Author of the publication

Evaluating the Effectiveness of Security Metrics for Dynamic Networks.

, , , , and . TrustCom/BigDataSE/ICESS, page 277-284. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Effectiveness of Security Metrics for Dynamic Networks., , , , and . TrustCom/BigDataSE/ICESS, page 277-284. IEEE Computer Society, (2017)Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks., , , and . Secur. Commun. Networks, 5 (2): 125-144 (2012)Automated security investment analysis of dynamic networks., , , , and . ACSW, page 6:1-6:10. ACM, (2018)Security Modeling and Analysis of Cross-Protocol IoT Devices., , , and . TrustCom/BigDataSE/ICESS, page 1043-1048. IEEE Computer Society, (2017)MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches., and . NTMS, page 1-5. IEEE, (2008)A taxonomy of secure data aggregation in wireless sensor networks., , , and . Int. J. Commun. Networks Distributed Syst., 8 (1/2): 101-148 (2012)A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA., , , , and . S-CUBE, volume 24 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 66-82. Springer, (2009)A Wireless Sensor Networks Test-bed for the Wormhole Attack., and . JDCTA, 3 (3): 19-28 (2009)RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks., , and . PDCAT, page 419-424. IEEE Computer Society, (2008)Secure Data Aggregation in Wireless Sensor Network: a survey., , and . AISC, volume 81 of CRPIT, page 93-105. Australian Computer Society, (2008)