Author of the publication

Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly.

, , , , , , and . IEEE Internet Things J., 10 (23): 21000-21012 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm., and . Secur. Commun. Networks, 8 (18): 3323-3334 (2015)RCCA Security for KEM+DEM Style Hybrid Encryptions., and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 102-121. Springer, (2012)Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS., , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2295-2308 (2022)An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network., , and . CyberC, page 14-18. IEEE Computer Society, (2014)RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions., and . Secur. Commun. Networks, 7 (8): 1219-1231 (2014)Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms., , , , and . J. Univers. Comput. Sci., 25 (3): 158-181 (2019)A similarity-based indirect trust model with anti-spoofing capability., , , and . Secur. Commun. Networks, 9 (18): 5868-5881 (2016)Natural sd-RCCA Secure Public-Key Encryptions., , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 236-250. Springer, (2017)Energy-Efficient Neighbor Discovery for the Internet of Things., , , and . IEEE Internet of Things Journal, 7 (1): 684-698 (2020)基于云的轻量级RFID群组标签认证协议 (Cloud-based Lightweight RFID Group Tag Authentication Protocol)., , and . 计算机科学, 46 (1): 182-189 (2019)