Select Publications

Books

Jha SK; Hassan M, 2002, Engineering Internet QoS, Artech House, Boston

Book Chapters

Javali C; Revadigar G; Ding M; Lin Z; Jha S, 2021, 'Cooperative physical layer secret key generation by virtual link estimation', in Physical Layer Security, pp. 99 - 128, http://dx.doi.org/10.1007/978-3-030-55366-1_5

Javali C; Revadigar G; Libman L; Ding M; Lin Z; Jha S, 2021, 'Secure device pairing protocol based on wireless channel characteristics for body area networks', in Physical Layer Security, pp. 151 - 179, http://dx.doi.org/10.1007/978-3-030-55366-1_7

Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2019, 'Software-Defined Network (SDN) data plane security: Issues, solutions, and future directions', in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 341 - 387, http://dx.doi.org/10.1007/978-3-030-22277-2_14

Naveed A; Kanhere S; Jha SK, 2008, 'Attacks and Security Mechanism', in Zhang Y; Zheng J; Ma M (ed.), Security in Wireless Mesh Networks, Auerbach Publications, pp. 111 - 144, http://www.crcpress.com/product/isbn/9780849382505

Savkin AV; Pathirana PN; Bulusu N; Jha SK; Dang TX, 2007, 'Node Localization Using Mobile Robots in delay-Tolerant Sensor Networks', in Poovendran R; Wang C; Roy S (ed.), Secure localization and time synchronization for wireless sensor and ac hoc networks, Springer Publishing Company, United States of America, pp. 83 - 102

Sabrina F; Jha SK, 2004, 'Fair Queuing in Active and Programmable Networks', in Wysocki TA; Dadje A; Wysocki BJ (ed.), Advanced wired and Wireless Networks Series, Springer Publishing Company, New York, pp. 247 - 264

Jha SK, 2004, 'TCP/IP Fundamentals', in Hassan M; Jain R (ed.), High Performance TCP/IP Networking Concepts, Issues and Solutions, Pearson Prentice Hall, New Jersey, pp. 12 - 31

Mukherjee A; Saha D; Jha S, 2003, 'Location management in mobile wireless networks', in Wireless Internet Handbook: Technologies, Standards, and Applications, pp. 351 - 380, http://dx.doi.org/10.1201/9780203011690

Hassan M; Jha SK, 2002, 'Voice over IP: Protocols and Technical Hurdles', in Theoharakis V; Serpanos D (ed.), Enterprise Networking: Multilayer Switching and Applications, Idea Group Publishing, Hershey, PA, USA, pp. 123 - 143

Jha SK; Wright PA; Fry M, 1997, 'Playout management of interactive video — an adaptive approach', in Building QoS into Distributed Systems, Springer US, pp. 149 - 160, http://dx.doi.org/10.1007/978-0-387-35170-4_16

Edited Books

Bulusu N; Jha S, (ed.), 2005, Wireless sensor network systems: a systems perspective, Artech House, Norwood, MA

Journal articles

Bhaskar N; Ahmed J; Masood R; Ahmed N; Kerr S; Jha SK, 2024, 'A Comprehensive Threat Modelling Analysis for Distributed Energy Resources', ACM Transactions on Cyber-Physical Systems, http://dx.doi.org/10.1145/3678260

Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Kerr S; Jha S, 2024, 'Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts on the Australian Grid', IEEE Transactions on Smart Grid, 15, pp. 5139 - 5150, http://dx.doi.org/10.1109/TSG.2024.3393439

Karunanayake I; Jiang J; Ahmed N; Jha SK, 2024, 'Exploring Uncharted Waters of Website Fingerprinting', IEEE Transactions on Information Forensics and Security, 19, pp. 1840 - 1854, http://dx.doi.org/10.1109/TIFS.2023.3342607

Zaman Z; Xue W; Gauravaram P; Hu W; Jiang J; Jha S, 2024, 'Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3468150

Sharma A; Li J; Mishra D; Jha S; Seneviratne A, 2024, 'Towards Energy Efficient Wireless Sensing by Leveraging Ambient Wi-Fi Traffic †', Energies, 17, http://dx.doi.org/10.3390/en17020485

Wang W; Song Y; Jha S, 2024, 'USAT: A Universal Speaker-Adaptive Text-to-Speech Approach', IEEE/ACM Transactions on Audio Speech and Language Processing, 32, pp. 2590 - 2604, http://dx.doi.org/10.1109/TASLP.2024.3393714

Karunanayake I; Ahmed N; Malaney R; Islam R; Jha SK, 2023, 'Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification', IEEE Access, 11, pp. 70011 - 70022, http://dx.doi.org/10.1109/ACCESS.2023.3293526

Maroof U; Shaghaghi A; Michelin R; Jha S, 2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193, http://dx.doi.org/10.1016/j.future.2022.02.014

Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356

Oham C; Michelin RA; Jurdak R; Kanhere SS; Jha S, 2022, 'WIDE: A witness-based data priority mechanism for vehicular forensics', Blockchain: Research and Applications, 3, http://dx.doi.org/10.1016/j.bcra.2021.100050

Jiang J, 2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering, http://dx.doi.org/10.1109/TNSE.2022.3165528

Ma S; Li J; Nepal S; Ostry D; Lo D; Jha SK; Deng RH; Bertino E, 2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188

Purwanto RW; Pal A; Blair A; Jha S, 2022, 'PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool', IEEE Transactions on Information Forensics and Security, 17, pp. 1497 - 1512, http://dx.doi.org/10.1109/TIFS.2022.3164212

Xue W; Luo C; Shen Y; Rana R; Lan G; Jha S; Seneviratne A; Hu W, 2021, 'Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things', IEEE Transactions on Mobile Computing, 20, pp. 3049 - 3065, http://dx.doi.org/10.1109/TMC.2020.2992737

Purwanto R; Pal A; Blair A; Jha S, 2021, 'Man versus Machine: AutoML and Human Experts' Role in Phishing Detection', , http://arxiv.org/abs/2108.12193v1

Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, 'DIMY: Enabling Privacy-preserving Contact Tracing', , http://arxiv.org/abs/2103.05873v1

Oham C; Michelin RA; Jurdak R; Kanhere SS; Jha S, 2021, 'B-FERL: Blockchain based framework for securing smart vehicles', Information Processing and Management, 58, http://dx.doi.org/10.1016/j.ipm.2020.102426

Karunanayake I; Ahmed N; Malaney R; Islam R; Jha SK, 2021, 'De-Anonymisation Attacks on Tor: A Survey', IEEE Communications Surveys and Tutorials, 23, pp. 2324 - 2350, http://dx.doi.org/10.1109/COMST.2021.3093615

Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226

Xu W; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2020, 'Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings', IEEE Internet of Things Journal, 7, pp. 298 - 310, http://dx.doi.org/10.1109/JIOT.2019.2946900

Ahmed N; Michelin RA; Xue W; Ruj S; Malaney RA; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps.', ARXIV, 2006.10306, https://arxiv.org/abs/2006.10306

Jahan M; Seneviratne S; Roy PS; Sakurai K; Seneviratne A; Jha S, 2019, 'Light weight and fine-grained access mechanism for secure access to outsourced data*', Concurrency and Computation: Practice and Experience, 31, http://dx.doi.org/10.1002/cpe.4736

Rezvani M; Rajaratnam D; Ignjatovic A; Pagnucco M; Jha S, 2019, 'Analyzing XACML policies using answer set programming', International Journal of Information Security, 18, pp. 465 - 479, http://dx.doi.org/10.1007/s10207-018-0421-5

Xu W; Jha S; Hu W, 2019, 'LoRa-Key: Secure Key Generation System for LoRa-Based Network', IEEE Internet of Things Journal, 6, pp. 6404 - 6416, http://dx.doi.org/10.1109/JIOT.2018.2888553

Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2019, 'The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings', IEEE Internet of Things Journal, 6, pp. 7266 - 7281, http://dx.doi.org/10.1109/JIOT.2019.2915952

Kim JY; Hu W; Sarkar D; Jha S, 2019, 'Long-term secure management of large scale Internet of Things applications', Journal of Network and Computer Applications, 138, pp. 15 - 26, http://dx.doi.org/10.1016/j.jnca.2019.04.015

Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting', IEEE Transactions on Mobile Computing, 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384

Tan H; Tsudik G; Jha S, 2019, 'MTRA: Multi-Tier randomized remote attestation in IoT networks', Computers and Security, 81, pp. 78 - 93, http://dx.doi.org/10.1016/j.cose.2018.10.008

Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.', IEEE Trans. Mob. Comput., 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384

Kim JY; Hu W; Shafagh H; Jha S, 2018, 'SEDA: Secure over-the-air code dissemination protocol for the internet of things', IEEE Transactions on Dependable and Secure Computing, 15, pp. 1041 - 1054, http://dx.doi.org/10.1109/TDSC.2016.2639503

Jahan M; Rezvani M; Zhao Q; Roy PS; Sakurai K; Seneviratne A; Jha S, 2018, 'Light Weight Write Mechanism for Cloud Data', IEEE Transactions on Parallel and Distributed Systems, 29, pp. 1131 - 1146, http://dx.doi.org/10.1109/TPDS.2017.2782253

Tu W; Sreenan CJ; Jha S; Zhang Q, 2017, 'Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks', IEEE Transactions on Mobile Computing, 16, pp. 3431 - 3444, http://dx.doi.org/10.1109/TMC.2017.2691706

Revadigar G; Javali C; Xu W; Vasilakos AV; Hu W; Jha S, 2017, 'Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables', IEEE Transactions on Information Forensics and Security, 12, pp. 2467 - 2482, http://dx.doi.org/10.1109/TIFS.2017.2708690

misra P; Hu W; jha S, 2016, 'Sparsity based Efficient Cross-Correlation Techniques in Sensor Networks', IEEE Transactions on Mobile Computing, http://dx.doi.org/10.1109/TMC.2016.2605689

Li K; Ahmed N; Kanhere SS; Jha S, 2016, 'Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna', Pervasive and Mobile Computing, 30, pp. 151 - 165, http://dx.doi.org/10.1016/j.pmcj.2016.01.005

Li K; Ni W; Wang X; Liu RP; Kanhere SS; Jha S, 2016, 'Energy-efficient cooperative relaying for unmanned aerial vehicles', IEEE Transactions on Mobile Computing, 15, pp. 1377 - 1386, http://dx.doi.org/10.1109/TMC.2015.2467381

Ahmed N; Kanhere SS; Jha S, 2016, 'On the importance of link characterization for aerial wireless sensor networks', IEEE Communications Magazine, 54, pp. 52 - 57, http://dx.doi.org/10.1109/MCOM.2016.7470935

Rezvani M; Sekulic V; Ignjatovic A; Bertino E; Jha S, 2015, 'Interdependent Security Risk Analysis of Hosts and Flows', IEEE Transactions on Information Forensics and Security, 10, pp. 2325 - 2339, http://dx.doi.org/10.1109/TIFS.2015.2455414


Back to profile page