Shishir Nagaraja
University of Strathclyde
H-index: 17
Europe-United Kingdom
Top articles of Shishir Nagaraja
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
SoK: Acoustic Side Channels | arXiv preprint arXiv:2308.03806 | Ping Wang Shishir Nagaraja Aurélien Bourquard Haichang Gao Jeff Yan | 2023/8/6 |
Sensor Identification via Acoustic Physically Unclonable Function | Digital Threats: Research and Practice | Girish Vaidya TV Prabhakar Nithish Gnani Ryan Shah Shishir Nagaraja | 2023/8/10 |
SWaP: A Water Process Testbed for ICS Security Research | Matthew Calder Mujeeb Ahmed Shishir Nagaraja | 2023/7/23 | |
AGRITRUST: A Testbed to Enable Trustworthy Smart AgriTech | Carl Dickinson Shishir Nagaraja Chuadhry Mujeeb Ahmed Richard Hyde | 2023/7/11 | |
Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels | arXiv preprint arXiv:2205.08426 | Ryan Shah Chuadhry Mujeeb Ahmed Shishir Nagaraja | 2022/5/17 |
The dangers of computational law and cybersecurity; perspectives from engineering and the AI Act | arXiv e-prints | Kaspar Rosager Ludvigsen Shishir Nagaraja Angela Daly | 2022/7 |
Preventing or mitigating adversarial supply chain attacks: A legal analysis | Kaspar Rosager Ludvigsen Shishir Nagaraja Angela Daly | 2022/11/11 | |
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels | Ryan Shah Chuadhry Mujeeb Ahmed Shishir Nagaraja | 2022/5/16 | |
Reconstructing Robot Operations via Radio-Frequency Side-Channel | arXiv preprint arXiv:2209.10179 | Ryan Shah Mujeeb Ahmed Shishir Nagaraja | 2022/9/21 |
Dissecting liabilities in adversarial surgical robot failures: a national (Danish) and EU law perspective | Computer Law & Security Review | Kaspar Rosager Ludvigsen Shishir Nagaraja | 2022/4/1 |
YASM (Yet Another Surveillance Mechanism) | arXiv preprint arXiv:2205.14601 | Kaspar Rosager Ludvigsen Shishir Nagaraja Angela Daly | 2022/5/29 |
Fingerprinting Robot Movements via Acoustic Side Channel | arXiv preprint arXiv:2209.10240 | Ryan Shah Mujeeb Ahmed Shishir Nagaraja | 2022/9/21 |
When is software a medical device? Understanding and determining the “intention” and requirements for software as a medical device in European union law | European Journal of Risk Regulation | Kaspar Ludvigsen Shishir Nagaraja DALY Angela | 2022/3 |
The opportunity to regulate cybersecurity in the EU (and the world): recommendations for the Cybersecurity Resilience Act | Kaspar Rosager Ludvigsen Shishir Nagaraja | 2022/5/26 | |
A novel approach for identification of sensor devices through acoustic PUF | Digital Threats: Research and Practice | Girish Vaidya TV Prabhakar Nithish Gnani Ryan Shah Shishir Nagaraja | 2021/9/24 |
VoIPLoc: passive VoIP call provenance via acoustic side-channels | Shishir Nagaraja Ryan Shah | 2021/6/28 | |
The Intention; Requirements for Software as a Medical Device in EU Law | Requirements for Software as a Medical Device in EU Law (April 13, 2021) | Kaspar Rosager Ludvigsen Shishir Nagaraja Angela Daly | 2021/4/13 |
Controller-in-the-middle: Attacks on software defined networks in industrial control systems | Joseph Gardiner Adam Eiffert Peter Garraghan Nicholas Race Shishir Nagaraja | 2021/11/15 | |
Unlinking super-linkers: the topology of epidemic response (Covid-19) | arXiv preprint arXiv:2006.02241 | Shishir Nagaraja | 2020/6/2 |
A unified access control model for calibration traceability in safety-critical IoT | Ryan Shah Shishir Nagaraja | 2020 |