2024
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning.
Comput. Secur., 2024
Context-aware embeddings for robust multiclass fraudulent URL detection in online social platforms.
Comput. Electr. Eng., 2024
2023
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework.
Sensors, December, 2023
Efficient Approach for Anomaly Detection in IoT Using System Calls.
Sensors, January, 2023
AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes.
J. Ambient Intell. Humaniz. Comput., 2023
HDA-TIP: A Framework for Heterogeneous Data Aggregation for Threat Intelligence Platform.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023
2022
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT.
J. Supercomput., 2022
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.
Sensors, 2022
Machine learning and the Internet of Things security: Solutions and open challenges.
J. Parallel Distributed Comput., 2022
A Quality-of-Things model for assessing the Internet-of-Things' nonfunctional properties.
Trans. Emerg. Telecommun. Technol., 2022
A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems.
Comput. Networks, 2022
2021
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model.
ACM Trans. Internet Techn., 2021
Orchestration- and choreography-based composition of Internet of Transactional Things.
Serv. Oriented Comput. Appl., 2021
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.
Sensors, 2021
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models.
J. Netw. Syst. Manag., 2021
CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications.
Trans. Emerg. Telecommun. Technol., 2021
Congestion avoidance in wireless sensor network using software defined network.
Computing, 2021
Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021
2020
A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020
A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment.
J. Parallel Distributed Comput., 2020
COMITMENT: A Fog Computing Trust Management Approach.
J. Parallel Distributed Comput., 2020
A collaborative healthcare framework for shared healthcare plan with ambient intelligence.
Hum. centric Comput. Inf. Sci., 2020
Immersing citizens and things into smart cities: a social machine-based and data artifact-driven approach.
Computing, 2020
A BBR-based congestion control for delay-sensitive real-time applications.
Computing, 2020
Towards a Quality-of-Thing based approach for assigning things to federations.
Clust. Comput., 2020
A decentralized lightweight blockchain-based authentication mechanism for IoT systems.
Clust. Comput., 2020
DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning.
Comput. J., 2020
Thingsourcing to Enable IoT Collaboration.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020
Blockchain and Smart Healthcare Security: A Survey.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020
OWL-T for a Semantic Description of IoT.
Proceedings of the New Trends in Databases and Information Systems, 2020
2019
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
Sensors, 2019
Remote health monitoring of elderly through wearable sensors.
Multim. Tools Appl., 2019
A Mechanism for Securing IoT-enabled Applications at the Fog Layer.
J. Sens. Actuator Networks, 2019
A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT.
J. Parallel Distributed Comput., 2019
Open challenges in vetting the internet-of-things.
Internet Technol. Lett., 2019
A location-sensitive and network-aware broker for recommending Web services.
Computing, 2019
Fairness in Real-Time Energy Pricing for Smart Grid Using Unsupervised Learning.
Comput. J., 2019
Towards a Resource-aware Thing Composition Approach.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019
2018
Cloud-SEnergy: A bin-packing based multi-cloud service broker for energy efficient composition and execution of data-intensive applications.
Sustain. Comput. Informatics Syst., 2018
Security policy monitoring of BPMN-based service compositions.
J. Softw. Evol. Process., 2018
Cloud vs edge: Who serves the Internet-of-Things better?
Internet Technol. Lett., 2018
Thing Federation as a Service: Foundations and Demonstration.
Proceedings of the Model and Data Engineering - 8th International Conference, 2018
2017
An energy-aware service composition algorithm for multiple cloud-based IoT applications.
J. Netw. Comput. Appl., 2017
2015
An energy efficient management scheme for wireless sensor networks.
Int. J. Crit. Comput. Based Syst., 2015
2014
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
Security Policy Monitoring of Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
A Heuristic Approach for Secure Service Composition Adaptation.
Proceedings of the Cyberpatterns, 2014
Dynamic Monitoring of Composed Services.
Proceedings of the Cyberpatterns, 2014
2013
Event Driven Monitoring of Composite Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
An event processing approach for threats monitoring of service compositions.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Prototype for design-time secure and trustworthy service composition.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013
2012
A Compose Language-Based Framework for Secure Service Composition.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
2011
Limitations of Simulation Tools for Large-Scale Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
A Sensor Relocation Scheme for Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Self-organization and management of wireless sensor networks.
PhD thesis, 2010
A self-managing fault management mechanism for wireless sensor networks
CoRR, 2010