Veelasha Moonsamy

According to our database1, Veelasha Moonsamy authored at least 13 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices.
IEEE Communications Surveys and Tutorials, 2018

MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
New directions in IoT privacy using attribute-based authentication.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2014
Mining permission patterns for contrasting clean and malicious android applications.
Future Generation Comp. Syst., 2014

Android applications: Data leaks via advertising libraries.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Contrasting Permission Patterns between Clean and Malicious Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2013

Can Smartphone Users Turn Off Tracking Service Settings?
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
JNW, 2012

Towards an understanding of the impact of advertising on data leaks.
IJSN, 2012

Analysis of Malicious and Benign Android Applications.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
Feature Reduction to Speed Up Malware Classification.
Proceedings of the Information Security Technology for Applications, 2011


  Loading...