Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a Unified Data Falsification Threat Landscape for Internet of Things/Cyberphysical Systems Applications., and . Computer, 56 (3): 20-31 (March 2023)Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure., , , and . ACM Trans. Priv. Secur., 24 (2): 9:1-9:36 (2021)Unifying Threats Against Information Integrity in Participatory Crowd Sensing., and . IEEE Pervasive Comput., 22 (4): 66-75 (October 2023)Resilience Against Bad Mouthing Attacks in Mobile Crowdsensing Systems via Cyber Deception., , , and . WOWMOM, page 169-178. IEEE, (2021)An Effective Dynamic Spectrum Access based Network Architecture for Smart Cities., , , and . ISC2, page 1-7. IEEE, (2018)Performance based channel allocation in IEEE 802.22 networks., , and . PIMRC, page 619-623. IEEE, (2011)Vulnerabilities in cognitive radio networks: A survey., , and . Comput. Commun., 36 (13): 1387-1398 (2013)W2Q: A dual weighted QoI scoring mechanism in social sensing using community confidence., , , and . PerCom Workshops, page 375-380. IEEE, (2017)Designing Green Communication Systems for Smart and Connected Communities via Dynamic Spectrum Access., , , and . ACM Trans. Sens. Networks, 14 (3-4): 31:1-31:32 (2018)A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation Attacks., , , and . ACM Trans. Sens. Networks, 16 (3): 26:1-26:26 (2020)