ORCID as entered in ROS

Select Publications
Karunanayake I; Ahmed N; Malaney R; Islam R; Jha S, 2020, De-anonymisation attacks on Tor: A Survey, http://dx.doi.org/10.48550/arxiv.2009.13018
Liu J; Xu W; Jha S; Hu W, 2020, Nephalai: Towards LPWAN C-RAN with Physical Layer Compression, http://dx.doi.org/10.48550/arxiv.2008.02599
Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W; Misra P, 2020, A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases, http://dx.doi.org/10.48550/arxiv.2007.15906
Purwanto R; Pal A; Blair A; Jha S, 2020, PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites, http://dx.doi.org/10.48550/arxiv.2007.11955
Oham C; Michelin R; Kanhere SS; Jurdak R; Jha S, 2020, B-FERL: Blockchain based Framework for Securing Smart Vehicles, http://dx.doi.org/10.48550/arxiv.2007.10528
Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha S, 2020, A Survey of COVID-19 Contact Tracing Apps, http://dx.doi.org/10.48550/arxiv.2006.10306
Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, http://dx.doi.org/10.48550/arxiv.2005.07987
Michelin RA; Ahmed N; Kanhere SS; Seneviratne A; Jha S, 2019, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, http://dx.doi.org/10.48550/arxiv.1912.11044
Xu W; Kim JY; Huang W; Kanhere S; Jha S; Hu W, 2019, Measurement, Characterization and Modeling of LoRa Technology in Multi-floor Buildings, http://dx.doi.org/10.48550/arxiv.1909.03900
Oham C; Jurdak R; Jha S, 2019, Risk Analysis Study of Fully Autonomous Vehicle, http://dx.doi.org/10.48550/arxiv.1905.10910
Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, http://dx.doi.org/10.48550/arxiv.1809.06988
Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, http://dx.doi.org/10.48550/arxiv.1807.02593
Oham C; Jurdak R; Kanhere SS; Dorri A; Jha S, 2018, B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication, http://arxiv.org/abs/1806.06169v1
Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, http://dx.doi.org/10.48550/arxiv.1804.00262
Oham C; Kanhere SS; Jurdak R; Jha S, 2018, A Blockchain Based Liability Attribution Framework for Autonomous Vehicles, http://dx.doi.org/10.48550/arxiv.1802.05050
Shaghaghi A; Kaafar MA; Jha S, 2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, http://dx.doi.org/10.48550/arxiv.1708.05477
Shaghaghi A; Ali M; Kaafar ; Scott-Hayward S; Kanhere SS; Jha S, 2016, Towards Policy Enforcement Point as a Service (PEPS), http://dx.doi.org/10.48550/arxiv.1610.02526
Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2016, Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting, http://dx.doi.org/10.48550/arxiv.1603.02476
Boulis A; Jha SK, 2005, Editorial: Network management in new realms: Wireless sensor networks, John Wiley & Sons Ltd, http://dx.doi.org/10.1002/nem.569
Jha S; Hassanein H, 2004, Program committee chair's message for LCN2004
Dini P; Borcoci E; Negrescu C; Stanomir D; Banica I; Niculescu G (eds.), 2001, IEEE ICT 2001 Tutorials, Bucharest