Skip to main content

Vincent Taylor : Publications

Click here to download all publications in a single bibtex file

@article{8006282,
  title = "Robust Smartphone App Identification Via Encrypted Network Traffic Analysis",
  author = "V. F. Taylor and R. Spolaor and M. Conti and I. Martinovic",
  year = "2017",
  issn = "1556-6013",
  journal = "IEEE Transactions on Information Forensics and Security",
  number = "99",
  pages = "1-1",
  volume = "PP",
  doi = "10.1109/TIFS.2017.2737970",
}
@inproceedings{Taylor:2017:MAQ:3098243.3098266,
  title = "There Are Many Apps for That: Quantifying the Availability of Privacy-preserving Apps",
  author = "Taylor, Vincent F. and Beresford, Alastair R. and Martinovic, Ivan",
  year = "2017",
  address = "New York, NY, USA",
  booktitle = "Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks",
  isbn = "978-1-4503-5084-6",
  location = "Boston, Massachusetts",
  pages = "247--252",
  publisher = "ACM",
  series = "WiSec '17",
  url = "http://doi.acm.org/10.1145/3098243.3098266",
  doi = "10.1145/3098243.3098266",
}
@inproceedings{Taylor:2017:UUI:3052973.3052990,
  title = "To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution",
  author = "Taylor, Vincent F. and Martinovic, Ivan",
  year = "2017",
  address = "New York, NY, USA",
  booktitle = "Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security",
  isbn = "978-1-4503-4944-4",
  keywords = "android, app, longitudinal, permission, vulnerability",
  location = "Abu Dhabi, United Arab Emirates",
  pages = "45--57",
  publisher = "ACM",
  series = "ASIA CCS '17",
  url = "http://doi.acm.org/10.1145/3052973.3052990",
  doi = "10.1145/3052973.3052990",
}
@inproceedings{12334,
  title = "Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store",
  author = "V. F. Taylor and I. Martinovic",
  year = "2017",
  booktitle = "Financial Cryptography and Data Security (FC 2017)",
  month = "To appear",
  doi = "10",
}
@inproceedings{7467370,
  title = "AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic",
  author = "V. F. Taylor and R. Spolaor and M. Conti and I. Martinovic",
  year = "2016",
  booktitle = "IEEE European Symposium on Security and Privacy (Euro S&P) 2016",
  keywords = "Android (operating system);mobile computing;smart phones;Android apps;AppScanner;Google Play Store;HTTPS/TLS;app fingerprinting;app fingerprints;automatic fingerprinting;encrypted network traffic;fingerprint generation methodology;marketing agencies;network planning;packet payloads;payload encryption protocols;smartphone apps;supervised learning algorithms;Cryptography;Feature extraction;IP networks;Mobile communication;Payloads;Ports (Computers);Web pages",
  month = "March",
  pages = "439-454",
  doi = "10.1109/EuroSP.2016.40",
}
@inproceedings{7467370,
  title = "SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis",
  author = "V. F. Taylor and I. Martinovic",
  year = "2016",
  booktitle = "5th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)",
  keywords = "Android (operating system);mobile computing;smart phones;Android apps;;Google Play Store;",
  month = "October",
  doi = "10.1145/2994459.2994474",
}
@inproceedings{7467370,
  title = "DEMO: Starving Permission-Hungry Android Apps Using SecuRank",
  author = "V. F. Taylor and I. Martinovic",
  year = "2016",
  booktitle = "23rd ACM Conference on Computer and Communications Security (ACM CCS) 2016",
  keywords = "Android (operating system);mobile computing;smart phones;Android apps;;Google Play Store;",
  month = "October",
  doi = "10.1145/2976749.2989032",
}
@inproceedings{6835013,
  title = "Mitigating black hole attacks in wireless sensor networks using node-resident expert systems",
  author = "Taylor, V.F. and Fokum, D.T.",
  year = "2014",
  booktitle = "IEEE Wireless Telecommunications Symposium 2014",
  keywords = "expert systems;telecommunication computing;telecommunication network routing;telecommunication security;telecommunication traffic;wireless sensor networks;autonomous self-organizing low-power nodes;black hole attacks;flexible attack detection scheme;lightweight expert system;malicious node;network traffic;node-resident expert systems;resource-preserving mechanisms;spurious route updates;watchdog mechanism;wireless sensor networks;Cryptography;Expert systems;Intrusion detection;Monitoring;Routing;Routing protocols;Wireless sensor networks",
  month = "April",
  pages = "1-7",
  doi = "10.1109/WTS.2014.6835013",
}
@inproceedings{6567421,
  title = "Securing wireless sensor networks from denial-of-service attacks using artificial intelligence and the CLIPS expert system tool",
  author = "Taylor, V.F. and Fokum, D.T.",
  year = "2013",
  booktitle = "IEEE Southeastcon 2013",
  issn = "1091-0050",
  keywords = "C language;artificial intelligence;cryptography;expert systems;telecommunication computing;telecommunication security;wireless sensor networks;C language integrated production system tool;CLIPS expert system tool;artificial intelligence;autonomous sensor nodes;base station;cryptographic key protection;data collection;denial-of-service attacks;energy constraints;environmental monitoring applications;false routing information;healthcare applications;home applications;limited processing power;malicious nodes;military applications;sensitive data protection;spurious control information;strong encryption approaches;tamper proof packaging;unwelcome sensor network;wireless sensor network security;Computer crime;Expert systems;Intrusion detection;Monitoring;Peer-to-peer computing;Wireless sensor networks",
  month = "April",
  pages = "1-6",
  doi = "10.1109/SECON.2013.6567421",
}