Author of the publication

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.

, , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing FPGA-based obsolete component replacement for legacy systems., , , , and . ISQED, page 401-406. IEEE, (2018)Hardware Assisted Chaos Based IoT Authentication., and . ICNSC, page 169-174. IEEE, (2019)Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs., , , , , and . ICC, page 1-7. IEEE, (2018)Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference., , , and . IACR Cryptology ePrint Archive, (2020)Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment., , and . Network, 2 (1): 66-80 (2022)SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems., , , , and . DSN, page 1-13. IEEE, (2023)A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain., , , and . CCNC, page 982-985. IEEE, (2024)Enabling Cooperative IoT Security via Software Defined Networks (SDN)., , , , and . ICC, page 1-6. IEEE, (2018)Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security., , , , and . MILCOM, page 841-846. IEEE, (2019)iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity., , , and . ICNC, page 425-431. IEEE Computer Society, (2018)