Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents., , , , , , , , , and 15 other author(s). AIPR, page 1-8. IEEE, (2023)SGChain: Blockchain Platform for Availability Attack Mitigation in Smart Grid Environments., , , and . ICNC, page 324-330. IEEE, (2023)VECA: Reliable and Confidential Resource Clustering for Volunteer Edge-Cloud Computing., , , , , , , and . CoRR, (2024)Intelligent defense using pretense against targeted attacks in cloud platforms., , , , , and . Future Gener. Comput. Syst., (2019)End-to-End IoT Security Middleware for Cloud-Fog Communication., , and . CSCloud, page 151-156. IEEE Computer Society, (2017)Formal Verification for Blockchain-based Insurance Claims Processing., , , , , and . NOMS, page 1-5. IEEE, (2024)Online Self-Service Learning Platform for Application-Inspired Cloud Development and Operations (DevOps) Curriculum., , , , , , , , , and 3 other author(s). IEEE Trans. Learn. Technol., (2024)On Countering Ransomware Attacks Using Strategic Deception., , , , , , , , and . GameSec, volume 14908 of Lecture Notes in Computer Science, page 149-176. Springer, (2024)CICADA: Cloud-based Intelligent Classification and Active Defense Approach for IoT Security., , , , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2023)Network-based Active Defense for Securing Cloud-based Healthcare Data Processing Pipelines., , , , and . ICCCN, page 1-9. IEEE, (2021)