Author of the publication

Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis.

, and . J. Inf. Secur. Appl., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Multi-partition Paralleled Image Storage Hardware File System for MARS Rover., , , , and . WISATS (1), volume 280 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 371-379. Springer, (2019)Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments., , and . IEEE Trans. Netw. Serv. Manag., 14 (1): 233-245 (2017)Toward supervised shape-based behavioral authentication on smartphones., , , and . J. Inf. Secur. Appl., (2020)Ground temperature measurements to verify thermal anomaly observed on satellite image of arid ecosystem across the Israel-Egypt border., , , , and . IGARSS, page 4651-4654. IEEE, (2004)Evaluating the effect of user guidelines on creating click-draw based graphical passwords., and . RACS, page 322-327. ACM, (2012)Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 163-175. Springer, (2017)A Blockchain-based Trusted Service Mechanism for Crowdsourcing System., , , , , and . VTC Spring, page 1-6. IEEE, (2020)Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 55-68. Springer, (2013)Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice., , , and . Trustcom/BigDataSE/ISPA, page 1061-1068. IEEE, (2016)Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification., , , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 313-328. Springer, (2018)