Select Publications

Conference Papers

Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2019, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings - Conference on Local Computer Networks, LCN, pp. 553 - 561, http://dx.doi.org/10.1109/LCN.2018.8638245

Oham C; Jurdak R; Kanhere SS; Dorri A; Jha S, 2018, 'B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication', in Proceedings - IEEE 2018 International Congress on Cybermatics: 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018, pp. 1171 - 1180, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00210

Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018, http://dx.doi.org/10.1109/NCA.2018.8548074

Abaid Z; Kaafar MA; Jha S, 2018, 'Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study', in 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, pp. 1 - 9, http://dx.doi.org/10.23919/IFIPNetworking.2017.8264866

Xu W; Jha S; Hu W, 2018, 'Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN', in Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 231 - 236, http://dx.doi.org/10.1109/TrustCom/BigDataSE.2018.00044

Tan H; Ostry D; Jha S, 2018, 'Exploiting multiple side channels for secret key agreement in wireless networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3154273.3154337

Tan H; Tsudik G; Jha S, 2017, 'MTRA: Multiple-tier remote attestation in IoT networks', in 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, pp. 1 - 9, presented at 2017 IEEE Conference, Las Vegas, NV, USA, 09 October 2017 - 11 October 2017, http://dx.doi.org/10.1109/CNS.2017.8228638

Abaid Z; Kaafar MA; Jha S, 2017, 'Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers', in 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171381

Jahan M; Seneviratne S; Chu B; Seneviratne A; Jha S, 2017, 'Privacy preserving data access scheme for IoT devices', in 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171357

Jahan M; Seneviratne S; Chu B; Seneviratne A; Jha S, 2017, 'Privacy Preserving Data Access Scheme for IoT Devices', in Gkoulalasdivanis A; Correia MP; Avresky DR (eds.), 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), IEEE, Cambridge, MA, pp. 217 - 226, presented at IEEE 16th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, 30 October 2017 - 01 November 2017, http://dx.doi.org/10.1109/NCA.2017.8171357

Jahan M; Seneviratne A; Jha S, 2017, 'Access Mechanism for Outsourced Data by Preserving Data Owner's Preference', in Proceedings - Conference on Local Computer Networks, LCN, Singapore, Singapore, pp. 611 - 614, presented at 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, Singapore, 09 October 2017 - 12 October 2017, http://dx.doi.org/10.1109/LCN.2017.55

Kim JY; Holz R; Hu W; Jha S, 2017, 'Automated analysis of secure internet of things protocols', in ACM International Conference Proceeding Series, Orlando, FL, USA, pp. 238 - 249, presented at ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 04 December 2017 - 08 December 2017, http://dx.doi.org/10.1145/3134600.3134624

Jahan M; Roy PS; Sakurai K; Seneviratne A; Jha S, 2017, 'Secure and light weight fine-grained access mechanism for outsourced data', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Sydney, NSW, Australia, pp. 201 - 209, presented at 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 01 August 2017 - 04 August 2017, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.238

Kim JY; Hu W; Sarkar D; Jha S, 2017, 'ESIoT: Enabling secure management of the internet of things', in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, Massachusetts, pp. 219 - 229, presented at 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, Massachusetts, 18 July 2017 - 20 July 2017, http://dx.doi.org/10.1145/3098243.3098252

Siddiqi M; Sivaraman V; Jha S, 2017, 'Timestamp integrity in wearable healthcare devices', in 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2016, http://dx.doi.org/10.1109/ANTS.2016.7947783

Shaghaghi A; Kaafar MA; Jha S, 2017, 'WedgeTail: An intrusion prevention system for the data plane of software defined networks', in ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 849 - 861, presented at 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 02 April 2017 - 06 April 2017, http://dx.doi.org/10.1145/3052973.3053039

Shaghaghi A; Kaafar MA; Scott-Hayward S; Kanhere SS; Jha S, 2017, 'Towards Policy Enforcement Point as a Service (PEPS)', in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016, pp. 50 - 55, http://dx.doi.org/10.1109/NFV-SDN.2016.7919475

