Author of the publication

Jyotish: A novel framework for constructing predictive model of people movement from joint Wifi/Bluetooth trace.

, , and . PerCom, page 54-62. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lessons Learned from Bluetooth/Wifi Scanning Deployment in University Campus, , and . Department of Computer Science, University of Illinois, (June 2010)A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers., , and . IEEE Trans. Inf. Forensics Secur., 11 (10): 2174-2186 (2016)Conceptual evidence collection and analysis methodology for Android devices., , and . The Cloud Security Ecosystem, Elsevier, (2015)A Robust Shallow Temporal Reasoning System., , and . HLT-NAACL, page 29-32. The Association for Computational Linguistics, (2012)A Forensically Sound Adversary Model for Mobile Devices., , and . CoRR, (2015)Windows Event Forensic Process., , , , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 87-100. Springer, (2014)Mobile cloud forensics: An analysis of seven popular Android apps., , and . The Cloud Security Ecosystem, Elsevier, (2015)Is the data on your wearable device secure? An Android Wear smartwatch case study., , and . Softw. Pract. Exp., 47 (3): 391-403 (2017)The Role of the Adversary Model in Applied Security Research., , and . IACR Cryptology ePrint Archive, (2018)Constraints Based Taxonomic Relation Classification., and . EMNLP, page 1099-1109. ACL, (2010)