Author of the publication

Securing the Smart Home via a Two-Mode Security Framework.

, , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 22-42. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Code Assignment Algorithm for Nonblocking OVSF Codes in WCDMA., and . Telecommun. Syst., 25 (3-4): 417-431 (2004)Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks., and . ICNC, page 58-62. IEEE, (2014)A distributed dynamic channel and packet assignment for wireless multimedia traffic.. WCNC, page 1131-1135. IEEE, (2000)Optimizing Alert Data Management Processes at a Cyber Security Operations Center., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity Observations.. MILCOM, page 1-6. IEEE, (2019)Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems., , and . CNS, page 437-441. IEEE, (2016)Preventing conflicts in input buffering baseline-based ATM switches.. Advances in Switching Networks, volume 42 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 245-271. DIMACS/AMS, (1997)SPDA: A Security Protocol for Data Aggregation in Large-Scale Wireless Sensor Networks., , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 121-130. Springer, (2006)Mining Query-Based Subnetwork Outliers in Heterogeneous Information Networks., , , , , , and . ICDM, page 1127-1132. IEEE Computer Society, (2014)On simulation studies of jamming threats against LTE networks., , , , , and . ICNC, page 99-103. IEEE Computer Society, (2015)