Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow., , and . ARES, page 147-156. IEEE Computer Society, (2016)A Distributed Security Approach against ARP Cache Poisoning Attack., , and . CySSS@AsiaCCS, page 27-32. ACM, (2022)PGFit: Static permission analysis of health and fitness apps in IoT programming frameworks., , , and . J. Netw. Comput. Appl., (2020)On Integrated Wired and Wireless Time-Sensitive Networking using SDN., and . CNSM, page 1-5. IEEE, (2023)The internet of things: securing devices and user data.. University of New South Wales, Sydney, Australia, (2019)base-search.net (ftunswworks:oai:unsworks.library.unsw.edu.au:1959.4/61962).pUpdate: Priority-Based Scheduling for Continuous and Consistent Network Updates in SDN., and . CNSM, page 1-7. IEEE, (2023)On Priority-Based Scheduling for Network Updates in SDN., and . LCN, page 1-4. IEEE, (2023)IoT-NetSec: Policy-Based IoT Network Security Using OpenFlow., , , and . PerCom Workshops, page 955-960. IEEE, (2019)Combining Cooperative With Non-Cooperative Game Theory to Model Wi-Fi Congestion in Apartment Blocks., , , , and . IEEE Access, (2020)HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable Switches., and . ARES, page 30:1-30:11. ACM, (2022)