Author of the publication

Pareto Optimal Security Resource Allocation for Internet of Things.

, , , and . ACM Trans. Priv. Secur., 20 (4): 15:1-15:30 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PUF-based Smart Tags for Supply Chain Management., , , , and . ARES, page 41:1-41:7. ACM, (2021)Strategic Security Resource Allocation for Internet of Things., , , and . ICDCS, page 737-738. IEEE Computer Society, (2016)The AC-Index: Fast Online Detection of Correlated Alerts., , and . STM, volume 9331 of Lecture Notes in Computer Science, page 107-122. Springer, (2015)Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC., , , , and . SmartIoT, page 229-236. IEEE, (2021)Hypergraph-Based Attack Models for Network Intrusion Detection., , , and . SEBD, page 61-68. (2014)Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques., , and . DASC/PiCom/CBDCom/CyberSciTech, page 905-910. IEEE, (2023)Intrusion Detection with Hypergraph-Based Attack Models., , , and . GKR, volume 8323 of Lecture Notes in Computer Science, page 58-73. Springer, (2013)Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework., , , , , , and . BCCA, page 28-35. IEEE, (2023)Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 419-436. Springer, (2017)Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review., , and . PADG@ESORICS, volume 11550 of Lecture Notes in Computer Science, page 202-226. Springer, (2018)