Author of the publication

Towards a realistic model for failure propagation in interdependent networks.

, , , and . ICNC, page 1-7. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN., , , , , and . Int. J. Inf. Sec., 20 (3): 269-285 (2021)Skype & Type: Keyboard Eavesdropping in Voice-over-IP., , , , and . ACM Trans. Priv. Secur., 22 (4): 24:1-24:34 (2019)CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem., and . IEEE Trans. Cloud Comput., 10 (4): 2437-2450 (2022)Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization., , , , , and . IEEE Trans. Serv. Comput., 17 (1): 18-29 (January 2024)NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN., , and . Comput. Networks, (2020)BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT., , , , , and . IEEE Internet Things J., 10 (18): 16480-16493 (September 2023)Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective., , , , and . IEEE Internet Things J., 11 (5): 7309-7324 (2024)DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things., , , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3452-3461 (2022)A secure alert messaging system for safe driving., , , and . Comput. Commun., (2014)Analysis and classification of context-based malware behavior., , and . Comput. Commun., (2019)