Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of information fusion model for layered sensing systems using computing with words., , , and . CogSIMA, page 183-188. IEEE, (2011)ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things., , , , , and . IEEE Access, (2022)Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility., , and . IEEE Trans. Intell. Transp. Syst., 25 (1): 452-461 (January 2024)Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure., , , , and . GLOBECOM, page 1-7. IEEE, (2019)Security Analysis of Multiple SDN Controllers Based on Stochastic Petri Nets., , and . SpringSim, page 1-12. IEEE, (2019)Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk., , , and . MILCOM, page 1-8. IEEE, (2019)Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights., , , and . ISI, page 25-30. IEEE, (2018)Towards Secure and Smart Healthcare in Smart Cities Using Blockchain., , , and . ISC2, page 1-4. IEEE, (2018)Assessing network path vulnerabilities for secure cloud computing., , and . ICC, page 5548-5552. IEEE, (2012)Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix., , , and . ICNC, page 181-187. IEEE, (2023)