Abaid Z; Sarkar D; Kaafar MA; Jha S, 2016, 'The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks', in Proceedings - Conference on Local Computer Networks, LCN, pp. 61 - 68, http://dx.doi.org/10.1109/LCN.2016.17

Javali C; Revadigar G; Rasmussen KB; Hu W; Jha S, 2016, 'I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol', in Proceedings - Conference on Local Computer Networks, LCN, pp. 477 - 485, http://dx.doi.org/10.1109/LCN.2016.126

Rezvani M; Ignjatovic A; Pagnucco M; Jha S, 2016, 'Anomaly-free policy composition in software-defined networks', in 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016, vienna, pp. 28 - 36, presented at 2016 IFIP Networking Conference, vienna, 17 May 2016 - 19 May 2016, http://dx.doi.org/10.1109/IFIPNetworking.2016.7497226

Revadigar G; Javali C; Xu W; Hu W; Jha S, 2016, 'Secure key generation and distribution protocol for wearable devices', in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, IEEE, Sydney, AUSTRALIA, presented at IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, AUSTRALIA, 14 March 2016 - 19 March 2016, http://dx.doi.org/10.1109/PERCOMW.2016.7457058

Revadigar GS; Javali C; Asghar HJ; Rasmussen KB; Jha S, 2015, 'Mobility Independent Secret Key Generation for Wearable Health-care Devices', in Proceedings of 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, September 2015., Sydney, Australia, presented at 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261446

Javali C; Revadigar, Girish ; Ding, Ming ; Jha, Sanjay , 2015, 'Secret Key Generation by Virtual Link Estimation', in BodyNets International Conference on Body Area Networks, Sydney, Australia, presented at 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261448

Revadigar GS; Javali C; Hu W; Jha S, 2015, 'DLINK: Dual Link Based Radio Frequency Fingerprinting for Wearable Devices', in Proceedings of the 40th IEEE Conference on Local Computer Networks (LCN), Florida, USA, October 2015, Florida, USA, pp. 329 - 337, presented at IEEE Conference on Local Computer Networks (LCN), Florida, USA, 26 October 2015 - 29 October 2015, http://dx.doi.org/10.1109/LCN.2015.7366327

Jahan M; Rezvani M; Seneviratne A; Jha S, 2015, 'Method for Providing Secure and Private Fine-grained Access to Outsourced Data', in Proceedings - Conference on Local Computer Networks, LCN, Clearwater Beach, Tampa, Florida, USA, pp. 406 - 409, presented at IEEE Local Computer Networks (LCN)'2015, Clearwater Beach, Tampa, Florida, USA, 26 October 2015 - 29 October 2015, http://dx.doi.org/10.1109/LCN.2015.7366339

Rezvani M; Ignjatovic ; Bertino E; Jha , 2015, 'A Collaborative Reputation System Based on Credibility Propagation in WSNs', in Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, Melbourne, VIC, pp. 1 - 8, presented at IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), Melbourne, VIC, 14 December 2015 - 17 December 2015, http://dx.doi.org/10.1109/ICPADS.2015.9

Li K; Ni W; Wang X; Liu RP; Kanhere SS; Jha S, 2015, 'EPLA: Energy-balancing packets scheduling for airborne relaying networks', in IEEE International Conference on Communications, pp. 6246 - 6251, http://dx.doi.org/10.1109/ICC.2015.7249319

Murtaza G; Reinhardt A; Kanhere SS; Jha S, 2015, 'Lightweight clustering of spatio-temporal data in resource constrained mobile sensing', in Proceedings of the WoWMoM 2015: A World of Wireless Mobile and Multimedia Networks, http://dx.doi.org/10.1109/WoWMoM.2015.7158166

