Author of the publication

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.

, , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary Programming in a Distributed Packet Scheduling Architecture., , and . CAINE, page 230-233. ISCA, (2003)Physical layer security in wireless cooperative relay networks: state of the art and beyond., , , , , and . IEEE Communications Magazine, 53 (12): 32-39 (2015)Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks., and . Int. J. Grid High Perform. Comput., 8 (2): 94-110 (2016)Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets., and . ISC2, page 9-13. IEEE, (2019)A State-aware Proof of Stake Consensus Protocol for Power System Resilience., and . e-Energy, page 431-432. ACM, (2019)TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets., , , and . MILCOM, page 1-6. IEEE, (2018)Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus., , , , and . IEEE Trans. Veh. Technol., 72 (4): 4493-4509 (April 2023)AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment., , , , , and . IEEE Internet Things J., 6 (5): 8804-8817 (2019)Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems., , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 2697-2709 (September 2023)TCP Venoplus - A cross-layer approach to improve TCP performance in wired-cum-wireless networks using signal strength., , and . ICNSC, page 693-697. IEEE, (2010)