Author of the publication

Cyber Maneuver Against External Adversaries and Compromised Nodes.

, , and . Moving Target Defense, volume 100 of Advances in Information Security, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users., , , , and . DSN, page 250-262. IEEE, (2021)A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks., , , and . CNS, page 91-99. IEEE, (2022)Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks., , , and . CoRR, (2021)SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks., , , and . MobiHoc, page 356-367. ACM, (2006)SET: Detecting node clones in sensor networks., , and . SecureComm, page 341-350. IEEE, (2007)Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection., , , and . INFOCOM, page 2089-2097. IEEE, (2019)A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses., , , , and . INFOCOM, page 2455-2463. IEEE, (2009)Routing in Socially Selfish Delay Tolerant Networks., , and . INFOCOM, page 857-865. IEEE, (2010)Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification., and . ACM Trans. Inf. Syst. Secur., 11 (3): 15:1-15:30 (2008)On the Effectiveness of Internal Patching Against File-Sharing Worms., , and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 1-20. (2008)