Rezvani M; Allah Bakhsh M; Vigentini ; Ignjatovic ; Jha , 2015, 'An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems', in ICT Systems Security and Privacy Protection, Hamburg, Germany, pp. 189 - 203, presented at IFIP SEC 2015, Hamburg, Germany, 26 May 2015 - 28 May 2015, http://dx.doi.org/10.1007/978-3-319-18467-8_13

Revadigar G; Javali C; Asghar HJ; Rasmussen KB; Jha S, 2015, 'IARC: Secret key generation for resource constrained devices by inducing artificial randomness in the channel', in ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 669, http://dx.doi.org/10.1145/2714576.2714644

Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'A Trust Assessment Framework for Streaming Data in WSNs Using Iterative Filtering', in The IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, presented at The IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 07 April 2015 - 09 April 2015, http://dx.doi.org/10.1109/ISSNIP.2015.7106935

Li K; Akbaş MI; Turgut D; Kanhere SS; Jha S, 2014, 'Reliable positioning with hybrid antenna model for aerial wireless sensor and actor networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 2904 - 2909, http://dx.doi.org/10.1109/WCNC.2014.6952912

Biswas J; Ni W; Liu RP; Collings IB; Jha SK, 2014, 'Low complexity user pairing and resource allocation of heterogeneous users for uplink virtual MIMO system over LTE-A network', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 1903 - 1908, http://dx.doi.org/10.1109/WCNC.2014.6952560

Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2014, 'CSI-MIMO: Indoor Wi-Fi Fingerprinting System', in 39th Annual IEEE Conference on Local Computer Networks, IEEE, Edmonton, Canada, pp. 202 - 209, presented at Local Computer Networks Conference, Edmonton, Canada, 08 September 2014 - 11 September 2014, http://dx.doi.org/10.1109/LCN.2014.6925773

Li K; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2014, 'kappa-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks', in Krishnamachari B; Murphy AL; Trigoni N (eds.), WIRELESS SENSOR NETWORKS, EWSN 2014, SPRINGER-VERLAG BERLIN, Oxford, ENGLAND, pp. 17 - 33, presented at 11th European Conference on Wireless Sensor Networks (EWSN), Oxford, ENGLAND, 17 February 2014 - 19 February 2014, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000340395900002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Murtaza G; Kanhere S; ignjatovic A; Jha S; Jurdak R, 2014, 'Trajectory Approximation for Resource Constrained Mobile Sensor Networks', in IEEE DCOSS, Australia, pp. 59 - 66, presented at Ghulam Murtaza, Australia, 26 May 2014 - 28 May 2014, http://dx.doi.org/10.1109/DCOSS.2014.27

Mohsen Rezvani ; Aleksandar Ignjatovic ; Elisa Bertino ; Sanjay Jha , 2014, 'Provenance-Aware Security Risk Analysis for Hosts and Network Flows', in Proceedings of NOMS 2014 IEEE/IFIP Network Operations and Management Symposium, Krakow, Poland, pp. 1 - 8, presented at IEEE/IFIP Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, 05 May 2014 - 09 May 2014, http://dx.doi.org/10.1109/NOMS.2014.6838250

Li K; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2014, 'κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks', in Krishnamachari B; Murphy A; Trigoni N (eds.), Proceedings 11th European Conference, EWSN 2014 : Lecture Notes in Computer Science, Springer, Oxford, UK, pp. 17 - 33, presented at 11th European Conference, EWSN 2014, Oxford, UK, 17 February 2014 - 19 February 2014, http://dx.doi.org/10.1007/978-3-319-04651-8_2

Rezvani M; Ignjatovic A; Bertino E; Jha S, 2013, 'Poster abstract: A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks', in SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517394

Ali ST; Sivaraman V; Ostry D; Jha S, 2013, 'Securing data provenance in body area networks using lightweight wireless link fingerprints', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 65 - 72, http://dx.doi.org/10.1145/2517300.2517303

