Author of the publication

Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.

, , , , , and . Blockchain Cybersecurity, Trust and Privacy, volume 79 of Advances in Information Security, Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System., , , and . IEEE Access, (2020)A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications., , , and . ICII, page 233-240. IEEE, (2019)Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence., , , , and . IEEE Trans. Emerg. Top. Comput., 8 (2): 341-351 (2020)Machine Learning Aided Static Malware Analysis: A Survey and Tutorial., , , and . CoRR, (2018)A Mitigation Approach to the Privacy and Malware Threats of Social Network Services., and . ICDIPC (2), volume 189 of Communications in Computer and Information Science, page 448-459. Springer, (2011)Towards data centric mobile security., , and . IAS, page 62-67. IEEE, (2011)A survey on internet of things security: Requirements, challenges, and solutions., , , , and . Internet Things, (2021)Federated-Learning-Based Anomaly Detection for IoT Security Attacks., , , , , and . IEEE Internet Things J., 9 (4): 2545-2554 (2022)IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection., , , , , and . IEEE Trans. Ind. Informatics, 18 (12): 8477-8486 (2022)A multiview learning method for malware threat hunting: windows, IoT and android as case studies., , , , , , , and . World Wide Web, 23 (2): 1241-1260 (2020)