Author of the publication

A Framework for Modeling and Assessing Security of the Internet of Things.

, and . ICPADS, page 776-781. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A systematic evaluation of cybersecurity metrics for dynamic networks., , , , and . Comput. Networks, (2018)Towards a deep learning-driven intrusion detection approach for Internet of Things., , , , and . Comput. Networks, (2021)An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm., , , , and . Comput. Networks, (2022)A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks., and . NSS, volume 8792 of Lecture Notes in Computer Science, page 462-475. Springer, (2014)Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches., , and . DSN Workshops, page 53-60. IEEE Computer Society, (2017)Optimal Deployments of Defense Mechanisms for the Internet of Things., , , and . SIoT, page 8-17. IEEE, (2018)Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention., , , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 28-41. Springer, (2013)Mainlobe jamming suppression with polarimetric multi-channel radar via independent component analysis., , , and . Digit. Signal Process., (2020)Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks., , and . Comput. Networks, (April 2023)Knowledge-based Embodied Question Answering., , , , and . CoRR, (2021)