Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks., , , , , and . IEEE Access, (2021)Attack Specification Language: Domain Specific Language for Dynamic Training in Cyber Range., , , and . EDUCON, page 873-879. IEEE, (2021)A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends., , , , , , , , and . Comput. Secur., (2017)OO-ABMS: Online/Offline-Aided Attribute-Based Multi-Keyword Search., , , , , and . IEEE Access, (2021)FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network., , , , , , and . IEEE Internet Things J., 7 (7): 6132-6142 (2020)A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns., , , , , , , and . IEEE Access, (2019)ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map., , , , , , and . IEEE Access, (2021)Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach., , , , , and . IEEE Access, (2023)Blockchain-Based Agri-Food Supply Chain: A Complete Solution., , , , , and . IEEE Access, (2020)Holistic approach for coupling privacy with safety in VANETs., , , , and . Comput. Networks, (2019)