Author of the publication

wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks.

, , , and . ICCNS, page 96-103. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems., , and . FPS, volume 12637 of Lecture Notes in Computer Science, page 3-19. Springer, (2020)Security policy architecture for 5G Networks., , and . NoF, page 37-41. IEEE, (2023)Detecting Spoofing and GPS Jamming in UAVs: Multiclass Approach to Attack Diagnosis., , , , , and . HICSS, page 538-547. ScholarSpace, (2024)OAuth 2.0-based authentication solution for FPGA-enabled cloud computing., , , , and . UCC Companion, page 13:1-13:6. ACM, (2021)Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems., , , and . EICC, page 53-58. ACM, (2023)A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems., , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 35-40. Springer, (2018)RIICS: Risk Based IICS Segmentation Method., , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 143-157. Springer, (2018)A new wrapper feature selection model for anomaly-based intrusion detection systems., , and . Int. J. Secur. Networks, 17 (2): 107-123 (2022)wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks., , , and . ICCNS, page 96-103. ACM, (2017)Security Issue of WirelessHART Based SCADA Systems., , , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 225-241. Springer, (2015)