Select Publications
Books
2002, Engineering Internet QoS, Artech House, Boston
,Book Chapters
2021, 'Cooperative physical layer secret key generation by virtual link estimation', in Physical Layer Security, pp. 99 - 128, http://dx.doi.org/10.1007/978-3-030-55366-1_5
,2021, 'Secure device pairing protocol based on wireless channel characteristics for body area networks', in Physical Layer Security, pp. 151 - 179, http://dx.doi.org/10.1007/978-3-030-55366-1_7
,2019, 'Software-Defined Network (SDN) data plane security: Issues, solutions, and future directions', in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 341 - 387, http://dx.doi.org/10.1007/978-3-030-22277-2_14
,2008, 'Attacks and Security Mechanism', in Zhang Y; Zheng J; Ma M (ed.), Security in Wireless Mesh Networks, Auerbach Publications, pp. 111 - 144, http://www.crcpress.com/product/isbn/9780849382505
,2007, 'Node Localization Using Mobile Robots in delay-Tolerant Sensor Networks', in Poovendran R; Wang C; Roy S (ed.), Secure localization and time synchronization for wireless sensor and ac hoc networks, Springer Publishing Company, United States of America, pp. 83 - 102
,2004, 'Fair Queuing in Active and Programmable Networks', in Wysocki TA; Dadje A; Wysocki BJ (ed.), Advanced wired and Wireless Networks Series, Springer Publishing Company, New York, pp. 247 - 264
,2004, 'TCP/IP Fundamentals', in Hassan M; Jain R (ed.), High Performance TCP/IP Networking Concepts, Issues and Solutions, Pearson Prentice Hall, New Jersey, pp. 12 - 31
,2003, 'Location management in mobile wireless networks', in Wireless Internet Handbook: Technologies, Standards, and Applications, pp. 351 - 380, http://dx.doi.org/10.1201/9780203011690
,2002, 'Voice over IP: Protocols and Technical Hurdles', in Theoharakis V; Serpanos D (ed.), Enterprise Networking: Multilayer Switching and Applications, Idea Group Publishing, Hershey, PA, USA, pp. 123 - 143
,1997, 'Playout management of interactive video — an adaptive approach', in Building QoS into Distributed Systems, Springer US, pp. 149 - 160, http://dx.doi.org/10.1007/978-0-387-35170-4_16
,Edited Books
Bulusu N; Jha S, (ed.), 2005, Wireless sensor network systems: a systems perspective, Artech House, Norwood, MA
Journal articles
2024, 'A Comprehensive Threat Modelling Analysis for Distributed Energy Resources', ACM Transactions on Cyber-Physical Systems, http://dx.doi.org/10.1145/3678260
,2024, 'Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts on the Australian Grid', IEEE Transactions on Smart Grid, 15, pp. 5139 - 5150, http://dx.doi.org/10.1109/TSG.2024.3393439
,2024, 'Exploring Uncharted Waters of Website Fingerprinting', IEEE Transactions on Information Forensics and Security, 19, pp. 1840 - 1854, http://dx.doi.org/10.1109/TIFS.2023.3342607
,2024, 'Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis', IEEE Transactions on Information Forensics and Security, 19, pp. 9173 - 9187, http://dx.doi.org/10.1109/TIFS.2024.3468150
,2024, 'Towards Energy Efficient Wireless Sensing by Leveraging Ambient Wi-Fi Traffic †', Energies, 17, http://dx.doi.org/10.3390/en17020485
,2024, 'USAT: A Universal Speaker-Adaptive Text-to-Speech Approach', IEEE/ACM Transactions on Audio Speech and Language Processing, 32, pp. 2590 - 2604, http://dx.doi.org/10.1109/TASLP.2024.3393714
,2023, 'Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification', IEEE Access, 11, pp. 70011 - 70022, http://dx.doi.org/10.1109/ACCESS.2023.3293526
,2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193, http://dx.doi.org/10.1016/j.future.2022.02.014
,2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356
,2022, 'WIDE: A witness-based data priority mechanism for vehicular forensics', Blockchain: Research and Applications, 3, http://dx.doi.org/10.1016/j.bcra.2021.100050
,2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering, http://dx.doi.org/10.1109/TNSE.2022.3165528
,2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188
,2022, 'PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool', IEEE Transactions on Information Forensics and Security, 17, pp. 1497 - 1512, http://dx.doi.org/10.1109/TIFS.2022.3164212
