Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing FPGA-based obsolete component replacement for legacy systems., , , , and . ISQED, page 401-406. IEEE, (2018)Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs., , , , , and . ICC, page 1-7. IEEE, (2018)Hardware Assisted Chaos Based IoT Authentication., and . ICNSC, page 169-174. IEEE, (2019)A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain., , , and . CCNC, page 982-985. IEEE, (2024)Game and Prospect Theoretic Hardware Trojan Testing., , , and . CISS, page 1-6. IEEE, (2023)Strategic Hardware Trojan Testing with Hierarchical Trojan Types., , and . CISS, page 1-6. IEEE, (2021)Detecting Counterfeit ICs with Blockchain-based Verification Framework., , and . ISC2, page 1-8. IEEE, (2020)Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security., , , , and . MILCOM, page 841-846. IEEE, (2019)Enabling Cooperative IoT Security via Software Defined Networks (SDN)., , , , and . ICC, page 1-6. IEEE, (2018)Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack., , , , , and . CCGrid, page 458-467. IEEE Computer Society / ACM, (2017)