Sankardas Roy
Sankardas Roy
Assistant Professor, BGSU
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
A survey of game theory as applied to network security
S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu
System Sciences (HICSS), 2010 43rd Hawaii International Conference on, 1-10, 2010
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps
F Wei, S Roy, X Ou, Robby
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Deep ground truth analysis of current android malware
F Wei, Y Li, S Roy, X Ou, W Zhou
International Conference on Detection of Intrusions and Malware, and …, 2017
Secure data aggregation in wireless sensor networks
S Roy, M Conti, S Setia, S Jajodia
Information Forensics and Security, IEEE Transactions on 7 (3), 1040-1052, 2012
Secure data aggregation in wireless sensor networks
S Roy
Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs
S Roy, M Chuah
Lehigh CSE Tech. Rep, 2009
Efficient distributed detection of node replication attacks in sensor networks
B Zhu, VGK Addada, S Setia, S Jajodia, S Roy
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
Localized multicast: efficient and distributed replica detection in large-scale sensor networks
B Zhu, S Setia, S Jajodia, S Roy, L Wang
Mobile Computing, IEEE Transactions on 9 (7), 913-926, 2010
Game theory for cyber security
S Shiva, S Roy, D Dasgupta
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
Privacy‐preserving robust data aggregation in wireless sensor networks
M Conti, L Zhang, S Roy, R Di Pietro, S Jajodia, LV Mancini
Security and Communication Networks 2 (2), 195-213, 2009
Attack-resilient hierarchical data aggregation in sensor networks
S Roy, S Setia, S Jajodia
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
Securing MAODV: attacks and countermeasures.
S Roy, VGK Addada, S Setia, S Jajodia
SECON, 521-532, 2005
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning
S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015
On modeling and simulation of game theory-based defense mechanisms against dos and ddos attacks
Q Wu, S Shiva, S Roy, C Ellis, V Datla
Proceedings of the 2010 spring simulation multiconference, 159, 2010
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows
HS Bedi, S Roy, S Shiva
Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on …, 2011
Securely computing an approximate median in wireless sensor networks
S Roy, M Conti, S Setia, S Jajodia
Proceedings of the 4th international conference on Security and privacy in …, 2008
A stochastic game model with imperfect information in cyber security
S Shiva, S Roy, H Bedi, D Dasgupta, Q Wu
The 5th International Conference on i-Warfare and Security, 308-318, 2010
Mitigating congestion based DoS attacks with an enhanced AQM technique
H Bedi, S Roy, S Shiva
Computer Communications 56, 60-73, 2015
Secure data aggregation in wireless sensor networks
S Setia, S Roy, S Jajodia
Wireless Sensor Network Security, 204-222, 2008
Secure descriptive message dissemination in dtns
M Chuah, S Roy, I Stoev
Proceedings of the Second International Workshop on Mobile Opportunistic …, 2010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20