Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Multiple SDN Controllers Based on Stochastic Petri Nets., , and . SpringSim, page 1-12. IEEE, (2019)Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure., , , , and . GLOBECOM, page 1-7. IEEE, (2019)Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk., , , and . MILCOM, page 1-8. IEEE, (2019)Towards Secure and Smart Healthcare in Smart Cities Using Blockchain., , , and . ISC2, page 1-4. IEEE, (2018)Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights., , , and . ISI, page 25-30. IEEE, (2018)Development of information fusion model for layered sensing systems using computing with words., , , and . CogSIMA, page 183-188. IEEE, (2011)ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things., , , , , and . IEEE Access, (2022)Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility., , and . IEEE Trans. Intell. Transp. Syst., 25 (1): 452-461 (January 2024)A Proposed Framework for the Governance of Blockchain Technology., , , , and . AMCIS, Association for Information Systems, (2022)Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix., , , and . ICNC, page 181-187. IEEE, (2023)