Author of the publication

Towards System-Level Security Analysis of IoT Using Attack Graphs.

, , , , , , and . IEEE Trans. Mob. Comput., 23 (2): 1142-1155 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System., , , , , , , and . MASS, page 269-277. IEEE, (2021)Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection., , , , , , , and . MILCOM, page 109-114. IEEE, (2019)Data-driven traffic flow analysis for vehicular communications., , , , , and . INFOCOM, page 1977-1985. IEEE, (2014)Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks., , and . CoRR, (2020)A novel system design and implementation for realtime sensing and warning of roadway hazards round-the-clock., , , , , , , and . SenSys, page 377-378. ACM, (2012)mmSense: Multi-Person Detection and Identification via mmWave Sensing., , , , and . mmNets@MobiCom, page 45-50. ACM, (2019)Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation., , , , , , , and . MILCOM, page 1-6. IEEE, (2019)IoTSpy: Uncovering Human Privacy Leakage in IoT Networks via Mining Wireless Context., , , and . PIMRC, page 1-7. IEEE, (2020)Smart Contract-based Computing Resources Trading in Edge Computing., , , and . PIMRC, page 1-7. IEEE, (2020)IOTA: A Framework for Analyzing System-Level Security of IoTs., , , , , , and . IoTDI, page 143-155. IEEE, (2022)