From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Deployments of Defense Mechanisms for the Internet of Things., , , и . SIoT, стр. 8-17. IEEE, (2018)A systematic evaluation of cybersecurity metrics for dynamic networks., , , , и . Comput. Networks, (2018)A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks., и . NSS, том 8792 из Lecture Notes in Computer Science, стр. 462-475. Springer, (2014)Towards a deep learning-driven intrusion detection approach for Internet of Things., , , , и . Comput. Networks, (2021)An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm., , , , и . Comput. Networks, (2022)Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches., , и . DSN Workshops, стр. 53-60. IEEE Computer Society, (2017)Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception., , , , , и . Comput. Secur., (2024)Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention., , , и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 28-41. Springer, (2013)Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks., , и . Comput. Networks, (апреля 2023)Mainlobe jamming suppression with polarimetric multi-channel radar via independent component analysis., , , и . Digit. Signal Process., (2020)