Ryan Shah

Orcid: 0000-0003-1348-8423

According to our database1, Ryan Shah authored at least 23 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Empower New Code Citizens to Reflect and Communicate on Code Security.
IEEE Secur. Priv., 2025

Evaluating Serious Slow Game Jams as a Mechanism for Co-Designing Serious Games to Improve Understanding of Cybersecurity.
Games Res. Pract., 2025

Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics.
Comput. Stand. Interfaces, 2025

WaveVerif: Acoustic Side-Channel Based Verification of Robotic Workflows.
Proceedings of the 7th IEEE International Conference on Trust, 2025

2023
Sensor Identification via Acoustic Physically Unclonable Function.
DTRAP, 2023

Introducing and Interfacing with Cybersecurity - A Cards Approach.
CoRR, 2023

Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia.
CoRR, 2023

Communicating Complex Decisions in Robot-Assisted Therapy.
CoRR, 2023

2022
Fingerprinting Robot Movements via Acoustic Side Channel.
CoRR, 2022

Reconstructing Robot Operations via Radio-Frequency Side-Channel.
CoRR, 2022

Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels.
CoRR, 2022

Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

2021
VoIPLoc: passive VoIP call provenance via acoustic side-channels.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
VoipLoc: Establishing VoIP call provenance using acoustic side-channels.
CoRR, 2019

Privacy with Surgical Robotics: Challenges in Applying Contextual Privacy Theory.
CoRR, 2019

Secure Calibration for High-Assurance IoT: Traceability for Safety Resilience.
CoRR, 2019

Security Landscape for Robotics.
CoRR, 2019

A game-theoretic analysis of DoS attacks on driverless vehicles.
CoRR, 2019

An Access Control Model for Robot Calibration.
CoRR, 2019

Clicktok: click fraud detection using traffic analysis.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Poster: Unified Access Control for Surgical Robotics.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Do we have the time for IRM?: service denial attacks and SDN-based defences.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019


  Loading...