default search action
Sankardas Roy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Sai Bharadwaj Sirivaram, Sankardas Roy:
Deleted File Recovery for the Linux File System (Ext4): Finding the State-of-the-Art. ISDFS 2024: 1-6 - [i1]Guojun Liu, Doina Caragea, Xinming Ou, Sankardas Roy:
The Impact of Train-Test Leakage on Machine Learning-based Android Malware Detection. CoRR abs/2410.19364 (2024) - 2022
- [c21]Balakrishnan Dharmalingam, Anyi Liu, Subra Ganesan, Sankardas Roy:
FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps. EIT 2022: 368-374 - 2021
- [j12]Prabesh Pathak, Prabesh Poudel, Sankardas Roy, Doina Caragea:
Leveraging attention-based deep neural networks for security vetting of Android applications. EAI Endorsed Trans. Security Safety 8(29): e2 (2021) - 2020
- [c20]Dewan Chaulagain, Prabesh Poudel, Prabesh Pathak, Sankardas Roy, Doina Caragea, Guojun Liu, Xinming Ou:
Hybrid Analysis of Android Apps for Security Vetting using Deep Learning. CNS 2020: 1-9
2010 – 2019
- 2019
- [j11]Andrew Meyer, Sankardas Roy:
Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines? EAI Endorsed Trans. Security Safety 6(21): e4 (2019) - [c19]Emily Alfs, Doina Caragea, Dewan Chaulagain, Sankardas Roy, Nathan Albin, Pietro Poggi-Corradini:
Identifying Android malware using network-based approaches. ASONAM 2019: 903-906 - [c18]Sankardas Roy, Yan Wu, Kristina N. LaVenia:
Experience of Incorporating NIST Standards in a Digital Forensics Curricula. ISDFS 2019: 1-6 - 2018
- [j10]Fengguo Wei, Sankardas Roy, Xinming Ou, Robby:
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. ACM Trans. Priv. Secur. 21(3): 14:1-14:32 (2018) - [c17]Sankardas Roy, Dewan Chaulagain, Shiva Bhusal:
Static Analysis for Security Vetting of Android Apps. From Database to Cyber Security 2018: 375-404 - [c16]Sankardas Roy, Daniele Tomasi, Mauro Conti, Shiva Bhusal, Arkajyoti Roy, Jiang Li:
Optimizing Message Ferry Scheduling in a DTN. MobiWac 2018: 113-117 - 2017
- [c15]Zhaohui Xu, Pooja Yadav, Zhizhou Zhang, Sankardas Roy, Huimin Zhang:
Quantification of microbial species in solid state fermentation samples using signature genomic sequences. BIBM 2017: 927-932 - [c14]Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou:
Deep Ground Truth Analysis of Current Android Malware. DIMVA 2017: 252-276 - 2015
- [j9]Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva:
Mitigating congestion based DoS attacks with an enhanced AQM technique. Comput. Commun. 56: 60-73 (2015) - [c13]Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li, Nicolais Guevara:
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. ACSAC 2015: 81-90 - [c12]Justin Paupore, Earlence Fernandes, Atul Prakash, Sankardas Roy, Xinming Ou:
Practical Always-on Taint Tracking on Mobile Devices. HotOS 2015 - 2014
- [j8]Harkeerat Singh Bedi, Sajjan G. Shiva, Sankardas Roy:
A game inspired defense mechanism against distributed denial of service attacks. Secur. Commun. Networks 7(12): 2389-2404 (2014) - [j7]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact. IEEE Trans. Inf. Forensics Secur. 9(4): 681-694 (2014) - [c11]Fengguo Wei, Sankardas Roy, Xinming Ou, Robby:
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. CCS 2014: 1329-1341 - 2013
- [j6]Jiazhen Zhou, Sankardas Roy, Jiang Li, Rose Qingyang Hu, Yi Qian:
Minimizing the Average Delay of Messages in Pigeon Networks. IEEE Trans. Commun. 61(8): 3349-3361 (2013) - [c10]Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva:
Mitigating congestion-based denial of service attacks with active queue management. GLOBECOM 2013: 1440-1445 - 2012
- [j5]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure Data Aggregation in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 7(3): 1040-1052 (2012) - [j4]Jiazhen Zhou, Jiang Li, Yi Qian, Sankardas Roy, Kenneth Mitchell:
Quasi-Optimal Dual-Phase Scheduling for Pigeon Networks. IEEE Trans. Veh. Technol. 61(9): 4157-4169 (2012) - [c9]Jiazhen Zhou, Sankardas Roy, Jiang Li, Yi Qian:
A geographical partitioning-based pigeon assignment in a pigeon network. ICC 2012: 601-605 - 2011
- [c8]Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva:
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. CICS 2011: 129-136 - 2010
- [j3]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, Lingyu Wang:
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 913-926 (2010) - [c7]Sajjan G. Shiva, Sankardas Roy, Dipankar Dasgupta:
Game theory for cyber security. CSIIRW 2010: 34 - [c6]Sankardas Roy, Charles Ellis, Sajjan G. Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu:
A Survey of Game Theory as Applied to Network Security. HICSS 2010: 1-10 - [c5]Qishi Wu, Sajjan G. Shiva, Sankardas Roy, Charles Ellis, Vivek V. Datla:
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks. SpringSim 2010: 159
2000 – 2009
- 2009
- [j2]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure median computation in wireless sensor networks. Ad Hoc Networks 7(8): 1448-1462 (2009) - [j1]Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini:
Privacy-preserving robust data aggregation in wireless sensor networks. Secur. Commun. Networks 2(2): 195-213 (2009) - 2008
- [b1]Sankardas Roy:
Secure Data Aggregation in Wireless Sensor Networks. George Mason University, Fairfax, Virginia, USA, 2008 - [c4]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Securely computing an approximate median in wireless sensor networks. SecureComm 2008: 6 - 2007
- [c3]Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy:
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007: 257-267 - 2006
- [c2]Sankardas Roy, Sanjeev Setia, Sushil Jajodia:
Attack-resilient hierarchical data aggregation in sensor networks. SASN 2006: 71-82 - 2005
- [c1]Sankardas Roy, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia:
Securing MAODV: attacks and countermeasures. SECON 2005: 521-532
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint