Author of the publication

A Game of Things: Strategic Allocation of Security Resources for IoT.

, , , and . IoTDI, page 185-190. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PUF-based Smart Tags for Supply Chain Management., , , , and . ARES, page 41:1-41:7. ACM, (2021)Strategic Security Resource Allocation for Internet of Things., , , and . ICDCS, page 737-738. IEEE Computer Society, (2016)Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC., , , , and . SmartIoT, page 229-236. IEEE, (2021)The AC-Index: Fast Online Detection of Correlated Alerts., , and . STM, volume 9331 of Lecture Notes in Computer Science, page 107-122. Springer, (2015)Hypergraph-Based Attack Models for Network Intrusion Detection., , , and . SEBD, page 61-68. (2014)Intrusion Detection with Hypergraph-Based Attack Models., , , and . GKR, volume 8323 of Lecture Notes in Computer Science, page 58-73. Springer, (2013)Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework., , , , , , and . BCCA, page 28-35. IEEE, (2023)Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques., , and . DASC/PiCom/CBDCom/CyberSciTech, page 905-910. IEEE, (2023)Shortfall-Based Optimal Security Provisioning for Internet of Things., , , and . ICDCS, page 2585-2586. IEEE Computer Society, (2017)Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things., , , and . ICDCS, page 656-666. IEEE Computer Society, (2017)