Sankardas Roy

Book Chapter

  1. Sankardas Roy, Dewan Chaulagain, and Shiva Bhusal. Static Analysis for Security Vetting of Android Apps. Book Chapter, From Database to Cyber Security, ISBN 978-3-030-04833-4, Springer, 2018.

  2. Sanjeev Setia, Sankardas Roy, and Sushil Jajodia. Secure Data Aggregation in Wireless Sensor Networks. Book Chapter, Wireless Sensor Network Security, J. Lopez, J. Zhou (Eds.), ISBN 978-1-58603-8137, IOS Press, 2008.

Refereed Journal Papers

  1. Andrew Meyer, Sankardas Roy. Do Metadata-based Deleted File Recovery Tools Meet NIST Guidelines?. EAI Endorsed Transactions on Security and Safety (2019) pdf.

  2. Fengguo Wei, Sankardas Roy, Xinming Ou, Robby. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. ACM Trans. Priv. Secur. 21(3): 14:1-14:32 (2018) pdf.

  3. Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva. Mitigating Congestion-based DoS Attacks with an Enhanced AQM Technique. Elsevier Journal of Computer Communications (ComCom 2015).

  4. Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker’s Impact. IEEE Transactions on Information Forensics and Security (TIFS), 9(4): 681-694, 2014.

  5. Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva. A Game Inspired Defense Mechanism against DDoS Attacks. (Wiley) Security and Communication Networks, 2014.

  6. Jiazhen Jhou, Sankardas Roy, Jiang Li, and Yi Qian. Minimizing the Average Delay of Messages in Pigeon Networks. IEEE Transactions on Communication, 2013.

  7. M Chuah, P Yang, S Roy, B Sheng. Performance Evaluation of Dissemination Schemes for Coded Packets in Heterogeneous Sparse Ad Hoc Networks. Ad Hoc & Sensor Wireless Networks 15 (2-4), 151-181, 2012.

  8. Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. Secure Data Aggregation in Wireless Sensor Networks. IEEE Transactions on Information Forensics and Security (TIFS), 7(3): 1040-1052 (2012).

  9. Jiazhen Jhou, Jiang Li, Yi Qian, Sankardas Roy, and Kenneth Mitchell. Quasi-Optimal Dual-phase Scheduling for Pigeon Networks. IEEE Transactions on Vehicular Technology, 61(9): 4157-4169 (2012).

  10. Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy and Lingyu Wang. Localized Multicast: Efficient and Distributed Replica Detection in Large-scale Sensor Networks. IEEE Transactions on Mobile Computing, 9(7): 913-926 (2010).

  11. Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. Secure Median Computation in Wireless Sensor Networks. Ad Hoc Networks 7(8): 1448-1462 (2009).

  12. Mauro Conti, Lei Zhang, Sankardas Roy, and Sushil Jajodia. Protecting Privacy in Data Aggregation in Sensor Networks. Security and Communication Networks 2(2): 195-213 (2009).

Refereed Conference papers

  1. D. Chaulagain, P. Poudel, P. Pathak, S. Roy, D. Caragea, G. Liu, X. Ou. Hybrid Analysis of Android Apps for Security Vetting using Deep Learning. Accepted by the IEEE Conference on Communications and Network Security (CNS 2020). pdf.

  2. Emily Alfs, Doina Caragea, Dewan Chaulagain, Sankardas Roy, Nathan Albin, Pietro Poggi-Corradini. Identifying Android Malware Using Network-Based Approaches. International Symposium on Foundations of Open Source Intelligence and Security Informatics. (FOSINT-SI with ASONAM 2019). pdf.

  3. Sankardas Roy, Yan Wu, Kristina LaVenia. Experience of Incorporating NIST Standards in a Digital Forensics Curricula. The 7th International Symposium on Digital Forensics and Security (ISDFS 2019). pdf.

  4. Sankardas Roy, Daniele Tomasi, Mauro Conti, Shiva Bhusal, Arkajyoti Roy, Jiang Li. Optimizing Message Ferry Scheduling in a DTN. MobiWac, 2018. pdf.

  5. Zhaohui Xu, Pooja Yadav, Zhizhou Zhang, Sankardas Roy, Huimin Zhang. Quantification of microbial species in solid state fermentation samples using signature genomic sequences. IEEE BIBM, 2017. pdf.

  6. Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou. Deep Ground Truth Analysis of Current Android Malware. DIMVA, 2017. pdf.

  7. Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Ranganathan, Hongmin Li and Nicolais Guevara. Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2015. pdf.

  8. Fengguo Wei, Sankardas Roy, Xinming Ou, and Robby. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. ACM Conference on Computer and Communications Security (CCS) 2014: 1329-1341. pdf.

  9. Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva. Mitigating Congestion-based Denial of Service Attacks with Active Queue Management. IEEE Global Communications Conference (Globecom 2013).

  10. Jiazhen Zhou, Sankardas Roy, Jiang Li, and Yi Qian. A Geographical Partitioning-based Pigeon Assignment in a Pigeon Network. IEEE International Conference on Communications (ICC 2012).

  11. Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva. Game Theory-based Defense Mechanisms against DDoS Attacks on TCP/TCP-friendly flows. Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI 2011).

  12. Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and Qishi Wu. A Survey of Game Theory as Applied to Network Security. The 43rd Hawaii International Conference on System Sciences, 2010.

  13. Sajjan Shiva, Sankardas Roy, Harkeerat Bedi, Dipankar Dasgupta, and Qishi Wu. A Stochastic Game with Imperfect Information for Cyber Security. To appear in the 5th International Conference on i-Warfare & Security (ICIW), 2010.

  14. Qishi Wu, Sajjan Shiva, Sankardas Roy, Charles Ellis, and Vivek Datla. On Modeling and Simulation of Game Theory-based Defense Mechanisms against DoS and DDoS Attacks. Spring Simulation Multiconference (SpringSim), 2010.

  15. Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. Securely Computing An Approximate Median in Wireless Sensor Networks. SecureComm 2008. More details are in a technical report.

  16. Bo Zhu, V. Gopala Addada, Sanjeev Setia, Sushil Jajodia, and Sankardas Roy. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007 .

  17. Sankardas Roy, V. Gopala Addada, Sanjeev Setia, and Sushil Jajodia. Securing MAODV: Attacks and Countermeasures. IEEE SECON 2005.

Refereed Workshop papers

  1. Mooi Choo Chuah, Sankardas Roy, and I. Stoev. Secure Descriptive Message Dissemination in DTNs. The Second International Workshop on Mobile Opportunistic Networking (MobiOpp), 2010.

  2. Sankardas Roy, Sanjeev Setia, and Sushil Jajodia. Attack-resilient Hierarchical Data Aggregation in Sensor Networks. ACM SASN 2006.

Papers under review

None

The (pdf) documents contained in this page are included to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be reposted without the explicit permission of the copyright holder.