Author of the publication

Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems.

, , and . ISADS, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust-Based Decision Making for Health IoT Systems., and . IEEE Internet of Things Journal, 4 (5): 1408-1419 (2017)Dynamic multisource multipath routing for intrusion tolerance and lifetime maximization of autonomous wireless sensor networks., and . ISADS, page 1-7. IEEE Computer Society, (2013)COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks., , and . IEEE Access, (2019)Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks., and . IEEE Trans. Network and Service Management, 10 (2): 189-203 (2013)Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems., , , and . IEEE Access, (2020)Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems., , and . ISADS, page 1-6. IEEE, (2019)Trust Management of Smart Service Communities., , and . IEEE Access, (2019)A Case Study of IoT Participatory Sensing of Hazardous Ozone Using Traces., , , , and . FSDM, volume 299 of Frontiers in Artificial Intelligence and Applications, page 479-484. IOS Press, (2017)Trust as a Service for IoT Service Management in Smart Cities., , , , , and . HPCC/SmartCity/DSS, page 1358-1365. IEEE, (2018)Trust-Based IoT Cloud Participatory Sensing of Air Quality., , , , and . Wireless Personal Communications, 105 (4): 1461-1474 (2019)