dx.doi.org/10.1109/LCN58197.2023.10223359
,2020, 'Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps', in Proceedings - Conference on Local Computer Networks, LCN, pp. 381 - 384, http://dx.doi.org/10.1109/LCN48667.2020.9314784
,2019, 'The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading', in Proceeding WWW '19 The World Wide Web Conference, ACM, San Francisco, USA, pp. 2851 - 2857, presented at WWW 2019, San Francisco, USA, 13 May 2019 - 17 May 2018, http://dx.doi.org/10.1145/3308558.3313521
,2018, 'Incognito: A Method for Obfuscating Web Data', in Incognito: A Method for Obfuscating Web Data, Association for Computing Machinery (ACM), Lyon, France, presented at WWW TheWebConf 2018, Lyon, France, 23 April 2018 - 27 April 2018, http://dx.doi.org/10.1145/3178876.3186093
,2017, 'Poster: Touchtrack: How unique are your touch gestures?', in Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, USA, pp. 2555 - 2557, presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, 30 October 2017 - 03 November 2017, http://dx.doi.org/10.1145/3133956.3138850
,2016, 'Distributed intrusion detection system using mobile agents in cloud computing environment', in Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2015.7395559
,2015, 'Realization of FGAC model using XACML policy specification', in 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings, http://dx.doi.org/10.1109/SNPD.2015.7176199
,2015, 'Secure identity management system for federated Cloud environment', in Studies in Computational Intelligence, pp. 17 - 33, http://dx.doi.org/10.1007/978-3-319-10389-1_2
,2014, 'Evaluation and establishment of trust in cloud federation', in Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014, http://dx.doi.org/10.1145/2557977.2558023
,2014, 'Fine-grained access control in object-oriented databases', in Lecture Notes in Electrical Engineering, pp. 133 - 138, http://dx.doi.org/10.1007/978-3-642-40861-8_20
,2014, 'Security of sharded NoSQL databases: A comparative analysis', in Conference Proceedings - 2014 Conference on Information Assurance and Cyber Security, CIACS 2014, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2014.6861323
,2013, 'Assessment criteria for trust models in cloud computing', in Proceedings - 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, pp. 254 - 261, http://dx.doi.org/10.1109/GreenCom-iThings-CPSCom.2013.61
,2013, 'Securing the virtual machine images in Cloud computing', in SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, pp. 425 - 428, http://dx.doi.org/10.1145/2523514.2523576
,2013, 'Security aspects of virtualization in cloud computing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 229 - 240, http://dx.doi.org/10.1007/978-3-642-40925-7_22
,2013, 'Assessment criteria for cloud identity management systems', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp. 188 - 195, http://dx.doi.org/10.1109/PRDC.2013.39
,2013, 'Intrusion detection system in cloud computing: Challenges and opportunities', in Conference Proceedings - 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 59 - 66, http://dx.doi.org/10.1109/NCIA.2013.6725325
,2012, 'Comparative analysis of access control systems on cloud', in Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012, pp. 41 - 46, http://dx.doi.org/10.1109/SNPD.2012.33
,2012, 'Usage control model specification in XACML policy language XACML policy engine of UCON', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 68 - 79, http://dx.doi.org/10.1007/978-3-642-33260-9_5
,2011, 'SWAM: Stuxnet worm analysis in Metasploit', in Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011, pp. 142 - 147, http://dx.doi.org/10.1109/FIT.2011.34
,Preprints
2024, BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning, http://dx.doi.org/10.48550/arxiv.2402.03740
,2023, False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations, http://dx.doi.org/10.48550/arxiv.2308.12497
,2023, Usability of Privacy Controls in Top Health Websites, http://dx.doi.org/10.48550/arxiv.2303.01838
,2022, Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News, http://arxiv.org/abs/2209.03162v1
,2022, FLAP: Federated Learning with Attack and Privacy Awareness, http://dx.doi.org/10.36227/techrxiv.19766023
,2022, Privacy Preserving Release of Mobile Sensor Data, http://dx.doi.org/10.48550/arxiv.2205.06641
,2022, A Study of Third-party Resources Loading on Web, http://dx.doi.org/10.48550/arxiv.2203.03077
,2022, Don't be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19, http://dx.doi.org/10.48550/arxiv.2202.10543
,2020, Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps, http://dx.doi.org/10.48550/arxiv.2007.03905
,2020, A Review of Computer Vision Methods in Network Security, http://dx.doi.org/10.48550/arxiv.2005.03318
,2019, The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading, http://dx.doi.org/10.48550/arxiv.1901.07699
,