Author of the publication

Security Modeling and Analysis of Cross-Protocol IoT Devices.

, , , and . TrustCom/BigDataSE/ICESS, page 1043-1048. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Effectiveness of Security Metrics for Dynamic Networks., , , , and . TrustCom/BigDataSE/ICESS, page 277-284. IEEE Computer Society, (2017)MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches., and . NTMS, page 1-5. IEEE, (2008)A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA., , , , and . S-CUBE, volume 24 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 66-82. Springer, (2009)RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks., , and . PDCAT, page 419-424. IEEE Computer Society, (2008)Automated security investment analysis of dynamic networks., , , , and . ACSW, page 6:1-6:10. ACM, (2018)Security Modeling and Analysis of Cross-Protocol IoT Devices., , , and . TrustCom/BigDataSE/ICESS, page 1043-1048. IEEE Computer Society, (2017)A systematic evaluation of cybersecurity metrics for dynamic networks., , , , and . Comput. Networks, (2018)Secure Data Aggregation in Wireless Sensor Network: a survey., , and . AISC, volume 81 of CRPIT, page 93-105. Australian Computer Society, (2008)Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA., , , and . AINA, page 859-865. IEEE Computer Society, (2010)