Select Publications
Conference Papers
2024, 'Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach', in 2024 IEEE 49th Conference on Local Computer Networks (LCN), IEEE, pp. 1 - 9, presented at 2024 IEEE 49th Conference on Local Computer Networks (LCN), 08 October 2024 - 10 October 2024, http://dx.doi.org/10.1109/lcn60385.2024.10639764
,2024, 'DEMO : Passive Identification of WiFi Devices in Real-Time', in SIGCOMM Posters and Demos 2024 - Proceedings of the 2024 SIGCOMM Poster and Demo Sessions, Part of: SIGCOMM 2024, pp. 92 - 94, http://dx.doi.org/10.1145/3672202.3673716
,2024, 'Privacy Preserving Release of Mobile Sensor Data', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3664476.3664519
,2024, 'SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations', in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1784 - 1800, http://dx.doi.org/10.1145/3634737.3644998
,2023, 'Towards Automatic Annotation and Detection of Fake News', in Proceedings - Conference on Local Computer Networks, LCN, http://dx.doi.org/10.1109/LCN58197.2023.10223359
,2020, 'Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps', in Proceedings - Conference on Local Computer Networks, LCN, pp. 381 - 384, http://dx.doi.org/10.1109/LCN48667.2020.9314784
,2019, 'The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading', in Proceeding WWW '19 The World Wide Web Conference, ACM, San Francisco, USA, pp. 2851 - 2857, presented at WWW 2019, San Francisco, USA, 13 May 2019 - 17 May 2018, http://dx.doi.org/10.1145/3308558.3313521
,2018, 'Incognito: A Method for Obfuscating Web Data', in Incognito: A Method for Obfuscating Web Data, Association for Computing Machinery (ACM), Lyon, France, presented at WWW TheWebConf 2018, Lyon, France, 23 April 2018 - 27 April 2018, http://dx.doi.org/10.1145/3178876.3186093
,2017, 'Poster: Touchtrack: How unique are your touch gestures?', in Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, USA, pp. 2555 - 2557, presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, 30 October 2017 - 03 November 2017, http://dx.doi.org/10.1145/3133956.3138850
,2016, 'Distributed intrusion detection system using mobile agents in cloud computing environment', in Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2015.7395559
,2015, 'Realization of FGAC model using XACML policy specification', in 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings, http://dx.doi.org/10.1109/SNPD.2015.7176199
,2015, 'Secure identity management system for federated Cloud environment', in Studies in Computational Intelligence, pp. 17 - 33, http://dx.doi.org/10.1007/978-3-319-10389-1_2
,2014, 'Evaluation and establishment of trust in cloud federation', in Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014, http://dx.doi.org/10.1145/2557977.2558023
,2014, 'Fine-grained access control in object-oriented databases', in Lecture Notes in Electrical Engineering, pp. 133 - 138, http://dx.doi.org/10.1007/978-3-642-40861-8_20
,2014, 'Security of sharded NoSQL databases: A comparative analysis', in Conference Proceedings - 2014 Conference on Information Assurance and Cyber Security, CIACS 2014, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2014.6861323
,2013, 'Assessment criteria for trust models in cloud computing', in Proceedings - 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, pp. 254 - 261, http://dx.doi.org/10.1109/GreenCom-iThings-CPSCom.2013.61
,2013, 'Securing the virtual machine images in Cloud computing', in SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, pp. 425 - 428, http://dx.doi.org/10.1145/2523514.2523576
,2013, 'Security aspects of virtualization in cloud computing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 229 - 240, http://dx.doi.org/10.1007/978-3-642-40925-7_22
,2013, 'Assessment criteria for cloud identity management systems', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp. 188 - 195, http://dx.doi.org/10.1109/PRDC.2013.39
,2013, 'Intrusion detection system in cloud computing: Challenges and opportunities', in Conference Proceedings - 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 59 - 66, http://dx.doi.org/10.1109/NCIA.2013.6725325
,2012, 'Comparative analysis of access control systems on cloud', in Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012, pp. 41 - 46, http://dx.doi.org/10.1109/SNPD.2012.33
,2012, 'Usage control model specification in XACML policy language XACML policy engine of UCON', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 68 - 79, http://dx.doi.org/10.1007/978-3-642-33260-9_5
,2011, 'SWAM: Stuxnet worm analysis in Metasploit', in Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011, pp. 142 - 147, http://dx.doi.org/10.1109/FIT.2011.34
,