Author of the publication

Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions.

, , , and . Comput. Commun., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracing Software Exploitation., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 340-352. Springer, (2021)Timestamp Analysis for Quality Validation of Network Forensic Data., and . NSS, volume 9955 of Lecture Notes in Computer Science, page 235-248. Springer, (2016)An informed consent model for managing the privacy paradox in smart buildings., , , and . ASE Workshops, page 19-26. ACM, (2020)A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks., , and . ICPR (3), page 1050-1054. IEEE Computer Society, (2006)LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)., , , , , and . Comput. Secur., (2021)Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning., , and . COMSNETS, page 598-602. IEEE, (2024)An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic., , , and . CW, page 23-30. IEEE Computer Society, (2011)Evaluation and Analysis of a Digital Forensic Readiness Framework for the IIoT., , , and . ISDFS, page 1-6. IEEE, (2024)Internet of Things (IoT): Research, Simulators, and Testbeds., , , and . IEEE Internet of Things Journal, 5 (3): 1637-1647 (2018)Internet of Things Forensics: The Need, Process Models, and Open Issues., , , and . IT Prof., 20 (3): 40-49 (2018)