Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks., , , and . MILCOM, page 1298-1304. IEEE, (2015)A Security-Constrained Reinforcement Learning Framework for Software Defined Networks., , , and . ICC, page 1-6. IEEE, (2021)Heimdall: Mitigating the Internet of Insecure Things., , , and . IEEE Internet of Things Journal, 4 (4): 968-978 (2017)RWGuard: A Real-Time Detection System Against Cryptographic Ransomware., , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 114-136. Springer, (2018)Edge-Based Intrusion Detection for IoT devices., , and . ACM Trans. Manag. Inf. Syst., 11 (4): 18:1-18:21 (2020)Intelligent Security Aware Routing: Using Model-Free Reinforcement Learning., and . ICCCN, page 1-10. IEEE, (2023)Real-Time Digital Signatures for Time-Critical Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2627-2639 (2017)Jarvis: Moving Towards a Smarter Internet of Things., and . ICDCS, page 122-134. IEEE, (2020)An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks., , , , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 549-568. Springer, (2022)Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things., , , and . ICDCS, page 656-666. IEEE Computer Society, (2017)