Author of the publication

A Framework for Modeling and Assessing Security of the Internet of Things.

, and . ICPADS, page 776-781. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Deployments of Defense Mechanisms for the Internet of Things., , , and . CoRR, (2019)Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention., , , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 28-41. Springer, (2013)Security Modeling and Analysis of Cross-Protocol IoT Devices., , , and . TrustCom/BigDataSE/ICESS, page 1043-1048. IEEE Computer Society, (2017)Automated security investment analysis of dynamic networks., , , , and . ACSW, page 6:1-6:10. ACM, (2018)Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception., , , , and . CoRR, (2020)Mainlobe jamming suppression with polarimetric multi-channel radar via independent component analysis., , , and . Digit. Signal Process., (2020)Composite Metrics for Network Security Analysis., , , and . CoRR, (2020)Evaluating the Effectiveness of Security Metrics for Dynamic Networks., , , , and . TrustCom/BigDataSE/ICESS, page 277-284. IEEE Computer Society, (2017)Multi-Objective Security Hardening Optimisation for Dynamic Networks., , , , and . ICC, page 1-7. IEEE, (2019)An Efficient Security System for Mobile Data Monitoring., , , , , and . Wirel. Commun. Mob. Comput., (2018)