Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT., and . GIoTS, page 1-6. IEEE, (2018)Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical Assessment., , , , , and . ARES, page 91:1-91:10. ACM, (2024)Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack., , , , and . ADHOC-NOW, volume 11104 of Lecture Notes in Computer Science, page 120-125. Springer, (2018)Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture., , , and . WF-IoT, page 317-322. IEEE Computer Society, (2016)MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT., , , , and . IEEE Internet Things J., 8 (10): 7818-7832 (2021)Lightweight Security for IoT Systems leveraging Moving Target Defense and Intrusion Detection., , and . NOMS, page 1-6. IEEE, (2024)Improving the resilience of the constrained Internet of Things: a moving target defense approach. (Amélioration de la résilience de l'internet des objets contraint).. Mines ParisTech, France, (2020)Energy-Aware Spreading Factor Selection in LoRaWAN Using Delayed-Feedback Bandits., , , and . IFIP Networking, page 1-9. IEEE, (2023)IANVS: A Moving Target Defense Framework for a Resilient Internet of Things., , , , , and . ISCC, page 1-6. IEEE, (2020)