Author of the publication

Federated Zero Trust Architecture using Artificial Intelligence.

, , , , and . IEEE Wirel. Commun., 31 (2): 30-35 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning to Optimize TCP Communications Over High Frequency Communications Links., , , and . IEEE Access, (2022)Analysis of two authorization protocols using Colored Petri Nets., , , and . Int. J. Inf. Sec., 14 (3): 221-247 (2015)Denial-of-service resistance in key establishment., , , , and . Int. J. Wirel. Mob. Comput., 2 (1): 59-71 (2007)Authentication strategies in vehicular communications: a taxonomy and framework., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 129 (2021)Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy., , and . AISC, volume 161 of CRPIT, page 67-70. Australian Computer Society, (2015)An unsupervised method for social network spammer detection based on user information interests., , and . J. Big Data, 9 (1): 7 (2022)A taxonomy of secure data aggregation in wireless sensor networks., , , and . Int. J. Commun. Networks Distributed Syst., 8 (1/2): 101-148 (2012)Revocation and update of trust in autonomous delay tolerant networks., , , and . Comput. Secur., (2016)A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning., , , and . ICFEM, volume 14308 of Lecture Notes in Computer Science, page 273-278. Springer, (2023)The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence., , , and . ICST, page 1-6. IEEE, (2023)