Arbia Riahi

Orcid: 0000-0002-5739-1343

According to our database1, Arbia Riahi authored at least 12 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Assessing intra- and inter-community trustworthiness in IoT: A role-based attack-resilient dynamic trust management model.
Internet Things, 2024

Game theoretical analysis of strategy changes and influence factors in Crowdsourcing IoT systems.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

2023
A Game Theoretical Model addressing Misbehavior in Crowdsourcing IoT.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

2022
Privacy preservation using game theory in e-health application.
J. Inf. Secur. Appl., 2022

Ensuring Trustworthiness in IoIT/AIoT: A Phase-Based Approach.
IEEE Internet Things Mag., 2022

2021
PDTM: Phase-based dynamic trust management for Internet of things.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2019
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation.
IEEE Trans. Intell. Transp. Syst., 2019

2018
A roadmap for security challenges in the Internet of Things.
Digit. Commun. Networks, 2018

2017
A Markov game privacy preserving model in retail applications.
Proceedings of the International Conference on Selected Topics in Mobile and Wireless Networking, 2017

2014
A systemic and cognitive approach for IoT security.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

2013
A Systemic Approach for IoT Security.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

2004
Multi-Level Trust in E-Government Certi cation Practice.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004


  Loading...