Immediate Impact

59 standout
Sub-graph 1 of 22

Citing Papers

Network Traffic Fingerprinting for IIoT Device Identification: A Survey
2025 Standout
Dynamic Security Computing Framework With Zero Trust Based on Privacy Domain Prevention and Control Theory
2025 Standout
4 intermediate papers

Works of Sneha Kumar Kasera being referenced

Secret Key Extraction from Wireless Signal Strength in Real Environments
2012
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
2009

Author Peers

Author Last Decade Papers Cites
Sneha Kumar Kasera 403 602 239 271 32 888
Miklós Maróti 559 369 205 81 41 1.2k
Jianhao Hu 291 511 138 109 65 800
Hesham F. A. Hamed 337 262 357 339 76 1.1k
Yee Wei Law 510 198 205 163 48 827
Mohammad M. Mansour 553 765 245 160 69 1.1k
Suman Jana 250 430 491 298 39 1.1k
Haitham Hassanieh 176 371 80 173 32 793
Ranjan Bose 326 430 136 108 71 816
Bin Wu 466 755 134 96 68 1.1k
Yalin E. Sagduyu 620 535 383 103 66 1.1k

All Works

Loading papers...

Rankless by CCL
2026