ORCID as entered in ROS

Select Publications
2023, 'Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification', IEEE Access, 11, pp. 70011 - 70022, http://dx.doi.org/10.1109/ACCESS.2023.3293526
,2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193, http://dx.doi.org/10.1016/j.future.2022.02.014
,2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356
,2022, 'WIDE: A witness-based data priority mechanism for vehicular forensics', Blockchain: Research and Applications, 3, http://dx.doi.org/10.1016/j.bcra.2021.100050
,2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering, http://dx.doi.org/10.1109/TNSE.2022.3165528
,2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188
,2022, 'PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool', IEEE Transactions on Information Forensics and Security, 17, pp. 1497 - 1512, http://dx.doi.org/10.1109/TIFS.2022.3164212
,2021, 'Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things', IEEE Transactions on Mobile Computing, 20, pp. 3049 - 3065, http://dx.doi.org/10.1109/TMC.2020.2992737
,2021, 'Man versus Machine: AutoML and Human Experts' Role in Phishing Detection', , http://arxiv.org/abs/2108.12193v1
,2021, 'DIMY: Enabling Privacy-preserving Contact Tracing', , http://arxiv.org/abs/2103.05873v1
,2021, 'B-FERL: Blockchain based framework for securing smart vehicles', Information Processing and Management, 58, http://dx.doi.org/10.1016/j.ipm.2020.102426
,2021, 'De-Anonymisation Attacks on Tor: A Survey', IEEE Communications Surveys and Tutorials, 23, pp. 2324 - 2350, http://dx.doi.org/10.1109/COMST.2021.3093615
,2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226
,2020, 'Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings', IEEE Internet of Things Journal, 7, pp. 298 - 310, http://dx.doi.org/10.1109/JIOT.2019.2946900
,2019, 'Light weight and fine-grained access mechanism for secure access to outsourced data*', Concurrency and Computation: Practice and Experience, 31, http://dx.doi.org/10.1002/cpe.4736
,2019, 'Analyzing XACML policies using answer set programming', International Journal of Information Security, 18, pp. 465 - 479, http://dx.doi.org/10.1007/s10207-018-0421-5
,2019, 'LoRa-Key: Secure Key Generation System for LoRa-Based Network', IEEE Internet of Things Journal, 6, pp. 6404 - 6416, http://dx.doi.org/10.1109/JIOT.2018.2888553
,2019, 'The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings', IEEE Internet of Things Journal, 6, pp. 7266 - 7281, http://dx.doi.org/10.1109/JIOT.2019.2915952
2019, 'Long-term secure management of large scale Internet of Things applications', Journal of Network and Computer Applications, 138, pp. 15 - 26, http://dx.doi.org/10.1016/j.jnca.2019.04.015
,2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting', IEEE Transactions on Mobile Computing, 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
,2019, 'MTRA: Multi-Tier randomized remote attestation in IoT networks', Computers and Security, 81, pp. 78 - 93, http://dx.doi.org/10.1016/j.cose.2018.10.008
,2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.', IEEE Trans. Mob. Comput., 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
,2018, 'SEDA: Secure over-the-air code dissemination protocol for the internet of things', IEEE Transactions on Dependable and Secure Computing, 15, pp. 1041 - 1054, http://dx.doi.org/10.1109/TDSC.2016.2639503
,2018, 'Light Weight Write Mechanism for Cloud Data', IEEE Transactions on Parallel and Distributed Systems, 29, pp. 1131 - 1146, http://dx.doi.org/10.1109/TPDS.2017.2782253
,2017, 'Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks', IEEE Transactions on Mobile Computing, 16, pp. 3431 - 3444, http://dx.doi.org/10.1109/TMC.2017.2691706
,2017, 'Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables', IEEE Transactions on Information Forensics and Security, 12, pp. 2467 - 2482, http://dx.doi.org/10.1109/TIFS.2017.2708690
,2016, 'Sparsity based Efficient Cross-Correlation Techniques in Sensor Networks', IEEE Transactions on Mobile Computing, http://dx.doi.org/10.1109/TMC.2016.2605689
,2016, 'Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna', Pervasive and Mobile Computing, 30, pp. 151 - 165, http://dx.doi.org/10.1016/j.pmcj.2016.01.005
,2016, 'Energy-efficient cooperative relaying for unmanned aerial vehicles', IEEE Transactions on Mobile Computing, 15, pp. 1377 - 1386, http://dx.doi.org/10.1109/TMC.2015.2467381
,2016, 'On the importance of link characterization for aerial wireless sensor networks', IEEE Communications Magazine, 54, pp. 52 - 57, http://dx.doi.org/10.1109/MCOM.2016.7470935
,2015, 'Interdependent Security Risk Analysis of Hosts and Flows', IEEE Transactions on Information Forensics and Security, 10, pp. 2325 - 2339, http://dx.doi.org/10.1109/TIFS.2015.2455414
,2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks', Security and Communication Networks, 8, pp. 2171 - 2188, http://dx.doi.org/10.1002/sec.1162
,2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391
,2015, 'High-throughput reliable multicast in multi-hop wireless mesh networks', IEEE Transactions on Mobile Computing, 14, pp. 728 - 741, http://dx.doi.org/10.1109/TMC.2014.2333731
,2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002
,2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816
,2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542
,2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.', Security and Communication Networks, http://dx.doi.org/10.1002/sec.1162
,2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998
,2014, 'Multiuser MIMO scheduling for mobile video applications', IEEE Transactions on Wireless Communications, 13, pp. 5382 - 5395, http://dx.doi.org/10.1109/TWC.2014.2347973
,2014, 'SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8651, pp. 74 - 89, http://dx.doi.org/10.1007/978-3-319-13066-8_5
,2013, 'Optimal opportunistic routing and network coding for bidirectional wireless flows', Computer Networks, 57, pp. 4030 - 4046, http://dx.doi.org/10.1016/j.comnet.2013.10.004
,2013, 'Acoustical ranging techniques in embedded wireless sensor networked devices', ACM Transactions on Sensor Networks, 10, http://dx.doi.org/10.1145/2529981
,2013, 'Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications)', IEEE Journal on Selected Areas in Communications, 31, pp. 1638, http://dx.doi.org/10.1109/JSAC.2013.08.erratum
,2013, 'Utilizing link characterization for improving the performance of aerial wireless sensor networks', IEEE Journal on Selected Areas in Communications, 31, pp. 1639 - 1649, http://dx.doi.org/10.1109/JSAC.2013.130825
,2013, 'Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)', IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31, pp. 1638 - 1638, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000322396800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2013, 'DEMO abstract: Securing data provenance in body area networks using lightweight wireless link fingerprints', SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517432
,2012, 'An empirical study of asymmetry in low-power wireless links', IEEE Communications Magazine, 50, pp. 137 - 146, http://dx.doi.org/10.1109/MCOM.2012.6231290
,2012, 'Resource-aware video multicasting via access gateways in wireless mesh networks', IEEE Transactions on Mobile Computing, 11, pp. 881 - 895, http://dx.doi.org/10.1109/TMC.2011.103
,2011, 'A pragmatic approach to area coverage in hybrid wireless sensor networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.1002/wcm.913
,