Author of the publication

Preserving privacy against external and internal threats in WSN data aggregation.

, , , , , and . Telecommun. Syst., 52 (4): 2163-2176 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boten ELISA: A novel approach for botnet C&C in Online Social Networks., , , , and . CNS, page 74-82. IEEE, (2015)Distributed Detection of Clone Attacks in Wireless Sensor Networks., , , and . IEEE Trans. Dependable Secur. Comput., 8 (5): 685-698 (2011)Analyzing Android Encrypted Network Traffic to Identify User Actions., , , and . IEEE Trans. Inf. Forensics Secur., 11 (1): 114-125 (2016)No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone., , , , and . ICDCS, page 218-227. IEEE Computer Society, (2014)Anonymity in an Electronic Society: A Survey., , and . Cyber Deception, Springer, (2016)Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking., , , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 243-262. Springer, (2015)Towards a secure dynamic allocation of files in large scale distributed file systems., , and . HOT-P2P, page 102-107. IEEE Computer Society, (2004)No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position., , , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 46-59. Springer, (2015)FedUp! Cloud Federation as a Service., , , , and . ESOCC, volume 9846 of Lecture Notes in Computer Science, page 168-182. Springer, (2016)Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey., , , , and . ISSRE Workshops, page 389-394. IEEE Computer Society, (2014)