Tan H; Hu W; Jha SK, 2012, 'A TPM-enabled Remote Attestation Protocol (TRAP) in wireless sensor networks', in PM2HW2N'11 - Proceedings of the 6th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, Association for Computing Machinery, New York, pp. 9 - 16, presented at 6th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, PM2HW2N'11, Miami, FL, United states, 31 October 2011 - 31 October 2011, http://dx.doi.org/10.1145/2069087.2069090

Misra P; Hu W; Yang M; Jha SK, 2012, 'Efficient Cross-Correlation via Sparse Representation in Sensor Networks', in Proceedings of the 11th International Conference on Information Processing in Sensor Networks, ACM, New York, NY, USA, pp. 13 - 24, presented at 11th ACM/IEEE Conference on Information Processing in Sensing Networks, IPSN'12, Beijing, China, 16 April 2012 - 20 April 2012, http://dx.doi.org/10.1145/2185677.2185680

Zhao X; Guo J; Chou CT; Misra A; Jha SK, 2011, 'A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks', in INFOCOM, 2011 Proceedings IEEE, IEEE, Shanghai, China, pp. 2042 - 2050, presented at IEEE Infocom 2011, Shanghai, China, 10 April 2011 - 15 April 2011, http://dx.doi.org/10.1109/INFCOM.2011.5935012

Chen Q; Chou CT; Kanhere S; Zhang W; Jha SK, 2010, 'Performance of Multi-Hop Whisper Cognitive Radio Networks', in Proceedings of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access, IEEE, Singapore, presented at IEEE Symposium on New Frontiers in Dynamic Spectrum Access, Singapore, 06 April 2010 - 09 April 2010, http://dx.doi.org/10.1109/DYSPAN.2010.5457892

Jha SK; Hu W; Tan H, 2010, 'A hardware-based remote attestation protocol in wireless sensor networks', in Proceedings of the 9th International Conference on Information Processing in Sensor Networks, ACM, New York, NY, USA., pp. 378 - 379, presented at 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2010, Stockholm - Sweden, 12 April 2010 - 16 April 2010, http://dx.doi.org/10.1145/1791212.1791263

Tan H; Ostry D; Zic JJ; Jha SK, 2009, 'A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks', in Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec`09, 2nd ACM Conference on wireless Network Security, Zurich, Switzerland, pp. 245 - 252, presented at 2nd ACM Conference on wireless Network Security, Zurich, Switzerland, 16 March 2009 - 18 March 2009, http://dx.doi.org/10.1145/1520000/1514308

Bokareva T; Bulusu N; Jha S, 2008, 'Graph theory based aggregation of sensor readings in wireless sensor networks', in Proceedings - Conference on Local Computer Networks, LCN, pp. 514 - 515, http://dx.doi.org/10.1109/LCN.2008.4664216

Bokareva T; Bulusu N; Jha S, 2008, 'Graph Theory Based Aggregation of Sensor Readings in Wireless Sensor Networks.', in 2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, IEEE, Montreal, CANADA, pp. 503 - 504, presented at 33rd Annual IEEE Conference on Local Computer Networks, Montreal, CANADA, 14 October 2008 - 17 October 2008, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000262914500071&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a

Tan H; Jha S; Ostry D; Zic J; Sivaraman V, 2008, 'Secure Multi-hop Network Programming With Multiple One-way Key Chains', in WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, ASSOC COMPUTING MACHINERY, Alexandria, VA, pp. 183 - 193, presented at 1st ACM Conference on Wireless Network Security, Alexandria, VA, 31 March 2008 - 02 April 2008, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000265875600023&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Guo J; Jha SK, 2008, 'Host-Aware Routing in Multicast Overlay Backbone', in 20th IEEE/IFIP Network Operations and Management Symposium, Salvador, Bahia, Brazil, pp. 915 - 918, presented at 20th IEEE/IFIP Network Operations and Management Symposium, Salvador, Bahia, Brazil, 07 April 2008 - 11 April 2008, http://dx.doi.org/10.1109/NOMS.2008.4575246


Back to profile page