Author of the publication

Cybersecurity in industrial control systems: Issues, technologies, and challenges.

, , and . Comput. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture, , and . Computer, 50 (4): 27--37 (April 2017)Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach., , , and . IEEE Trans. Engineering Management, 67 (4): 1244-1255 (2020)The Challenge of Improving Credibility of User-Generated Content in Online Social Networks., , and . ACM J. Data Inf. Qual., 7 (3): 13:1-13:4 (2016)Editorial for special issue of Telecommunication Systems on "Mobility management and wireless access"., , and . Telecommun. Syst., 42 (3-4): 163-164 (2009)Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing., , , and . IEEE Trans. Parallel Distributed Syst., 24 (10): 2036-2045 (2013)On the Adequacy of 5G Security for Vehicular Ad Hoc Networks., , , and . IEEE Commun. Stand. Mag., 5 (1): 32-39 (2021)End-to-End Security Across Wired-Wireless Networks for Mobile Users., , , and . Inf. Secur. J. A Glob. Perspect., 16 (5): 264-277 (2007)Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI)., and . IT Prof., 23 (4): 36-43 (2021)Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks., , and . IEEE Commun. Surv. Tutorials, 17 (2): 843-867 (2015)Secure Transmission in Cellular V2X Communications Using Deep Q-Learning., , , and . IEEE Trans. Intell. Transp. Syst., 23 (10): 17167-17176 (2022)