Author of the publication

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.

, , , and . IEEE Trans. Information Forensics and Security, 14 (5): 1337-1350 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Beyah, Raheem
add a person with the name Beyah, Raheem
 

Other publications of authors with the same name

FDI: Quantifying Feature-based Data Inferability., , , , , , and . CoRR, (2019)On Evaluating the Effectiveness of the HoneyBot: A Case Study., , and . CoRR, (2019)A secure routing protocol with regional partitioned clustering and Beta trust management in smart home., , , and . Wireless Networks, 25 (7): 3805-3823 (2019)RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid., , , , and . NDSS, The Internet Society, (2019)MOPT: Optimized Mutation Scheduling for Fuzzers., , , , , , and . USENIX Security Symposium, page 1949-1966. USENIX Association, (2019)Emerging Technologies for Connected and Smart Vehicles., , , , , , and . IEEE Communications Magazine, 56 (10): 20-21 (2018)De-Health: All Your Online Health Information Are Belong to Us., , , , , , , and . CoRR, (2019)Enabling a Decentralized Smart Grid Using Autonomous Edge Control Devices., , , , , , and . IEEE Internet of Things Journal, 6 (5): 7406-7419 (2019)IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware., , , , , , , , , and . ASE, page 805-816. IEEE, (2021)De-SAG: On the De-Anonymization of Structure-Attribute Graph Data., , , , , and . IEEE Trans. Dependable Sec. Comput., 16 (4): 594-607 (2019)