2024
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach.
Expert Syst. Appl., March, 2024
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., February, 2024
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud.
IEEE Trans. Serv. Comput., 2024
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches.
Comput. Commun., 2024
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy.
Comput. Networks, 2024
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing.
Comput. Networks, 2024
SORCHIC: A Hybrid Image Cipher for IoT Applications Using Second Order Reversible Cellular Automata.
IEEE Access, 2024
2023
EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT.
Wirel. Networks, October, 2023
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems.
Comput. Commun., May, 2023
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.
Int. J. Inf. Sec., April, 2023
Anomaly based network intrusion detection for IoT attacks using deep learning technique.
Comput. Electr. Eng., April, 2023
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing.
Wirel. Pers. Commun., 2023
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2023
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023
A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions.
IEEE Commun. Surv. Tutorials, 2023
Privacy-Preserving and Security in SDN-Based IoT: A Survey.
IEEE Access, 2023
2022
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
IEEE/ACM Trans. Netw., 2022
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
IEEE Trans. Green Commun. Netw., 2022
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Blockchain verification and validation: Techniques, challenges, and research directions.
Comput. Sci. Rev., 2022
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags.
Comput. Networks, 2022
Software defined network-based HTTP flooding attack defender.
Comput. Electr. Eng., 2022
Graph Encryption for Shortest Path Queries with k Unsorted Nodes.
Proceedings of the IEEE International Conference on Trust, 2022
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Proceedings of the Information and Communications Security - 24th International Conference, 2022
2021
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.
IEEE Trans. Netw. Serv. Manag., 2021
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021
Privacy for 5G-Supported Vehicular Networks.
IEEE Open J. Commun. Soc., 2021
LEChain: A blockchain-based lawful evidence management scheme for digital forensics.
Future Gener. Comput. Syst., 2021
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021
Blockchain Testing: Challenges, Techniques, and Research Directions.
CoRR, 2021
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
2020
Mobility-Aware and Radio Characteristics Enabled Routing for Video Streaming over MANETs.
Wirel. Pers. Commun., 2020
Reliable and secure data transfer in IoT networks.
Wirel. Networks, 2020
TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks.
Wirel. Networks, 2020
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020
A robust multicast communication protocol for Low power and Lossy networks.
J. Netw. Comput. Appl., 2020
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions.
IEEE Commun. Surv. Tutorials, 2020
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
Comput. Secur., 2020
Context-based Co-presence detection techniques: A survey.
Comput. Secur., 2020
Security and design requirements for software-defined VANETs.
Comput. Networks, 2020
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN.
Comput. Networks, 2020
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Opening the software engineering toolbox for the assessment of trustworthy AI.
Proceedings of the First International Workshop on New Foundations for Human-Centered AI (NeHuAI) co-located with 24th European Conference on Artificial Intelligence (ECAI 2020), 2020
2019
Lightweight solutions to counter DDoS attacks in software defined networking.
Wirel. Networks, 2019
TILAK: A token-based prevention approach for topology discovery threats in SDN.
Int. J. Commun. Syst., 2019
SYN-Guard: An effective counter for SYN flooding attack in software-defined networking.
Int. J. Commun. Syst., 2019
Multi-constraint Zigbee routing to prolong lifetime of mobile wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2019
A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions.
CoRR, 2019
Reliable Group Communication Protocol for Internet of Things.
CoRR, 2019
CENSOR: Cloud-enabled secure IoT architecture over SDN paradigm.
Concurr. Comput. Pract. Exp., 2019
SLDP: A secure and lightweight link discovery protocol for software defined networking.
Comput. Networks, 2019
BlockA<i>uth</i>: BlockChain based distributed producer authentication in ICN.
Comput. Networks, 2019
Mobility-aware cross-layer routing for peer-to-peer networks.
Comput. Electr. Eng., 2019
Secure Machine to Machine Communication in Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
Wirel. Networks, 2018
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
IEEE Trans. Netw. Serv. Manag., 2018
A Survey on Context-based Co-presence Detection Techniques.
CoRR, 2018
A Survey on Security and Privacy Issues of Bitcoin.
IEEE Commun. Surv. Tutorials, 2018
Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN.
Comput. Commun., 2018
2017
Practical extensions to countermeasure DoS attacks in software defined networking.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Improving QoE Using Link Stability for Video Streaming in MANETs.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016
2015
Bandwidth-aware routing and admission control for efficient video streaming over MANETs.
Wirel. Networks, 2015
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET.
J. Inf. Secur. Appl., 2015
2014
Analysis of Identity Forging Attack in MANETs.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
LSMRP: Link stability based multicast routing protocol in MANETs.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014
2013
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs.
Proceedings of the International Conference on Advances in Computing, 2013
Video streaming over MANETs: Testing and analysis using real-time emulation.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
2012
A rate adaptive and multipath routing protocol to support video streaming in MANETs.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs.
Proceedings of the Advanced Communication and Networking, 2011
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs.
Proceedings of the Advances in Computing and Communications, 2011