Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks., , , and . IEEE Internet Things J., 6 (4): 5878-5891 (2019)A First Look at Privacy Analysis of COVID-19 Contact-Tracing Mobile Applications., , , , , , and . IEEE Internet Things J., 8 (21): 15796-15806 (2021)Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems., , , , , and . ACM Trans. Priv. Secur., 27 (1): 1:1-1:25 (2024)Risk-Based Access Control Model: A Systematic Literature Review., , , , and . Future Internet, 12 (6): 103 (2020)Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network., , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3606-3615 (2020)M2M-REP: Reputation system for machines in the internet of things., , , and . Comput. Secur., (2018)COLIDE: a collaborative intrusion detection framework for Internet of Things., , , , and . IET Networks, 8 (1): 3-14 (2019)On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things., , , , and . Inf. Process. Manag., 58 (3): 102526 (2021)Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features., , and . Inf., 15 (1): 36 (2024)M2M-REP: Reputation of Machines in the Internet of Things., , and . ARES, page 28:1-28:7. ACM, (2017)