Follow
Sankardas Roy
Title
Cited by
Cited by
Year
A survey of game theory as applied to network security
S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu
2010 43rd Hawaii international conference on system sciences, 1-10, 2010
7192010
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps
F Wei, S Roy, X Ou, Robby
ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-32, 2018
5742018
Deep ground truth analysis of current android malware
F Wei, Y Li, S Roy, X Ou, W Zhou
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
5502017
Secure data aggregation in wireless sensor networks
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 7 (3), 1040-1052, 2012
2042012
36th international symposium on intensive care and emergency medicine: Brussels, Belgium. 15-18 March 2016
RM Bateman, MD Sharpe, JE Jagger, CG Ellis, J Solé-Violán, ...
Critical care 20, 13-182, 2016
1992016
Efficient distributed detection of node replication attacks in sensor networks
B Zhu, VGK Addada, S Setia, S Jajodia, S Roy
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
1792007
Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs
S Roy, M Chuah
Lehigh CSE Tech. Rep, 2009
1712009
Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 9 (4), 681-694, 2014
1422014
Game theory for cyber security
S Shiva, S Roy, D Dasgupta
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
1302010
Localized multicast: efficient and distributed replica detection in large-scale sensor networks
B Zhu, S Setia, S Jajodia, S Roy, L Wang
IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010
1292010
Experimental study with real-world data for android app security analysis using machine learning
S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015
1092015
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
Q Wu, S Shiva, S Roy, C Ellis, V Datla
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
812010
Attack-resilient hierarchical data aggregation in sensor networks
S Roy, S Setia, S Jajodia
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
782006
Privacy‐preserving robust data aggregation in wireless sensor networks
M Conti, L Zhang, S Roy, R Di Pietro, S Jajodia, LV Mancini
Security and Communication Networks 2 (2), 195-213, 2009
712009
Securing MAODV: attacks and countermeasures.
S Roy, VGK Addada, S Setia, S Jajodia
SECON, 521-532, 2005
702005
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows
HS Bedi, S Roy, S Shiva
2011 IEEE symposium on computational intelligence in cyber security (CICS …, 2011
682011
The effect of soil physico-chemical properties on rhizome rot and wilt disease complex incidence of ginger under hill agro-climatic region of West Bengal
BR Sharma, S Dutta, S Roy, A Debnath, MD Roy
The Plant Pathology Journal 26 (2), 198-202, 2010
552010
Leptospirosis in the Andaman islands, India
P Vijayachari, AP Sugunan, S Sharma, S Roy, K Natarajaseenivasan, ...
Transactions of the Royal Society of Tropical Medicine and Hygiene 102 (2 …, 2008
512008
Impact of primary kidney disease on the effects of empagliflozin in patients with chronic kidney disease: secondary analyses of the EMPA-KIDNEY trial
PK Judge, N Staplin, KJ Mayne, C Wanner, JB Green, SJ Hauske, ...
The Lancet Diabetes & Endocrinology 12 (1), 51-60, 2024
472024
Protective effect of latex of Calotropis procera in Freund's Complete Adjuvant induced monoarthritis
VL Kumar, S Roy
Phytotherapy Research: An International Journal Devoted to Pharmacological …, 2009
472009
The system can't perform the operation now. Try again later.
Articles 1–20