Author of the publication

B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain.

, , , , and . J. Inf. Secur. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Blockchain-based approach and Attribute-based Encryption for Healthcare Record Data Exchange., , , , and . RIVF, page 65-70. IEEE, (2022)DeFL-BC: Empowering Reliable Cyberattack Detection through Decentralized Federated Learning and Poisoning Attack Defense., , , , and . RIVF, page 515-520. IEEE, (2023)A Security-Enhanced Monitoring System for Northbound Interface in SDN using Blockchain., , and . SoICT, page 197-204. ACM, (2019)B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain., , , , and . J. Inf. Secur. Appl., (2022)Adversarial AutoEncoder and Generative Adversarial Networks for Semi-Supervised Learning Intrusion Detection System., , , , , and . RIVF, page 584-589. IEEE, (2022)DA-GAN: Domain Adaptation for Generative Adversarial Networks-assisted Cyber Threat Detection., , , , , and . RIVF, page 29-34. IEEE, (2022)Forensic analysis of TikTok application to seek digital artifacts on Android smartphone., , , , and . RIVF, page 1-5. IEEE, (2020)Raiju: Reinforcement learning-guided post-exploitation for automating security assessment of network systems., , , , , and . Comput. Networks, (2024)Empirical Study on Reconnaissance Attacks in SDN-aware Network for Evaluating Cyber Deception., , and . RIVF, page 1-6. IEEE, (2021)A federated threat hunting system with big data analysis for SDN-enabled networks., , , , and . RIVF, page 35-40. IEEE, (2022)