A survey of game theory as applied to network security S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu 2010 43rd Hawaii international conference on system sciences, 1-10, 2010 | 712 | 2010 |
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps F Wei, S Roy, X Ou, Robby ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-32, 2018 | 561 | 2018 |
Deep ground truth analysis of current android malware F Wei, Y Li, S Roy, X Ou, W Zhou Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 545 | 2017 |
Secure data aggregation in wireless sensor networks S Roy, M Conti, S Setia, S Jajodia IEEE Transactions on Information Forensics and Security 7 (3), 1040-1052, 2012 | 205 | 2012 |
36th international symposium on intensive care and emergency medicine: Brussels, Belgium. 15-18 March 2016 RM Bateman, MD Sharpe, JE Jagger, CG Ellis, J Solé-Violán, ... Critical care 20, 13-182, 2016 | 190 | 2016 |
Efficient distributed detection of node replication attacks in sensor networks B Zhu, VGK Addada, S Setia, S Jajodia, S Roy Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 178 | 2007 |
Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs S Roy, M Chuah Lehigh CSE Tech. Rep, 2009 | 169 | 2009 |
Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact S Roy, M Conti, S Setia, S Jajodia IEEE Transactions on Information Forensics and Security 9 (4), 681-694, 2014 | 142 | 2014 |
Game theory for cyber security S Shiva, S Roy, D Dasgupta Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 129 | 2010 |
Localized multicast: efficient and distributed replica detection in large-scale sensor networks B Zhu, S Setia, S Jajodia, S Roy, L Wang IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010 | 129 | 2010 |
Experimental study with real-world data for android app security analysis using machine learning S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ... Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015 | 106 | 2015 |
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks Q Wu, S Shiva, S Roy, C Ellis, V Datla Proceedings of the 2010 spring simulation multiconference, 1-8, 2010 | 81 | 2010 |
Attack-resilient hierarchical data aggregation in sensor networks S Roy, S Setia, S Jajodia Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006 | 77 | 2006 |
Privacy‐preserving robust data aggregation in wireless sensor networks M Conti, L Zhang, S Roy, R Di Pietro, S Jajodia, LV Mancini Security and Communication Networks 2 (2), 195-213, 2009 | 71 | 2009 |
Securing MAODV: attacks and countermeasures. S Roy, VGK Addada, S Setia, S Jajodia SECON, 521-532, 2005 | 70 | 2005 |
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows HS Bedi, S Roy, S Shiva 2011 IEEE symposium on computational intelligence in cyber security (CICS …, 2011 | 68 | 2011 |
The effect of soil physico-chemical properties on rhizome rot and wilt disease complex incidence of ginger under hill agro-climatic region of West Bengal BR Sharma, S Dutta, S Roy, A Debnath, MD Roy The Plant Pathology Journal 26 (2), 198-202, 2010 | 54 | 2010 |
Leptospirosis in the Andaman islands, India P Vijayachari, AP Sugunan, S Sharma, S Roy, K Natarajaseenivasan, ... Transactions of the Royal Society of Tropical Medicine and Hygiene 102 (2 …, 2008 | 48 | 2008 |
Protective effect of latex of Calotropis procera in Freund's Complete Adjuvant induced monoarthritis VL Kumar, S Roy Phytotherapy Research: An International Journal Devoted to Pharmacological …, 2009 | 47 | 2009 |
Leech bite: a rare gynecologic emergency PK Saha, S Roy, D Bhattacharya, P Mukherjee, T Naskar, A Bhuiya Medscape General Medicine 7 (4), 73, 2005 | 47 | 2005 |