,2021, 'Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things', IEEE Transactions on Mobile Computing, 20, pp. 3049 - 3065, http://dx.doi.org/10.1109/TMC.2020.2992737
,2021, 'Man versus Machine: AutoML and Human Experts' Role in Phishing Detection', , http://arxiv.org/abs/2108.12193v1
,2021, 'DIMY: Enabling Privacy-preserving Contact Tracing', , http://arxiv.org/abs/2103.05873v1
,2021, 'B-FERL: Blockchain based framework for securing smart vehicles', Information Processing and Management, 58, http://dx.doi.org/10.1016/j.ipm.2020.102426
,2021, 'De-Anonymisation Attacks on Tor: A Survey', IEEE Communications Surveys and Tutorials, 23, pp. 2324 - 2350, http://dx.doi.org/10.1109/COMST.2021.3093615
,2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226
,2020, 'Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings', IEEE Internet of Things Journal, 7, pp. 298 - 310, http://dx.doi.org/10.1109/JIOT.2019.2946900
,2020, 'A Survey of COVID-19 Contact Tracing Apps.', ARXIV, 2006.10306, https://arxiv.org/abs/2006.10306
,2019, 'Light weight and fine-grained access mechanism for secure access to outsourced data*', Concurrency and Computation: Practice and Experience, 31, http://dx.doi.org/10.1002/cpe.4736
,2019, 'Analyzing XACML policies using answer set programming', International Journal of Information Security, 18, pp. 465 - 479, http://dx.doi.org/10.1007/s10207-018-0421-5
,2019, 'LoRa-Key: Secure Key Generation System for LoRa-Based Network', IEEE Internet of Things Journal, 6, pp. 6404 - 6416, http://dx.doi.org/10.1109/JIOT.2018.2888553
,2019, 'The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings', IEEE Internet of Things Journal, 6, pp. 7266 - 7281, http://dx.doi.org/10.1109/JIOT.2019.2915952
,2019, 'Long-term secure management of large scale Internet of Things applications', Journal of Network and Computer Applications, 138, pp. 15 - 26, http://dx.doi.org/10.1016/j.jnca.2019.04.015
,2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting', IEEE Transactions on Mobile Computing, 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
,2019, 'MTRA: Multi-Tier randomized remote attestation in IoT networks', Computers and Security, 81, pp. 78 - 93, http://dx.doi.org/10.1016/j.cose.2018.10.008
,2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.', IEEE Trans. Mob. Comput., 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
,2018, 'SEDA: Secure over-the-air code dissemination protocol for the internet of things', IEEE Transactions on Dependable and Secure Computing, 15, pp. 1041 - 1054, http://dx.doi.org/10.1109/TDSC.2016.2639503
,2018, 'Light Weight Write Mechanism for Cloud Data', IEEE Transactions on Parallel and Distributed Systems, 29, pp. 1131 - 1146, http://dx.doi.org/10.1109/TPDS.2017.2782253
,2017, 'Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks', IEEE Transactions on Mobile Computing, 16, pp. 3431 - 3444, http://dx.doi.org/10.1109/TMC.2017.2691706
,2017, 'Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables', IEEE Transactions on Information Forensics and Security, 12, pp. 2467 - 2482, http://dx.doi.org/10.1109/TIFS.2017.2708690
,2016, 'Sparsity based Efficient Cross-Correlation Techniques in Sensor Networks', IEEE Transactions on Mobile Computing, http://dx.doi.org/10.1109/TMC.2016.2605689
,2016, 'Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna', Pervasive and Mobile Computing, 30, pp. 151 - 165, http://dx.doi.org/10.1016/j.pmcj.2016.01.005
,2016, 'Energy-efficient cooperative relaying for unmanned aerial vehicles', IEEE Transactions on Mobile Computing, 15, pp. 1377 - 1386, http://dx.doi.org/10.1109/TMC.2015.2467381
,2016, 'On the importance of link characterization for aerial wireless sensor networks', IEEE Communications Magazine, 54, pp. 52 - 57, http://dx.doi.org/10.1109/MCOM.2016.7470935
,2015, 'Interdependent Security Risk Analysis of Hosts and Flows', IEEE Transactions on Information Forensics and Security, 10, pp. 2325 - 2339, http://dx.doi.org/10.1109/TIFS.2015.2455414
,