Author of the publication

Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.

, , , and . ACM Comput. Surv., 55 (2): 44:1-44:36 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis., , , and . CODASPY, page 297-304. ACM, (2015)Virtual private social networks., , and . CODASPY, page 39-50. ACM, (2011)A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions., , and . CoRR, (2019)Threat is in the Air: Machine Learning for Wireless Network Applications., , and . WiseML@WiSec, page 16-21. ACM, (2019)Emergent properties: detection of the node-capture attack in mobile wireless sensor networks., , , and . WISEC, page 214-219. ACM, (2008)Lexical Mining of Malicious URLs for Classifying Android Malware., , , , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 248-263. Springer, (2018)eRIPP-FS: Enforcing privacy and security in RFID., , , and . Secur. Commun. Networks, 3 (1): 58-70 (2010)The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions., , , , and . IEEE Commun. Surv. Tutorials, 22 (3): 2104-2129 (2020)Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call., , and . AsiaCCS, page 249-259. ACM, (2011)An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF., , , , , , and . Internet Things, (July 2023)