Author of the publication

Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture.

, , , and . GLOBECOM, page 6358-6363. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FortisEDoS: A Deep Transfer Learning-Empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing., , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2818-2835 (July 2024)Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection., , , , and . GLOBECOM, page 6005-6011. IEEE, (2023)Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks., , , and . Comput. Networks, (2017)Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems., , , and . NaNA, page 501-506. IEEE, (2021)A Deep Transfer Learning-Powered EDoS Detection Mechanism for 5G and Beyond Network Slicing., , , and . GLOBECOM, page 4747-4753. IEEE, (2023)Energy-aware Collision Avoidance stochastic Optimizer for a UAVs set., , , and . IWCMC, page 1636-1641. IEEE, (2020)Secure pairwise broadcast time synchronization in wireless sensor networks., , and . DCOSS, page 1-6. IEEE Computer Society, (2011)Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks., , , and . CSE, page 633-639. IEEE Computer Society, (2012)A comprehensive survey on cyber deception techniques to improve honeypot performance., , , , and . Comput. Secur., (2024)A Novel Buffered Federated Learning Framework for Privacy-Driven Anomaly Detection in IIoT., , and . CoRR, (2024)