Ankit Gangwal
Ankit Gangwal
Verified email at - Homepage
Cited by
Cited by
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
M Conti, A Gangwal, S Ruj
Computers & Security 79, 162-189, 2018
Improving password guessing via representation learning
D Pasquini, A Gangwal, G Ateniese, M Bernaschi, M Conti
2021 IEEE Symposium on Security and Privacy (SP), 1382-1399, 2021
A survey of Layer-two blockchain protocols
A Gangwal, HR Gangavalli, A Thirupathi
Journal of Network and Computer Applications 209, 103539, 2023
A comprehensive and effective mechanism for DDoS detection in SDN
M Conti, A Gangwal, MS Gaur
2017 IEEE 13th International Conference on Wireless and Mobile Computing†…, 2017
The road ahead for networking: A survey on icn-ip coexistence solutions
M Conti, A Gangwal, M Hassan, C Lal, E Losiouk
IEEE Communications Surveys & Tutorials 22 (3), 2104-2129, 2020
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages
M Conti, A Gangwal, M Todero
Proceedings of the 14th International Conference on Availability†…, 2019
Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis
F Aiolli, M Conti, A Gangwal, M Polato
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1484-1491, 2019
Detecting covert cryptomining using hpc
A Gangwal, SG Piazzetta, G Lain, M Conti
Cryptology and Network Security: 19th International Conference, CANS 2020†…, 2020
ELBA: Efficient layer based routing algorithm in SDN
A Gangwal, M Gupta, MS Gaur, V Laxmi, M Conti
2016 25th International Conference on Computer Communication and Networks†…, 2016
Cryptomining cannot change its spots: Detecting covert cryptomining using magnetic side-channel
A Gangwal, M Conti
IEEE Transactions on Information Forensics and Security 15, 1630-1639, 2019
Blocking intrusions at border using software defined-internet exchange point (SD-IXP)
M Conti, A Gangwal
2017 IEEE Conference on Network Function Virtualization and Software Defined†…, 2017
Panorama: Real-time bird's eye view of an OpenFlow network
A Gangwal, M Conti, MS Gaur
2017 IEEE 14th International Conference on Networking, Sensing and Control†…, 2017
Spot the difference: Your bucket is leaking: A novel methodology to expose A/B testing effortlessly
M Conti, A Gangwal, SP Gochhayat, G Tolomei
2018 IEEE Conference on Communications and Network Security (CNS), 1-7, 2018
Averages don’t characterise the heavy tails of ransoms
… Leverett, E Jardine, E Burns, A Gangwal, D Geer
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2020
On the Exploitation of Online SMS Receiving Services to Forge ID Verification
MH Berenjestanaki, M Conti, A Gangwal
Proceedings of the 14th International Conference on Availability†…, 2019
AutoSpill: Credential Leakage from Mobile Password Managers
A Gangwal, S Singh, A Srivastava
Proceedings of the 13th ACM Conference on Data and Application Security and†…, 2023
On the Feasibility of Profiling Electric Vehicles through Charging Data
A Gangwal, A Jain, M Conti
2023 Network and Distributed System Security Symposium (NDSS), 1-8, 2023
Analyzing Price Deviations in DeFi Oracles
A Gangwal, R Valluri, M Conti
Proceedings of the 21st International Conference on Cryptology and Network†…, 2022
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration
A Gangwal, S Singh, R Spolaor, A Srivastava
27th European Symposium on Research in Computer Security (ESORICS), 698-717, 2022
GENIE: Watermarking Graph Neural Networks for Link Prediction
VSP Bachina, A Gangwal, AA Sharma, C Sharma
arXiv preprint arXiv:2406.04805, 2024
The system can't perform the operation now. Try again later.
Articles 1–20