Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems., , , , , and . ACM Trans. Priv. Secur., 27 (1): 1:1-1:25 (2024)Risk-Based Access Control Model: A Systematic Literature Review., , , , and . Future Internet, 12 (6): 103 (2020)A First Look at Privacy Analysis of COVID-19 Contact-Tracing Mobile Applications., , , , , , and . IEEE Internet Things J., 8 (21): 15796-15806 (2021)TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks., , , and . IEEE Internet Things J., 6 (4): 5878-5891 (2019)Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network., , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3606-3615 (2020)On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things., , , , and . Inf. Process. Manag., 58 (3): 102526 (2021)COLIDE: a collaborative intrusion detection framework for Internet of Things., , , , and . IET Networks, 8 (1): 3-14 (2019)Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features., , and . Inf., 15 (1): 36 (2024)M2M-REP: Reputation system for machines in the internet of things., , , and . Comput. Secur., (2018)M2M-REP: Reputation of Machines in the Internet of Things., , and . ARES, page 28:1-28:7. ACM, (2017)