Follow
Shishir Nagaraja
Shishir Nagaraja
Professor of Cybersecurity, University of Newcastle
Verified email at newcastle.ac.uk
Title
Cited by
Cited by
Year
BotGrep: Finding P2P Bots with Structured Graph Analysis.
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
USENIX security symposium 10, 95-110, 2010
3242010
Stegobot: a covert social network botnet
S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ...
Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011
1282011
On the security of machine learning in malware c&c detection: A survey
J Gardiner, S Nagaraja
ACM Computing Surveys (CSUR) 49 (3), 1-39, 2016
1252016
New strategies for revocation in ad-hoc networks
T Moore, J Clulow, S Nagaraja, R Anderson
ESAS 7, 232-246, 2007
792007
Method and system for managing network resources based on a dynamic quorum
S Nagaraj, N Sirisilla, HS Madhusudhana
US Patent 8,285,825, 2012
702012
A survey of timing channels and countermeasures
AK Biswas, D Ghosal, S Nagaraja
ACM Computing Surveys (CSUR) 50 (1), 1-39, 2017
652017
Topology of Covert Conflict: (Transcript of Discussion)
S Nagaraja
Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22 …, 2007
612007
The snooping dragon: social-malware surveillance of the Tibetan movement
S Nagaraja, R Anderson
University of Cambridge, Computer Laboratory, 2009
562009
Anonymity in the wild: Mixes on unstructured networks
S Nagaraja
Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa …, 2007
522007
The impact of unlinkability on adversarial community detection: effects and countermeasures
S Nagaraja
Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010
412010
Incentives and information security
R Anderson, T Moore, S Nagaraja, A Ozment
Algorithmic Game Theory, 633-649, 2007
402007
Clicktok: click fraud detection using traffic analysis
S Nagaraja, R Shah
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
352019
Method and system for enhancing network security using a multilateral authorization mechanism
HS Madhusudhana, S Nagaraj, A Tripathi
US Patent 7,136,489, 2006
262006
BotSpot: fast graph based identification of structured P2P bots
B Venkatesh, SH Choudhury, S Nagaraja, N Balakrishnan
Journal of Computer Virology and Hacking Techniques 11, 247-261, 2015
212015
Evaluation framework of location privacy of wireless mobile systems with arbitrary beam pattern
FL Wong, M Lin, S Nagaraja, I Wassell, F Stajano
Fifth Annual Conference on Communication Networks and Services Research …, 2007
172007
Command & control: Understanding, denying and detecting
J Gardiner, M Cova, S Nagaraja
152014
P3CA: Private anomaly detection across ISP networks
S Nagaraja, V Jalaparti, M Caesar, N Borisov
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
152011
Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences
J Gardiner, M Cova, S Nagaraja
arXiv preprint arXiv:1408.1136, 2014
132014
Botyacc: Unified p2p botnet detection using behavioural analysis and graph analysis
S Nagaraja
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
132014
Method and system for automatically grouping objects in a directory system based on their access patterns
UVSR Kiran, S Nagaraja
US Patent 6,996,577, 2006
112006
The system can't perform the operation now. Try again later.
Articles 1–20