Author of the publication

A Security Framework for the Internet of Things in the Future Internet Architecture.

, , , , and . Future Internet, 9 (3): 27 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overlay tunneling as a policy tool for defending mobile ad hoc networks., and . Secur. Commun. Networks, 9 (17): 4482-4494 (2016)MISO- V: Misbehavior Detection for Collective Perception Services in Vehicular Communications., , , , , , , , and . IV, page 369-376. IEEE, (2021)Democratizing the Edge: A Pervasive Edge Computing Framework., , , , , , and . CoRR, (2020)Distance-Aware Overlay Routing with AODV in Large Scale Ad Hoc Networks., , , and . VTC Fall, page 1-5. IEEE, (2014)Dynamic Memory Protection via Intel SGX-Supported Heap Allocation., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 608-617. IEEE Computer Society, (2018)Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet., , and . ICCCN, page 1-7. IEEE, (2013)A Security Framework for the Internet of Things in the Future Internet Architecture., , , , and . Future Internet, 9 (3): 27 (2017)Design of a Misbehavior Detection System for Objects Based Shared Perception V2X Applications., , , , and . ITSC, page 1165-1172. IEEE, (2019)Synthetic Dataset Generation for Adversarial Machine Learning Research., , , , , , and . CoRR, (2022)