Author of the publication

Preventing Colluding Identity Clone Attacks in Online Social Networks.

, , , , , , , and . ICDCS Workshops, page 187-192. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the use of design diversity in fault tolerant and secure systems: A qualitative analysis., , and . CISDA, page 1-8. IEEE, (2015)Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence., , , , and . CoRR, (2017)Rethinking Information Sharing for Actionable Threat Intelligence., , , , and . CoRR, (2017)Cloud security certifications: a comparison to improve cloud service provider security., , , , , and . ICC, page 120:1-120:12. ACM, (2017)Applying chaos theory for runtime Hardware Trojan detection., , , and . CISDA, page 1-6. IEEE, (2015)A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing., , , , , and . IPDPS, page 262-272. IEEE, (2019)Secure-by-synthesis network with active deception and temporal logic specifications., , , , and . CoRR, (2020)Game theoretic modeling of cyber deception in the Internet of Battlefield Things.. Allerton, page 862. IEEE, (2018)Multi-level VM replication based survivability for mission-critical cloud computing., , , and . IM, page 1351-1356. IEEE, (2015)Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception., , , , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 21-32. Springer, (2019)